, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xa804, &(0x7f0000000240)=ANY=[]) [ 821.305791] jfs: Unrecognized mount option "#id=" or missing value [ 821.354872] jfs: Unrecognized mount option "#id=" or missing value 19:23:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x48, &(0x7f0000000240)=ANY=[]) 19:23:34 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:34 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,%id=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:34 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) 19:23:34 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:34 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffe4}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 822.277686] jfs: Unrecognized mount option "%id=" or missing value 19:23:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xe, &(0x7f0000000240)=ANY=[]) 19:23:34 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x11000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 822.325429] jfs: Unrecognized mount option "%id=" or missing value 19:23:34 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,Xid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:34 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xa, &(0x7f0000000240)=ANY=[]) 19:23:34 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,iid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) [ 822.428642] jfs: Unrecognized mount option "Xid=" or missing value [ 822.462222] jfs: Unrecognized mount option "Xid=" or missing value 19:23:34 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3c000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 822.537648] jfs: Unrecognized mount option "iid=" or missing value [ 822.565364] jfs: Unrecognized mount option "iid=" or missing value 19:23:35 executing program 0: r0 = accept$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000140)=0x5, 0x4) syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0xcb, 0x80) r1 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:23:35 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6300}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1900000000000000, &(0x7f0000000240)=ANY=[]) 19:23:35 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,pid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:35 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000680)='msdos\x00', &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00ec2f10db666a335b7e9db75cde9fa52e568e7414674721f13e70860c105d8019751a25374769756e8f"]) syz_emit_ethernet(0xf4, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@generic={0xc3ff, "f8d31324e1c92da6eb050bf0c36f447358f545d531dd1ebe2051b66634193ace8c9e251c53b6cf6200ac0cdf88a3d463271c235e79a6ef650798895c502f92c1f8fa2a47dbce56758cfc1f13fd36278fd6f874e2f49cd1664626840be5e5fe64536f3ab6872a9a40736ce9439f6815dc1169a6e7fca1ce2ebde7b3dc0fa0571bcedd753232253bedfdc963147288719d03175f06031c9bac0a29cc8da6fb10f65874afea106f1f14613b39e977650beebcd3319a2ff82124cdf8de8edaacdc445607081d465902d369316e2ba8ce01cf9b5bb7b0125a3bacb83bf203539fc80455f613128aba"}}}, 0x0) 19:23:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:35 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 823.751547] jfs: Unrecognized mount option "pid=" or missing value [ 823.759697] FAT-fs (loop5): bogus number of reserved sectors [ 823.765948] FAT-fs (loop5): Can't find a valid FAT filesystem [ 823.789279] jfs: Unrecognized mount option "pid=" or missing value 19:23:35 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff9c}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1000000000000, &(0x7f0000000240)=ANY=[]) 19:23:35 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,xid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) [ 823.807715] FAT-fs (loop5): bogus number of reserved sectors [ 823.813841] FAT-fs (loop5): Can't find a valid FAT filesystem 19:23:35 executing program 5: sched_setattr(0x0, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, 0x2000000000005, 0x200000, 0x20000080, 0x3}, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000180)) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) 19:23:35 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff85}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x40000, &(0x7f0000000240)=ANY=[]) [ 823.893085] jfs: Unrecognized mount option "xid=" or missing value [ 823.932341] jfs: Unrecognized mount option "xid=" or missing value 19:23:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80ffff}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:36 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,-id=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) [ 824.044969] jfs: Unrecognized mount option "-id=" or missing value [ 824.061606] jfs: Unrecognized mount option "-id=" or missing value 19:23:37 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x4, &(0x7f0000000480)=[{&(0x7f0000000100)="86465585ab6a53c813aeb72f569752c103f348a4c40308cc8ea93c2efc8ea0728292624ba702d29ac7c0b13f7efad815cb65ecb02381632c92909d5de6886f", 0x3f, 0x400}, {&(0x7f0000000140)="601ec353520798ba07d0708ea082d748061be2d165ae939aa69111c08fbf735ea52d75463d9f44fbaa712900687c73", 0x2f, 0xf6e}, {&(0x7f0000000280)="5383bf0af874e2bea3ef2d4981855b985620b17affee082db68d0e9f0eca6a4042df1d659e4e3b8b11ebe2d0891910eeda1827b4e9e05ec6dae87c33c94d0a12f45ab127ebd0834312987b4d6114074a78ea1313b2c2f873a5cfaeea15478c679172520addd0a5799576234ef0c502c8718f9a987c4ad4335f197c22e55493b9941df4b6e95a3544f6e3785709e7b9329ef3ef41c195579be56460b6b3cf4e0fd0ba83cab5229ab43b9231acd8d6e738f2bcffc9b798c0068470f4cda9ec67e25f619a5e55c35cd93f626a141a1b477771766bc766d419021531d6d7f23bddb0c0", 0xe1, 0x40}, {&(0x7f0000000380)="c220eacd528a43608754986129f5c265fa9ff769ad0c99791c3587a03ae92018ab4fa7ba12fbf0ba12d0b71af9030190ba962de01e916951cd6b53647df98e163fef15bd17270414a707b38df45296d05024b4b2e1e27955509d10f5acd9e4ecf7c8d81c8e2f6dea5816cb06eb36f3dec4a6fab1f4ddeabf75333207e4438cb988572ff926c57d67f16b1f46f3c18fb6350acf162dabe6228fe9073f796dde5fc24d3bf8a70dc3efcbc51ef731b4acfbdc35e02cc9b46530bf0893734db92121f50721b23776faba73fa051a1b587900f546087da5", 0xd5, 0x6}], 0x402, &(0x7f0000000500)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x3}, 0x2c}, {@nobarrier='nobarrier', 0x2c}, {@dioread_lock='dioread_lock', 0x2c}, {@init_itable_val={'init_itable', 0x3d, 0xcd}, 0x2c}, {@abort='abort', 0x2c}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d}, 0x2c}]}) r1 = msgget$private(0x0, 0x2) msgctl$IPC_RMID(r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:23:37 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,cid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xb000000, &(0x7f0000000240)=ANY=[]) 19:23:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:37 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:37 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) fstat(r2, &(0x7f0000000080)) ioctl(r2, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) close(r1) close(r0) 19:23:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:37 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000001440)={0x0, 0x7}, &(0x7f0000001480)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000014c0)={r1, 0x0, 0x4, 0x7}, 0x10) shmget(0x2, 0x2000, 0x8, &(0x7f0000ffc000/0x2000)=nil) mount(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='.\x00', &(0x7f0000000080)='rootfs\x00', 0x0, &(0x7f00000000c0)) r2 = shmget(0x1, 0x3000, 0x68, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_INFO(r2, 0xe, &(0x7f00000000c0)=""/62) r3 = memfd_create(&(0x7f0000001100)='vmnet01vboxnet1^trusted\x00', 0x1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000001340)='/dev/sequencer\x00', 0x2000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001140)={0x0}, &(0x7f0000001180)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r3, 0xc1105518, &(0x7f0000001200)={{0x5, 0x7, 0x6765f0c9, 0x1, 'syz1\x00', 0xffffffffffffff1f}, 0x4, 0x12, 0x7, r4, 0x2, 0x7fffffff, 'syz0\x00', &(0x7f00000011c0)=['trusted/*vmnet0-self#].md5sum\x00', 'rootfs\x00'], 0x25, [], [0x7, 0x200, 0x200, 0x1]}) 19:23:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe4ffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 825.256965] jfs: Unrecognized mount option "cid=" or missing value [ 825.296874] jfs: Unrecognized mount option "cid=" or missing value 19:23:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x5000000, &(0x7f0000000240)=ANY=[]) 19:23:37 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,oid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:37 executing program 5: r0 = socket$inet6(0xa, 0x1000808, 0xffffffffffffffff) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") syz_emit_ethernet(0x42, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [{[], {0x8100, 0x7, 0xb0, 0x6}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x12, 0x8, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x70, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000040)={0x0, 0x1, [0x0, 0x2ef]}) 19:23:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:37 executing program 5: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1dbd}, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000000100)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) shutdown(r0, 0x1) 19:23:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xb, &(0x7f0000000240)=ANY=[]) [ 825.396462] jfs: Unrecognized mount option "oid=" or missing value [ 825.424095] jfs: Unrecognized mount option "oid=" or missing value [ 826.186323] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 826.457971] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:23:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x8cffffff00000000, &(0x7f0000000240)=ANY=[]) 19:23:38 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,0id=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:38 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4d000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:38 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:38 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x509440, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000040)="8e555520c1e6b0b7426e76a98008b0006ad30778ab3c4c8af6ed486026ad86", 0x1f) r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) 19:23:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:38 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x10800) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)={{0x3, 0x1}, {0x1}, 0x0, 0x1}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x200100, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r2 = getpid() fcntl$setownex(r0, 0xf, &(0x7f00000003c0)={0x3, r2}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x6}}, 0xfff, 0x8001, 0x29f1, 0x8, 0x41}, &(0x7f0000000500)=0x98) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000540)={r4, 0x7, 0x8}, 0x8) mbind(&(0x7f0000a4e000/0x4000)=nil, 0x4000, 0x8000, &(0x7f00000002c0), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000580)=ANY=[@ANYBLOB="0a010000200007000300626fe71faaaf9f5e829991761b472149ff0354000bceb65f5b920101fe0005006b0bed3fb817faf7914738c485c59164bc3e50c5b67c0f42a1d32f795bb7acd0700f5799f42e037efb5a8ab2b1dd4dbef122"], &(0x7f0000000380)=0x18) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) sendto$inet(r5, &(0x7f0000000080)="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", 0xfd, 0x4000, &(0x7f0000000280)={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:23:38 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3c}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x700000000000000, &(0x7f0000000240)=ANY=[]) 19:23:38 executing program 5: getrusage(0x0, &(0x7f00000002c0)) r0 = socket$inet6(0xa, 0x3, 0x0) sendfile(r0, r0, &(0x7f0000000180), 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) dup2(r0, r0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) clock_adjtime(0x0, &(0x7f0000001a40)={0x1f}) write$binfmt_misc(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="73713a31c6f7c23dcee3b1365af428e90977a1cdb0e1e14699d32814b5cd81d9599d53ba79d2a3cdfdfc3decdb2a4a71069c04944543c87ebd651a51310499e95a92b44f6fdde0e7196de217ea5f6884396e8436b78bb680e6e7c2a76dc18405e2410b22fa7b5176fcdac43cd2816709a7b217be0b5f4c46d4f3e4e66c13b70d0b534d8c8dfaea6be08fd37fd91725b78b7dfe5cba1dfa5c13c7fa9149f9ee050656081ed81be40caabbb142e1fbf8b180d51bf0fc58170479aafb86f6a9ad847650e7c4e02a2eab3d6106a332c12bad4fda7e3f86"], 0xa8) [ 826.748422] jfs: Unrecognized mount option "0id=" or missing value [ 826.780333] jfs: Unrecognized mount option "0id=" or missing value 19:23:38 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,lid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:38 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x9, &(0x7f0000000240)=ANY=[]) [ 826.885829] jfs: Unrecognized mount option "lid=" or missing value 19:23:39 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000540)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000380)={{0x80}, "13701b21bd0a60480000000000039b3fd5cec307e8ef3d13eb790ec9c45abaf90d229db6926c475b78f8b2000000000f0000000000000009fba8f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc5, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000000)={{}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) clock_getres(0x2, &(0x7f0000000440)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000480)={0x36, 0x6, 0x0, {0x5, 0x1, 0xd, 0x0, '/dev/snd/seq\x00'}}, 0x36) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f00000004c0)={{0xda}, {0x8, 0x7}, 0xaeea, 0x5, 0xe753}) write$sndseq(r1, &(0x7f0000000280)=[{0x4, 0x101, 0x6, 0x6, @tick=0xfff, {0xa2c, 0x80000001}, {0x7, 0x1}, @quote={{0x6, 0x4842}, 0x3ff, &(0x7f0000000240)={0x10001, 0xa6, 0xfffffffffffffe00, 0x1ff8, @time={r2, r3+10000000}, {0x4, 0x2}, {0x326, 0x5}, @quote={{0x80000000, 0x1f}, 0x631e, &(0x7f0000000100)={0x5, 0x8, 0x6, 0x5, @time, {0x9, 0x4}, {0x37, 0x8}, @raw8={"aef76f8d0d86cbcf169a59b3"}}}}}}, {0x7ff, 0xfffffffffffffff7, 0x1, 0x3116a1b5, @tick=0x2, {0x100000000, 0x1}, {0xe1b, 0x6}, @note={0x80000000, 0x7, 0x1c38, 0x81, 0x80000001}}, {0x1, 0x1f, 0x6, 0xfff, @time, {0x9, 0xa0}, {0x8001, 0x4}, @addr={0x6, 0x2}}, {0x81, 0x100000001, 0x3f, 0x800, @tick=0x1f, {0xffffffffffff0001, 0x5}, {0x1, 0x9}, @control={0xfedd, 0x35, 0x3f}}, {0x3d433c48, 0x0, 0x7, 0x7fffffff, @time={0x77359400}, {0x3, 0xfffffffffffffbff}, {0xfffffffffffffff9, 0x9}, @time=@tick=0xd71}], 0xf0) 19:23:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7900}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 826.943367] jfs: Unrecognized mount option "lid=" or missing value 19:23:39 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,.id=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x69}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xa704, &(0x7f0000000240)=ANY=[]) [ 827.041984] jfs: Unrecognized mount option ".id=" or missing value [ 827.088513] jfs: Unrecognized mount option ".id=" or missing value 19:23:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6100}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:39 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,\nid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xe000000000000, &(0x7f0000000240)=ANY=[]) 19:23:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:39 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x20) r1 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/28, 0x1c) socket$kcm(0x29, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:23:39 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1810}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:40 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000001a40)={0x28, 0x2, 0x0, {0x2, 0x10eb, 0x8}}, 0x28) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000001980)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000019c0)={0x3, 0x2, 0xceaa, 0x9, r2}, &(0x7f0000001a00)=0x10) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'nodev'}}, 0x2e) socketpair(0x17, 0xa, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$bfs(&(0x7f0000000240)='bfs\x00', &(0x7f0000000280)='./file0\x00', 0x81, 0x6, &(0x7f00000018c0)=[{&(0x7f0000000340)="abf5d6174b43edde8ccc987a8f386cb74d4d63f84702f2a9e6e943e0418b65ba88ebea9dbaa057e904d40159643e724cde7d4844b92b2dee284cc68675b45165ec1c14a0db8c904520ee3b706b4692fbe258de", 0x53, 0x2}, {&(0x7f0000000580)="ed91adb61d2e0f1f8b36c68607246e51e5c69fb8b13bdded103b7b2d96d46a7348d8df066203eb54ec90852de6276fd8fea4126de59218434fda717f7fcbc07eceab1a82f3dc9d18b2106915390172c120de372a086032a9adbc05e89d4d551d87d0abfbe923d69bd051cff5a656c5520d79d0e98ba8c99b2b99074b6ff4c38c9534d54f5b1b8ca36aba69f6979bf470d3511e91140e0ec486bfefea148be08b0950570efbad35f92a778a67ce9a9830efd8b54dc597c72b8e26d4a1dcac70b48024fbb5764f2f2a792380bac0f89d2947c1de6338a182a4d994b4f67ce826", 0xdf, 0x5}, {&(0x7f0000000680)="b6b73f7ff7067be715dc9e188568da1535a2ba7833a927de8117425a55ab7903f9523a072cf2d1ca6dc7415da1f1041db9136f88f33ed5bc0d0be1fc529684f609ed571c300df52b632e25c3b3a82f432d7b3321e97d65996455fbf5f0689e46fee096dd451c", 0x66, 0xff}, {&(0x7f0000000700)="1647bef80f5ce95c75523593550e18b23796e52ab68fea313b4a030c58a503ea0bbb600fd159953372d4e95a4e8625bc656bf8e38cb38ff29464b2bc46d5ffac70f9701d8e5d0e34daa08e5985475c5cf75d8316e67dc7942a321909739759b530161be639cc32b69185448f2129b1d92cf315157d5ee2db72018feb599741ab0438790cfd77854860d70ca29d0bde19caea63eb1d", 0x95, 0x3}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="b39bc8e736d4e4abfb003754e7b6a9bf1ece0437660f890746ecfebafa98054321242da069a2171175f1ebf093568d067899fac1483793f3d49a4f4e12772ca8aa5de0c1bf5d95fec46d417aaf64c5febd09525afd4d590422d565a25633fc0e4026601071fa2070fa13c65114087de9326d45a6a4c150b22c8b5a486703049128c889cb264fb9eb484504c2b7c2300f8b6ba25e5fb7bca1531c97a05880f54666a0ac3dc25c8b9f8c370a08938e8e8e08cfc769dff702a495f4b8a0390d2a344ca1c871deb1261c0e336bc671bda3141ca7", 0xd2, 0x5}], 0x104000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}, [0x9f, 0x73, 0x200, 0x1, 0x9, 0x3f, 0x5, 0x5, 0x481055b4, 0x4, 0x6, 0x5, 0x80d, 0x5, 0x44d]}, &(0x7f00000000c0)=0x100) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000140)={r4, @in={{0x2, 0x4e21, @loopback=0x7f000001}}, 0x0, 0x9, 0x6, 0x5, 0x80}, 0x98) [ 827.910364] jfs: Unrecognized mount option " [ 827.910364] id=" or missing value [ 827.947138] jfs: Unrecognized mount option " [ 827.947138] id=" or missing value 19:23:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x4c000000, &(0x7f0000000240)=ANY=[]) 19:23:40 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,+id=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:40 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xd826, &(0x7f0000000240)=ANY=[]) 19:23:40 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,u\nd=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) [ 828.021764] jfs: Unrecognized mount option "+id=" or missing value [ 828.044349] jfs: Unrecognized mount option "+id=" or missing value 19:23:40 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000001a40)={0x28, 0x2, 0x0, {0x2, 0x10eb, 0x8}}, 0x28) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000001980)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000019c0)={0x3, 0x2, 0xceaa, 0x9, r2}, &(0x7f0000001a00)=0x10) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x2e, 0x6, 0x0, {0x0, 0x0, 0x5, 0x0, 'nodev'}}, 0x2e) socketpair(0x17, 0xa, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$bfs(&(0x7f0000000240)='bfs\x00', &(0x7f0000000280)='./file0\x00', 0x81, 0x6, &(0x7f00000018c0)=[{&(0x7f0000000340)="abf5d6174b43edde8ccc987a8f386cb74d4d63f84702f2a9e6e943e0418b65ba88ebea9dbaa057e904d40159643e724cde7d4844b92b2dee284cc68675b45165ec1c14a0db8c904520ee3b706b4692fbe258de", 0x53, 0x2}, {&(0x7f0000000580)="ed91adb61d2e0f1f8b36c68607246e51e5c69fb8b13bdded103b7b2d96d46a7348d8df066203eb54ec90852de6276fd8fea4126de59218434fda717f7fcbc07eceab1a82f3dc9d18b2106915390172c120de372a086032a9adbc05e89d4d551d87d0abfbe923d69bd051cff5a656c5520d79d0e98ba8c99b2b99074b6ff4c38c9534d54f5b1b8ca36aba69f6979bf470d3511e91140e0ec486bfefea148be08b0950570efbad35f92a778a67ce9a9830efd8b54dc597c72b8e26d4a1dcac70b48024fbb5764f2f2a792380bac0f89d2947c1de6338a182a4d994b4f67ce826", 0xdf, 0x5}, {&(0x7f0000000680)="b6b73f7ff7067be715dc9e188568da1535a2ba7833a927de8117425a55ab7903f9523a072cf2d1ca6dc7415da1f1041db9136f88f33ed5bc0d0be1fc529684f609ed571c300df52b632e25c3b3a82f432d7b3321e97d65996455fbf5f0689e46fee096dd451c", 0x66, 0xff}, {&(0x7f0000000700)="1647bef80f5ce95c75523593550e18b23796e52ab68fea313b4a030c58a503ea0bbb600fd159953372d4e95a4e8625bc656bf8e38cb38ff29464b2bc46d5ffac70f9701d8e5d0e34daa08e5985475c5cf75d8316e67dc7942a321909739759b530161be639cc32b69185448f2129b1d92cf315157d5ee2db72018feb599741ab0438790cfd77854860d70ca29d0bde19caea63eb1d", 0x95, 0x3}, {&(0x7f00000007c0)="edcba69b5595d4880110d35d55eb6622cdb0884d44985c68e198908f7eec15bc0de4dad4e5e4e6bb479f9d0073f5c47454b1843de37d69d741ff5a25addf2da511dfe356b7d4f743e86aa060e938221a8c7aec49295d80a9199848c1c50af5df844337665caf3041e039740fbed5acb7c459000cbeb34457de83462370649ac186781baed1647373d23af10a18c70fb477553185094c0ea7b4fb62dfc2199a44c258f39993a2f8833b3366240f716025318af2ef82a04c9689cf9ec7246edb135079647e8664588f2dc4a283af32778836904442559f53edb7b78b9c275ce84a969d9af99a64d5bcb14116652e4b66c51c818e6c910620c41c76b8e07ce0fbcc7d75ee2a6f2ed8f92772dd2856a865c388f71bfda9504209812b875ec52386fe52bc883e9a093024946fbe65315b9986718e09d6895b3316e5c1c21eba34ee619d9b7363a01c1fec7c1b930f1b29c75340c10287a01d8baf826861a6dcd14effb8a4ff55233f93236391cbf1e9a38b0d21de99e3df5fa9827be86567e1894374f821fbf110dc6c57c7667685f92c71a5a283cab132c86d60cbee6affff442b3eda3a09d9b44c7a8adbd6e5df445c7def3fb8495b38d9a0d91a1878831d5656cb9490928805c95f44a6e5b9fb3d77a36e685e9216b61c4a8246bcafd4bef93684e1db942f4d10ff62bf104dbe0efc4642991dc3575f065cb84964d108f992fe230cf1813add8a763d537a85edbb1c6e5552c4d14b22ccb2efdfa539725289c16e371f51d12dc06c29434d5e3df04a68151f7b6e626b8d1f45a1f2529ad833eb85e008cfb4dbc1d440145c460b7e924190fea9798d2d8b7f0b09b48627e8fe26b51fe65c581d75a58cbf56c6b79242f31caf41f144ed7fa774bbf4214addff5f98f1fcb37ec7c61af02118e8d95ca5fd97257d5fde6f7ab3ae56228c246426d2838586d981862a0b56cb6b4f5438225eb7b8c783333735f593222398aaea3a3b0233761ea50a681b81128e283758c90d1a25949d513b4a213dc8ed082a5fd7382ae7840c647a29901cbc37c7c79bceaeadd912609d7c5cb8b45d21f00fd8a941099b8cb756f9578a97ebaf88e07a59b730aefee103db2a21ff0cf242a95c9730beceb64258b07a5cdfb38228e8a4ca11f7fe7c61a77081ad23e0ceea869ad995feb3b97509c6404ad087b85880e53ff807066e7561bafb86f1b7cc3cc2eb795ebe05edd3e8bb0685a77de7ddddd04dc2aead3be406a85f7e27b847b58cda184146d938808c4e1da33be3795a52a57785d027fbd33cdafbdcffb1e437a20d4a069b3298e100fb8e6630caea31a84d2b7a1245880e7a9f12d98ebe2d122b268621175cb81ca772ca585925ed14814e75485de1cc59fe05b3eb966978f50ac19c3d063c2086ad2da8a2e9a43e720156d17cdbadb2363f2ce88a5b0a2736c60cc70c88e8e2ec15eaf6e6938a4300356c569881c1e5e8ef309a31a4b06433a536d0254cc04086e6cd3a6ec7e5c6ed7f21ff06991d61ccf875fafca29b6256e6e2db4ef3d293abafb86fe36c342d8df883e11b2e1c7711d40f23f8933558c05213e46204f888a852eb3138d96c3cbaf8df5aceb182d738f6b56df5644cb7592f6691bbf9cefe0c12c61589c1751685a5d6422e60c2479aeb1a6d63452e3513338590fd65d9f7afaefeae3bf05bf8f0b5344eda0545ac250e8c7a9a70e550121aa774e099f9a2e02bef449e98e485e4a46e19a3d1594dfd0a27193e134e4738f281ae0e3a59944a21c41fa40caf525152afbf3362839bfff528e157f90b3062d628295402628633bd69383e55c6597c6ee96b7ec5506b15234ae08909b623eeeb70a859cbf8e08af2574b1c4333d99c8c6f44eb4be05d92c231ee7737b4eef04c56592aed1d29c547210516b9da622af2b4908828063330270c7024418d253d65a1c4eab7bbd3cd0b2b99bbe443be383baccb141003da8b837c0c3044cbaee6168f10199d67c42fe970124ca8e774a0fefa7888ba7530a57c937338698f5f9c1f7e6c41e21a3750612b643eebfd86b6f9727e9704d34e5869a984a0f3bd98bbdc2f930ce0f21995e01411221757c22ee26769238dd4dea8898b6d6b56e09911bfbdaf607c09dada4b28cb55228da99add69077e35352dd1241ca11f56f1e6f45e9cb65a66fb649cfb848e1121e43dd9b001a33b998a7000d3cf42c6fd82d985a2f50a83da7e6c1388eda33aaff6cba53c60b8053a9752de90a642e186bb29e35e28ac4a276c660bbf6ad3d71c7526ef471dd335d79f5469f230ab6021e0102937b9c119710bf2481b1df204af848e5aa9bc3a46ac9ca3c3fda55d3e6c4876646f0cd217d45189c159beebd4160ab82d071695a936ff34bda4e36cb5e80b3d5b82d9496c5b4d20df5dec76df6d971c5820019a9a5e592c0c5f8424f87443bed8c9ded483908c7ca0449be15e0c2f78909b37fd458fb72b0f4b4e0a766ecfb0f294742362f18ce1f16f9e142fe16d653fe802ec1023c3a3c5f4b98c108357a1dc206e676d582de4dbcfd358927b4ee29b29ad77bca012217329751efef772f6578025e23c353b6b9cef186ddbaa83667df4bc98dcdc287b763aa12cb689f62fbd26ea6ff25fcfe273a3af4b4f91d80d7b931d5b0fcec36c5b33a1c1cde34dd8fd187072d5975ed312d22a6f01277b5c7f12a2388669dc211692fba7fbbad27379ca5115063e8c27961b49c2a07145e502d3b3f81df732e44cf24736228904fb0584614082c660c57cdea9fa258f4a362f10136271728e7e47ebce10b86d92d482fae5ec515632273737f940083b327cfa8595f2e5866a18001d51cb2629ba168e1fab509bac53e6147f5d9ab35de36faeec0dfdddd821325d84e2d67ebf400a84be5444ce2b5b1304f158f8770e090e9b4e9e066b41a6854e8454734b4f130abecabdb958afb9a702883b973655b9a0d9beea48701113e4f4275d84c4bb4494263ba41c15e5b602c79e05f64e4432900c272d69a5288ca0079044cfa14177cc6b184978c10a326067e0c1b3e2b1202689ffbbac0b60075fa6e115f06d830001fe741d251304d6f0a904363656f28677b0d983574f9e906ab73c5e2a485c9b29432b7ffe1f895e3da4b6c61f5298b0f44223579618221bc9b7ac8a0a1c06a0746de9d12cd37d64d79a65ded2bf3cfbec7e3e342b98edf9f525dd9438ac50b296ec0657acc737102b71be0925e231e2e81ea5b554879be1108bf8eb1283be9b3ff2873579582bf801904afbc24415dc982a8659efa2275767738915506cbbcce2d879232197f7bd47cae966b27f7bc8a4a5f5c802480fdac8f25092b1060506ac354de24d39fcf20453933c8d653220847d2827b540d8897cf7802b167aa6e50fb07b8e9ac1d20d6770dbe9d64af02313f618900618d42ca689dcfec0aa54a777a7aee1f8e147cca34fbf4ff09bf0ea7ef5bb0df9023b804c2a4b30ecbf4c21439d9a4876b61e80040e6787adbb206917bc60868fcce3f5b971457893039f71ad0cb2952d2d77f62d9ce21b8c3297621f8710225896b09e7a6a960cda8d91b074b7cf533a6924158f106e9f35aaf236b569a0fe74a4f91c5c1eb9f42cafe62ce76c7fe6381be8605def35f211a2cef5cb4f05eaa7ebe7aa40ed5e5ab330d6e95e920f72ab45d44e8e9f6dc91d8c9e38c6676d6b09a8020fbe651bb58cdc3a9257c4504664af9cf6ef4750eb450fea74b498434ac0255b2f50893669bb4ca53ca543d16df5e09bec8e6d4f79a22483b5805e4f81f9db68585becc44e35265dfae1deb4d2e8b5d17b2e2ec474351663f5803692f6520af42cc0cbad4313ace08510b99ad722dfb93e47eb30427f30f2dd2e6bca04ed9e43bf8895523629ef33edd52f06d8489aff445c9a33f85a4423c6fbacc85ea18e34d79d0fb1d3880f33996194a435355d6ca0487ea0cc62cc1309604e3b27a3d8fa8fcccc6e99e792451b79e0e99e1efe0237c013e4d847c45fda6e0ac416ff5b36b1180a7a3f0f17434263b42132bd2450bf44a5cb311af02bc3679dc63a0a993fca736b34a5766e3e3424cdbf193241b92e807d6e4197bdbe22b0fc79a4cd0090ad81e733636e04aa29673ccebca3eb1e5cbf9a85f9aed0283d672b9cc10f1d3802601782a0e55df0668df9817119f199b022455277ceb0ee029fd7a7b61bf88f9a6e7ec1767b3a1c102ace19df304ffdf97f53083aa846cd640239e14f18fb683536c81746bc2616018ea9f965c6c0abab2f637e2980191247e4eec00cf11dc6a5cd3999f3a2afec9b6ea98ec13fe95ad8265c5ea26e79fab18f1ca29e3871ddb9ca93af8d8cafee57a6fa97b1dec259ff9d33541c5507fc5cd8da67786a01f4bca8058b78dce7360ce720a0f2437751644efb250672a67a62c973d679c86dc3cb29dab1a5beaca0a07a37f101a42faecedae20b695068a4f49ec5cb34bd2c5d154c3a729af07de9a58f30e3b2bfb561ee9db6da44053cfa76796c2676a88b955e491ef5392984ba87cf769d4706e46bc7a1cee1a02d8496b7cefa648b191b0058153efade53084346c6ef1d0b65b8ee7fe2be6a078565afd1a86d18d9048c7e4d83b6bdc3864d8272a8d3a6d630b3e8f6a38641b96a40db965fdd2bf3412f180797f4b1b34fde13f42598c0a8c1c398f4d492aece0906a46dd200a0e1cb34151ba4d39f724f4ffe0b6b29f4c57df1b025a5fad62ebe7e8d1dc271ff854f2182e195f06a7d0c88f5d18cdeb3af1269455156dbfee6bc00ad31b9af7f4180784eee73ffceae16a540dcf76da90cd6350d0b4ac9a61472d1b500eeb55f95d99fbf7a9b497bf2fc95841dd48763ea32c0631d293112b95f4f5858b05346e20df66779f918f6e95c487f5d2b9a9fe39af94ada04154f102a5547222495b1a8e045aedf33d574570e6cb9ba848d1497ccd24981d5847f929c112af3434094eb0bf66670671521d80b308e160d772abbc422e83ee808af6b94af8be99e4495b6f368b5480e252627175ba6688fe14e44e4dadf3b4cea6c80643ee0b2cccc4edca0515d077396092a082516cf3bebe0d130c82e946eac0d48b81cb300444c780cc0e627e6edbc419255d4801bc6bbd6c645fbcdb1451319ea971fcfd9bf4ceba4cdd80f138befcfa095a99c1cdb4870be2adb51744ad1a23d271057cff99a0ce17db4eed89ff95633c461285cfb85673d57339f5daeef66d0faf8f25cf83bffceec277c0c23b4a9efa1955c3f79504589595e5bb5751f1f6990d6ab48d0011467515ec473b4b5ba0dbdcaf5c25a159756d78f1489c13e3fc4c0b260577f50c1d1c32ae896bb481e701086b7b92426f253a06ce50327415a271505a6088334edd3465a81325cdd42d9f04f365a603b8c9b9a5f2f5716efc654abad127462f46c6860e533f57947c8c088a785a7a2e9d8b4958fd03fc5dd9d8e8fb7f6bf3c53c4e45dae16b14b2c7094963b8f5bd4eb23a9c0a8ddca6c2f76abd2306ae0f9f2ae18f55e0264a6f7c769c9aa14f57180f4ac6766cde4a63abdd9a73a166e1d7c293cf340f6f548ea44f28c251bc3f8ee5f89d32dd994d3762814b1517eebcdfb0ab75fd915344d186d7259efc97e3babeb12383279d2e8219b66ef4ec715eef891c602a84cceb543cd350ed0b3a3b67a0eeb9d5f6a0e3d5bca2ddf72cbe378b9ab71f69609b0d33d303c5a44d035dee33af492274812c7ce017ebf68de670d6a09ff4a08e6de1b1e2bb76f9463d1a2221888cc91358547abee6c2e37725bf012e36de1493f632d8b47d4c064689701768b393baa66", 0x1000}, {&(0x7f00000017c0)="b39bc8e736d4e4abfb003754e7b6a9bf1ece0437660f890746ecfebafa98054321242da069a2171175f1ebf093568d067899fac1483793f3d49a4f4e12772ca8aa5de0c1bf5d95fec46d417aaf64c5febd09525afd4d590422d565a25633fc0e4026601071fa2070fa13c65114087de9326d45a6a4c150b22c8b5a486703049128c889cb264fb9eb484504c2b7c2300f8b6ba25e5fb7bca1531c97a05880f54666a0ac3dc25c8b9f8c370a08938e8e8e08cfc769dff702a495f4b8a0390d2a344ca1c871deb1261c0e336bc671bda3141ca7", 0xd2, 0x5}], 0x104000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}, [0x9f, 0x73, 0x200, 0x1, 0x9, 0x3f, 0x5, 0x5, 0x481055b4, 0x4, 0x6, 0x5, 0x80d, 0x5, 0x44d]}, &(0x7f00000000c0)=0x100) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000140)={r4, @in={{0x2, 0x4e21, @loopback=0x7f000001}}, 0x0, 0x9, 0x6, 0x5, 0x80}, 0x98) 19:23:40 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x61000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:40 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe4ffffff}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x26d9, &(0x7f0000000240)=ANY=[]) [ 828.135172] jfs: Unrecognized mount option "u [ 828.135172] d=" or missing value [ 828.168177] jfs: Unrecognized mount option "u [ 828.168177] d=" or missing value 19:23:40 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000002000)}) r2 = dup2(r1, r0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x50, 0x0, &(0x7f0000000100)=[@enter_looper={0x630c}, @reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)}}}], 0x48, 0x0, &(0x7f0000000280)="df0e7f8db1d86acef7b098275cbb4bb24860bfe2de3d6972ddc5f44dda657937f0cfef51fc935fca921bb355b078839b88a07b921e8c30edcbeedf377732999549572c014c078c37"}) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x8, 0x0, &(0x7f0000000180)=[@acquire={0x400c630e}], 0x0, 0x0, &(0x7f0000000300)}) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000380)={0xfd, 0x0, [0x1000, 0xfffffffffffffff8, 0x4000000002, 0x7]}) [ 828.255124] binder: 24911:24912 got reply transaction with no transaction stack [ 828.263128] binder: 24911:24912 transaction failed 29201/-71, size 0-0 line 2759 [ 828.273733] binder: 24911:24912 ioctl 4068aea3 20000380 returned -22 [ 828.285363] binder: 24911:24916 got reply transaction with no transaction stack [ 828.293110] binder: 24911:24916 transaction failed 29201/-71, size 0-0 line 2759 [ 828.311322] binder: 24911:24912 ioctl 4068aea3 20000380 returned -22 19:23:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:41 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x300}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:41 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,u%d=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xfffffdfc, &(0x7f0000000240)=ANY=[]) 19:23:41 executing program 5: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000002000)=[{{&(0x7f0000000080)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}, {{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0xe, &(0x7f0000000280), 0x0, &(0x7f0000000540), 0x32a}}], 0x2, 0x0) 19:23:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:41 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x1, &(0x7f0000000740)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB="2ced61785f726561643d3078303030303030303030303030303030332c616c6c6f775f6f746865722c6d61785f726561643d3078303030303030303030303030303037662c626c6b736d7a653d3078303030303030303030303030303230302c005c6f90b1c644d1f7846f00f5f15abb6215c45b52f0bb03839920abe11848cbd764ef3cd1"]) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) r3 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x111900) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0x1) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000380)=[0x400, 0xf0b0]) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) prctl$seccomp(0x16, 0x2, &(0x7f00000002c0)={0x2, &(0x7f0000000280)=[{0xffffffff, 0x8, 0x8, 0x3}, {0x718e, 0x5, 0xfa43, 0x2}]}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:41 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000280)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'trusted.', '/dev/vcs\x00'}, &(0x7f0000000100)=""/25, 0x19) signalfd(r0, &(0x7f0000000140)={0x7fff}, 0x8) 19:23:41 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9fffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:41 executing program 5: r0 = socket(0x5, 0x2, 0x7) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}, {0x306, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x0, {0x2, 0x4e23}, 'syzkaller1\x00'}) r1 = request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000001c0)='syzkaller1\x00', 0xfffffffffffffff9) r2 = add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)="76ac3508f153162952caf17a29f7d8d47d386e1a45a5667e601238c97451ad06e7190dc0f4cb6902c0c7d56c974c99e786b5a4fb93228aa866a4b1ee737b68eb41df2f430d717ca5b36ef538369f7e1fed2506581ad5c1fd114cfab4adb5a9e9f1f41a8e1b2a182eea5ccb3c64ee4a2c30bb38b5134c55c654484ed4ae6ee8b08b4805e045c83c79760d86dff96755d17b8cf9a79ba3458f27747855856ce1a0ccd1fcebbbb5e1584d42c23a0a95bebc2acd3f711f89ae91724d519a4183c44982681413a9d3123e8fe2879702c316db329e99a3d34e92e7385c7e", 0xdb, 0xfffffffffffffffa) keyctl$unlink(0x9, r1, r2) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) ptrace$peekuser(0x3, r4, 0xf0d) bind$inet6(r3, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000180), 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}}, &(0x7f00000002c0)) 19:23:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xfffffff0, &(0x7f0000000240)=ANY=[]) 19:23:41 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,ui/=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) [ 829.402568] jfs: Unrecognized mount option "u%d=" or missing value [ 829.432470] jfs: Unrecognized mount option "u%d=" or missing value 19:23:41 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000280)="0000000000004000000000787d4ad3e9aa17fc79aff62b45fa22a9cd1d5a36793b946c55cc62f49a3d460c80febb9497ec0349c3ad76a025ba9446f3000796dd58b64668e32a80dc775b682e202de312c014cfafeb4c800829a17064389d33d9e70c8e716a3df78befb26ea966e233696a2bc16efec3136bfb4e90e041453d025f0660d6555c9cf718c80fa7c80d50796d597ba07fc018") clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f00000000c0)) clone(0x0, &(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) 19:23:41 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3200000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x18, &(0x7f0000000240)=ANY=[]) [ 829.510659] jfs: Unrecognized mount option "ui/=" or missing value 19:23:41 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uiX=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) [ 829.559737] jfs: Unrecognized mount option "ui/=" or missing value [ 829.650761] jfs: Unrecognized mount option "uiX=" or missing value [ 829.684272] jfs: Unrecognized mount option "uiX=" or missing value 19:23:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:42 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4d00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xaa04000000000000, &(0x7f0000000240)=ANY=[]) 19:23:42 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,ui\n=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:42 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 830.291793] jfs: Unrecognized mount option "ui [ 830.291793] =" or missing value [ 830.360944] jfs: Unrecognized mount option "ui [ 830.360944] =" or missing value 19:23:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1400000000000000, &(0x7f0000000240)=ANY=[]) 19:23:43 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000080)={0x0, 0xffffffff7fffffff, 0x20, 0x6, 0x8cb}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000100)={r2, 0x8001, 0x30, 0x5, 0x7fffffff}, &(0x7f0000000140)=0x18) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:23:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:43 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',g$2roup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:43 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,ui%=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xd926, &(0x7f0000000240)=ANY=[]) 19:23:43 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x8000, 0x2000) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xfff, 0x4600) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000240)=0xb7, 0x4) fanotify_init(0x57, 0x0) 19:23:43 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x3, 0x3090c0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}, 0x3}}, 0xffffffffffffff7f, 0x6}, &(0x7f0000000340)=0x90) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000780)={r2, @in={{0x2, 0x4e24, @multicast1=0xe0000001}}, [0x9, 0xaa, 0x8000, 0x3f, 0x2, 0x8, 0x8, 0x9, 0x837b, 0x100000000, 0x9, 0x3, 0xc87, 0x6dd9]}, &(0x7f0000000380)=0x100) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="cbfa8e92bf23dc44c2dd3618e6f0f9adf5cf5f7531b4a1ca8cb63c03671515199cbd4013d8deabc1b897d3e85537370ab3afd9734c29c361c58f118c84179289d8163fef486593e3f604588d82e38db047e1dd84d202ed5e71df7ea6703a23f9c28e9fd8a822d1b7ef1103649587cd9b44b0f23b958ea7972007b136cb7935f86cc72782e6ba3c503e86399dbf6f6e316998e8db50c9664d44ac054957b30bfd68622a3380831cb2298dbe99dac927dc483ac49402132afdebe307ac82cc6c7efa56fb0169008000000000f8f5afed516be5b4e8d62b57d0035e9c0af45ca30c000000000000000000", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="6103b9f1f6959bce1e326d0c64584cf714142161bb99ac88b2730221c600923cc3ff6518b4cba24c06062cc58a2e22ef9c3ed35f127659d1b3a2bd23a6f7a7812dcf"]) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:43 executing program 5: r0 = inotify_init1(0x0) r1 = gettid() ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000140)) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x0, r1}) r2 = fcntl$getown(r0, 0x9) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) write$FUSE_IOCTL(r3, &(0x7f0000000080)={0x20, 0x0, 0x1, {0x0, 0x0, 0x2, 0xa}}, 0x20) kcmp$KCMP_EPOLL_TFD(r2, r1, 0x7, r0, &(0x7f0000000040)={r3}) [ 831.097177] jfs: Unrecognized mount option "ui%=" or missing value 19:23:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 831.141914] jfs: Unrecognized mount option "ui%=" or missing value 19:23:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:43 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,ui.=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:43 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") msync(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x6) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000008000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000080)="c7442400502e9b36c744240299000000c7442406000000000f01142466b8ec000f00d0c401785d63468fa978cb418066430f150e66b877000f00d8400f185700f32e0f070f01cf430f84d37b43bc", 0x4e}], 0x1, 0x0, &(0x7f0000000140), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="640fbe0af0f75100ba420066ed360faa66b9800000c00f326635000800000f308221990fc71e27000f216d260f2134baf80c66b82735ea8166efbafc0cb06cee", 0x40}], 0x1, 0x24, &(0x7f00000002c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x10004, 0x0, 0x0, 0x1000, &(0x7f0000008000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 19:23:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1900, &(0x7f0000000240)=ANY=[]) [ 831.485312] jfs: Unrecognized mount option "ui.=" or missing value [ 831.509586] jfs: Unrecognized mount option "ui.=" or missing value 19:23:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85ffffff}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:44 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000080)=""/28, 0xfffffffffffffd36) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:23:44 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uidF', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x3f00, &(0x7f0000000240)=ANY=[]) 19:23:44 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x28409, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) 19:23:44 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1018}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:44 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000002c0)={0x28, 0x2, 0x0, {0x3, 0x3ff, 0x10001}}, 0x28) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000240)={'mangle\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f64657665653100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f7570150000000073f1ea03af245d752d310d5a09a3221a8451c0011a339036b6fc3744ceb9a432c67898701037ae223a06f57518d4779ec2f5ce528a9abd9c19050d229638629dce9751935889bc58b4ff180b73b2336529"], 0x90) 19:23:44 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2000, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bond\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x4}}) close(r3) close(r1) [ 832.447653] jfs: Unrecognized mount option "uidF" or missing value 19:23:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x8100, &(0x7f0000000240)=ANY=[]) 19:23:44 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 832.493111] jfs: Unrecognized mount option "uidF" or missing value 19:23:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:44 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid\n', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:44 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1e00, &(0x7f0000000240)=ANY=[]) 19:23:44 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7100}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 832.653808] jfs: Unrecognized mount option "uid [ 832.653808] " or missing value [ 832.715611] jfs: Unrecognized mount option "uid [ 832.715611] " or missing value 19:23:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xc00, &(0x7f0000000240)=ANY=[]) 19:23:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1810000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:45 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid%', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:45 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x101041, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000100)=@get={0x1, &(0x7f00000000c0)=""/20, 0x2}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:23:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x26da, &(0x7f0000000240)=ANY=[]) 19:23:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 833.085543] jfs: Unrecognized mount option "uid%" or missing value [ 833.119778] jfs: Unrecognized mount option "uid%" or missing value 19:23:45 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="46696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1500000000000000, &(0x7f0000000240)=ANY=[]) 19:23:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7900000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:45 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid\n', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) [ 833.455363] jfs: Unrecognized mount option "uid=Fiocharset=mCÿ ké " or missing value [ 833.480554] jfs: Unrecognized mount option "uid [ 833.480554] " or missing value [ 833.527437] jfs: Unrecognized mount option "uid=Fiocharset=mCÿ ké " or missing value 19:23:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:45 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001900)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d855ff34e5b6f03fc5ea14c0adfd9522e65", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x2, 0x800) ioctl$KVM_NMI(r1, 0xae9a) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="665fc08c7c3f77e1326c3b00503d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) syz_mount_image$jfs(&(0x7f0000000280)='jfs\x00', &(0x7f00000002c0)='./file0/file0\x00', 0xc43, 0x5, &(0x7f00000017c0)=[{&(0x7f0000000340)="d353422f3c377ebc3744cd8a304a46652f7cd739a9339159adf712ed5b13ab2847a4b53eeb5960c7030ab375", 0x2c, 0x84}, {&(0x7f0000000640)="e94cfb6d48988fcf5d24030db0397dd061fc673cbf0ee35b4685115009274c0dfa70d40fbb48212395d00ed71ef260c544110495ec06966ac6ef83354599301872b64abfd0411e769ea45222c8910a13719a4a4adb5ccc3bcc1571a222327b650d15a08b7caf85418536e6bac47496110ef696ec6c8a0c9b833b34990641b27742855271f5bd8b952839b5abf853fe03", 0x90, 0x1}, {&(0x7f0000000700)="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", 0x1000, 0x6}, {&(0x7f0000000380)="faeccdc66a762cc861f901140429989f6082b16f721f152f76836f25ecdd6f8c52674483fb6c3859eec417b35a9d65f404e6f01c3fa513e858e4da9ebb0a1f6383dd0fd8edbaa139f2afa1ffbc92b2d9aaf8e9bac803f835d8a8bd8ed4182b6b28126e5b63c0fc72a0476b9f0e1386343de4c18fdc2a954a8f6d", 0x7a, 0x8}, {&(0x7f0000001700)="fdf3f9ccd8199752f36b1e912d4f62f45c1822ed3c119d8131e18fe37854c7c2b762c673cea9f106f39602d6d692e3fca19078991171edbfd2a890e71e86c5cd9e9e6325c763ce773d9044d80d791115593e802a7dabca55ca2687ff1e6f5803be544f7e875c2b6850aaeb9097b497079f59a7537dee0a4d0e0182daebc3de2bb4d03252a40cb08c571308a00c69db634432d465e44316c37eb1b93e472b9d2b4bc429d9", 0xa4, 0x8}], 0x2, &(0x7f0000001840)={[{@usrquota='usrquota', 0x2c}]}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) pipe2$9p(&(0x7f0000000240), 0x800) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x4c00000000000000, &(0x7f0000000240)=ANY=[]) 19:23:45 executing program 5: r0 = socket$inet(0x10, 0x8080e, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001300ff09fffefd956fa283b724a6008003000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 19:23:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x73}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:46 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c256f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:46 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000003000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x100) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000240)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x4, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'bond0\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000100)={0x0, 0x8001}) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x100000001, 0x10000) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 834.005185] jfs: Unrecognized mount option "uid=" or missing value [ 834.037804] jfs: Unrecognized mount option "uid=" or missing value [ 834.055180] kvm: pic: level sensitive irq not supported [ 834.055990] kvm: pic: single mode not supported [ 834.062409] kvm: pic: single mode not supported [ 834.067406] kvm: pic: level sensitive irq not supported [ 834.074405] kvm: pic: level sensitive irq not supported [ 834.080815] kvm: pic: single mode not supported [ 834.086316] kvm: pic: level sensitive irq not supported [ 834.097246] kvm: pic: level sensitive irq not supported [ 834.103888] kvm: pic: level sensitive irq not supported [ 834.112181] kvm: pic: level sensitive irq not supported [ 834.127047] kvm: pic: level sensitive irq not supported [ 834.140118] kvm: pic: single mode not supported [ 834.145619] kvm: pic: level sensitive irq not supported [ 834.151324] kvm: pic: level sensitive irq not supported [ 834.159563] kvm: pic: single mode not supported [ 834.167896] kvm: pic: single mode not supported [ 834.173713] kvm: pic: single mode not supported [ 834.180216] kvm: pic: single mode not supported [ 834.213325] kvm: pic: single mode not supported 19:23:46 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000100)={0x81f2, 0xfffffffffffffffa, 0x8, 0x400, 0x9}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:23:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xf6ffffff00000000, &(0x7f0000000240)=ANY=[]) 19:23:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:46 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c0a6f636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x4) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x9, 0x8}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000080)={r4, 0x9, 0xec, 0x6}, 0x10) writev(r2, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84470080ffe0064e238941000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 19:23:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6900}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 834.218801] kvm: pic: single mode not supported [ 834.612459] jfs: Unrecognized mount option "uid=" or missing value [ 834.679183] jfs: Unrecognized mount option "uid=" or missing value 19:23:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000180)=0x60) connect$nfc_llcp(r3, &(0x7f00000001c0)={0x27, 0x0, 0x1, 0x5, 0x2b, 0xd8, "ddec9cac80130404c73c33ec28e0048ff13be1adb2334ee0acc2741bcdbafc6a857ed057f58f0c287ac07f06560f5bd01f87faeb725cc1fe39841b18a1ecf8", 0x17}, 0x60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_X86_SET_MCE(r2, 0x4008ae89, &(0x7f0000000140)={0x2, 0x48, 0x1}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x8000000, 0x10001, 0x3, 0x7, 0x9}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:23:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x12, &(0x7f0000000240)=ANY=[]) 19:23:47 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c690a636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x79}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 835.034564] unchecked MSR access error: RDMSR from 0x48 at rIP: 0xffffffff811f5d11 (vmx_vcpu_run+0x1f91/0x2600) [ 835.041419] jfs: Unrecognized mount option "uid=" or missing value [ 835.044930] Call Trace: [ 835.044962] ? lock_acquire+0x1e4/0x540 [ 835.044981] ? vcpu_enter_guest+0x9d2/0x6090 [ 835.045000] ? vmx_save_host_state+0xa60/0xa60 [ 835.067072] ? lock_release+0xa30/0xa30 [ 835.071059] ? kvm_mmu_sync_roots+0x204/0x320 [ 835.075657] ? hardware_disable+0x530/0x530 [ 835.079986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 835.085521] ? vmx_save_host_state+0x66/0xa60 [ 835.090015] ? __vmx_complete_interrupts+0x103/0x3e0 [ 835.095133] ? vcpu_enter_guest+0xe8d/0x6090 [ 835.099543] ? kasan_check_write+0x14/0x20 [ 835.104141] ? __mutex_lock+0x6c4/0x1680 [ 835.108199] ? kvm_set_msr_common+0x26a0/0x26a0 [ 835.112862] ? vmx_vcpu_load+0xadf/0xff0 [ 835.116943] ? __account_cfs_rq_runtime+0x770/0x770 [ 835.121957] ? vmx_vcpu_reset+0x1040/0x1040 [ 835.126288] ? set_next_entity+0x2dd/0xb00 [ 835.130532] ? trace_hardirqs_on+0x10/0x10 [ 835.134871] ? update_load_avg+0x27d0/0x27d0 [ 835.139287] ? kvm_check_async_pf_completion+0x3a7/0x5c0 [ 835.144734] ? kvm_clear_async_pf_completion_queue+0x790/0x790 [ 835.150724] ? kvm_arch_dev_ioctl+0x610/0x610 [ 835.156434] ? preempt_notifier_dec+0x20/0x20 [ 835.160939] kvm_arch_vcpu_ioctl_run+0x33e/0x1690 [ 835.165773] ? kvm_arch_vcpu_ioctl_run+0x33e/0x1690 [ 835.170784] kvm_vcpu_ioctl+0x7b8/0x1300 [ 835.174861] ? kvm_uevent_notify_change.part.32+0x440/0x440 [ 835.180568] ? trace_hardirqs_on+0xd/0x10 [ 835.184711] ? _raw_spin_unlock_irq+0x27/0x70 [ 835.189284] ? finish_task_switch+0x1d3/0x870 [ 835.193866] ? lock_acquire+0x1e4/0x540 [ 835.197928] ? __fget+0x4ac/0x740 [ 835.201376] ? lock_downgrade+0x8f0/0x8f0 [ 835.205525] ? lock_release+0xa30/0xa30 [ 835.209492] ? __schedule+0x884/0x1ea0 [ 835.213383] ? __fget+0x4d5/0x740 [ 835.216835] ? ksys_dup3+0x690/0x690 [ 835.220555] ? lock_release+0xa30/0xa30 [ 835.224609] ? lock_release+0xa30/0xa30 [ 835.228575] ? mem_cgroup_from_task+0xcb/0x1f0 [ 835.233151] ? kvm_uevent_notify_change.part.32+0x440/0x440 [ 835.238867] do_vfs_ioctl+0x1de/0x1720 [ 835.242753] ? ioctl_preallocate+0x300/0x300 [ 835.247385] ? __fget_light+0x2f7/0x440 [ 835.251703] ? __schedule+0x1ea0/0x1ea0 [ 835.255697] ? fget_raw+0x20/0x20 [ 835.259421] ? __x64_sys_futex+0x47f/0x6a0 [ 835.263656] ? security_file_ioctl+0x94/0xc0 [ 835.268251] ksys_ioctl+0xa9/0xd0 [ 835.271710] __x64_sys_ioctl+0x73/0xb0 [ 835.275610] do_syscall_64+0x1b9/0x820 [ 835.279500] ? finish_task_switch+0x1d3/0x870 [ 835.283993] ? syscall_return_slowpath+0x5e0/0x5e0 [ 835.288923] ? syscall_return_slowpath+0x31d/0x5e0 [ 835.293940] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 835.298958] ? prepare_exit_to_usermode+0x291/0x3b0 [ 835.304008] ? perf_trace_sys_enter+0xb10/0xb10 [ 835.308692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 835.313545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 835.318876] RIP: 0033:0x455ab9 19:23:47 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x40000, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) futimesat(r1, &(0x7f0000000240)='./file1\x00', &(0x7f0000000340)={{r2, r3/1000+10000}, {r4, r5/1000+10000}}) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) [ 835.322074] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 835.341368] RSP: 002b:00007f13ce688c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 835.349098] RAX: ffffffffffffffda RBX: 00007f13ce6896d4 RCX: 0000000000455ab9 [ 835.356362] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000015 [ 835.363727] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 835.370998] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 835.378290] R13: 00000000004bdc94 R14: 00000000004cc6d0 R15: 0000000000000000 [ 835.401271] jfs: Unrecognized mount option "uid=" or missing value 19:23:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x26d8, &(0x7f0000000240)=ANY=[]) 19:23:47 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c6925636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) [ 835.508983] jfs: Unrecognized mount option "uid=" or missing value [ 835.537505] jfs: Unrecognized mount option "uid=" or missing value 19:23:48 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000080)={0x0, r1}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:23:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:48 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696e636861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xff0f0000, &(0x7f0000000240)=ANY=[]) 19:23:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB="90eef9f365635be9cef76ee06955418d58e3fe0fd9f9d7"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe1000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f00000000c0)="672eff8b80e5660f38827e7b660feeebb96d0300000f32b8010000000f01c10f01df0f63757466660f38822dfd00000066b826010f00d866b86c008ed0", 0x3d}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x40802, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e23, @rand_addr=0x4}}) 19:23:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1000000, &(0x7f0000000240)=ANY=[]) [ 836.147465] jfs: Unrecognized mount option "uid=" or missing value [ 836.184174] jfs: Unrecognized mount option "uid=" or missing value 19:23:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:48 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f0a6861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:48 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x80) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="002000000100000000000000000000005101c81e5370ca0a"], 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000728000)={&(0x7f00000aef80)={0x5, 0x900, 0x0, {0x77359400}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "260503dd3e3c0a6afe3f7b377378f2e013e66ff1bf538a0f1abc5b8beb605be3d9448c99787c873249ed9c34e040a29606427925d8dd9065c240a288783179ce"}}, 0x80}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000540)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000500)={&(0x7f0000000200)=ANY=[@ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES64=0x0, @ANYRES64=0x7530, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00008130577c7a0bfc80696e7de1130000ae947cab94fc62fd0000000000000000000000000f9e3e3ac7bd5089a9a64bb133a156"], 0x48}, 0x1}, 0x0) 19:23:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x15000000, &(0x7f0000000240)=ANY=[]) 19:23:48 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) socketpair(0x3, 0x1, 0x1, &(0x7f0000000180)) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:48 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x108) r1 = dup2(r0, r0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f00000000c0)={0x3, 0xc064}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000280)={0x4, {{0xa, 0x4000000000000000, 0x800, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0xb575}}, 0x1, 0x4de}, 0xfffffffffffffe3d) [ 836.575671] jfs: Unrecognized mount option "uid=" or missing value 19:23:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9fffffff}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xa00, &(0x7f0000000240)=ANY=[]) [ 836.626145] jfs: Unrecognized mount option "uid=" or missing value 19:23:49 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x7, 0x20000) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f00000000c0)={0x4, 0x0, [{0x80000008, 0x1f, 0x20, 0x2, 0x5}, {0x80000007, 0x5, 0x80, 0xb307, 0x820}, {0x1, 0x100000000, 0x8, 0xd29, 0x8}, {0xc0000001, 0x9, 0x10001, 0x80, 0x88c}]}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:23:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:49 executing program 5: set_robust_list(&(0x7f00000000c0)={&(0x7f0000000000), 0x0, &(0x7f0000000080)={&(0x7f0000000040)}}, 0x18) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) accept4$llc(r0, 0x0, &(0x7f0000000140), 0x80800) 19:23:49 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f256861727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3200}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1600, &(0x7f0000000240)=ANY=[]) 19:23:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3c00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 837.623083] jfs: Unrecognized mount option "uid=" or missing value [ 837.653101] jfs: Unrecognized mount option "uid=" or missing value 19:23:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x8200, 0x0) socket$pppoe(0x18, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000180)={@ipv4={[], [0xff, 0xff], @rand_addr=0x7}, 0x5, 0x3, 0xff, 0x8, 0x9, 0x200, 0x40000000}, 0x20) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{}]}) r3 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x2, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000080)) ioctl$KVM_SET_TSS_ADDR(r1, 0xae71, 0x0) 19:23:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1b, &(0x7f0000000240)=ANY=[]) 19:23:49 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x3) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) r1 = dup2(r0, r0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000180)=""/36) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000240)={0x9, 0xfab, 0x8, 'queue1\x00', 0xb98d}) ioctl$TIOCSCTTY(r1, 0x540e, 0x1f) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000340)={0x8000, 0xffffffff, 0x3, 0x0, 0x0, [{r0, 0x0, 0x80}, {r1, 0x0, 0x3}, {r1, 0x0, 0xfffffffffffffffc}]}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:49 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f63680a727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x700}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x7a26000000000000, &(0x7f0000000240)=ANY=[]) 19:23:49 executing program 5: r0 = socket$inet(0x10, 0x1ffffffffffffffc, 0x1400000) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000000707031dfffd946fa2ac9da3139f743ba23a3146830020200a000900010000", 0x24}], 0x1}, 0x0) 19:23:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4d}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 837.811900] jfs: Unrecognized mount option "uid=" or missing value [ 837.850223] jfs: Unrecognized mount option "uid=" or missing value 19:23:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000000), &(0x7f00000000c0)=0x4) socket$packet(0x11, 0x2, 0x300) 19:23:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xaa040000, &(0x7f0000000240)=ANY=[]) 19:23:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:51 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636825727365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:51 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) socketpair(0xf, 0xa, 0x1ff, &(0x7f0000000180)={0xffffffffffffffff}) accept$packet(r1, &(0x7f0000000240), &(0x7f0000000280)=0x14) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:51 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x5, &(0x7f0000001500)=[{&(0x7f0000000100)="8e7d4d7eb58f7c7fc27903c73636caff6514111a099360acd7601a2aa158b8c50f4f4eb12cd799d75726143937c451a8893eadf01c4d77e2605164", 0x3b, 0x7f}, {&(0x7f0000000280)="155bb545f5f35f7af8bef52884313affd8d01450fb69b1b163756f8dcb48fd9cc35d4e01dc3922ac946962d975bafb162d39346e06efe4521f03c6852b9e29ce61a23b264984755b0d790af3e64b818424a78334ddb6b4a92fc1ee6a3bd72bc1b02cd1984186820bcd8097d511352d07ef79ac0e946522a077ddcfcffb167ac12c5b0ba5c6fe796d1934133c314c6bd1905500afe3fea41e1be61627ab8d3d2b30315bb6726e2af02620808422b72609db00a631c580bd96a68f04e45b96d159f8596443049f9e255c451872ca641b5aceffb4f556bc5de60731b0acb0d8db7cf5995f4537f814bdde9b348060dd", 0xee, 0x9}, {&(0x7f0000000380)="21ba95feeed6d7a0b08bf33e1a647030d6338e65bc4f038a0c5bb01e1701e1b03a91916302b9d9fd5db486f0ff02236042cd988627ea4db703645e093f192623a78398198557109d7ff4d6ccec504a4082d29aa7a13dbd7cfc7136", 0x5b, 0xfffffffffffffffb}, {&(0x7f0000000400)="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", 0x1000, 0x7}, {&(0x7f0000001400)="7d7e147fc60535ef8b8c7f9c41e65ee4d31fbdb2899789b32046b9f17063761a2c518c53fcbc329524555c85b29cbe16f6aeb16acf1c51f48fcf67bee400e4275b63c14f3f91cd634083a6b4d226e20c693817be461cfe72fd5406e0d1d1e7223584184cac4bffcb4aa0bf17d64350da0e8286b0a7c84ab5c824ab4767b40e0686b2e187d65a68ba35a749768dd1068d276c1273984283e9b13ad1c4d1b438ceaa7f788afd85390b2676a313849501230c3fbaf9ca05acbf356f5c78fe60cd32b13ae5f17f36d0307d47d6d9e8", 0xcd, 0x9}], 0x2200810, &(0x7f0000001580)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c626172726965723d6e00000021cec4677c8c00010000003d72352c6578706f73655f70726976726f6f742c626172726965723d6e6f6e652c6572726f72733d636f6e74696e75652c626172726965723d66"]) 19:23:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9cffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 839.086208] jfs: Unrecognized mount option "uid=" or missing value 19:23:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x18000000, &(0x7f0000000240)=ANY=[]) 19:23:51 executing program 5: socket$inet6(0xa, 0x1, 0xf01) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xffffffff, 0x40) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000100)={0x3f, 0x2, 0x8f86, 0x9f, 0x0}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000002c0)={r1, 0x48, &(0x7f0000000240)=[@in6={0xa, 0x4e24, 0xe70, @mcast2={0xff, 0x2, [], 0x1}, 0x200}, @in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e20, 0x80000000, @local={0xfe, 0x80, [], 0xaa}, 0x77c1c031}]}, &(0x7f0000000300)=0x10) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e20, 0x0, @empty, 0x1}, 0x1c) read(r0, &(0x7f0000000400)=""/165, 0xa5) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x107000, 0x0) 19:23:51 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f6368610a7365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) [ 839.133609] jfs: Unrecognized mount option "uid=" or missing value 19:23:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:51 executing program 5: r0 = socket$inet6(0xa, 0x806, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4e24, 0x81, 0x4e20, 0x5, 0x0, 0x0, 0x80, 0x16, r1, r2}, {0x0, 0x3, 0x5, 0x0, 0xffffffffffffff80, 0xfff, 0x3, 0x5}, {0x0, 0x9, 0xffffffff, 0x2}, 0x81, 0x6e6bb8, 0x1, 0x1, 0x2}, {{@in=@dev={0xac, 0x14, 0x14, 0x9}, 0x4d6, 0x2b}, 0xa, @in=@rand_addr, 0x3504, 0x0, 0x3, 0xd1, 0xcd10, 0xff}}, 0xe8) socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0), 0x8) accept4(r0, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80, 0x80800) 19:23:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x7a, &(0x7f0000000240)=ANY=[]) [ 839.219939] jfs: Unrecognized mount option "uid=" or missing value 19:23:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:51 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861257365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x6800000000000000, &(0x7f0000000240)=ANY=[]) [ 839.270314] jfs: Unrecognized mount option "uid=" or missing value 19:23:51 executing program 5: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x1, 0x32, 0xffffffffffffffff, 0x0) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000300)}, &(0x7f00000000c0)) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'veth1_to_bridge\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000016c0)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000017c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x4e22, 0x200, 0x4e22, 0xffff, 0x2, 0x20, 0xa0, 0x0, r1, r2}, {0xfffffffffffffffe, 0x80000000, 0x7fff, 0x3, 0x1b64, 0x6, 0xa, 0xb0eb}, {0x400, 0x7, 0x800, 0x320d}, 0xffffffff, 0x6e6bb6, 0x1, 0x1, 0x1, 0x1}, {{@in6, 0x4d2, 0x3e}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xe}, 0x0, 0x1, 0x2, 0x4, 0x3ca, 0x7, 0x9}}, 0xe8) [ 839.339843] jfs: Unrecognized mount option "uid=" or missing value [ 839.371100] jfs: Unrecognized mount option "uid=" or missing value [ 840.097141] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "n" for option "barrier" [ 840.097141] 19:23:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:52 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7300}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:52 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="668f9a", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) write$binfmt_elf32(r0, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x100, 0x5, 0x6, 0x9, 0x4, 0x2, 0x6, 0x8, 0x3a7, 0x38, 0x1d0, 0x4, 0xffffffffffffffff, 0x20, 0x1, 0x1fc00000, 0x8, 0x20}, [{0x0, 0x0, 0x7fffffff, 0x401, 0x37, 0x96c4, 0x91f5, 0xa5b2}, {0x7474e555, 0xffff, 0x0, 0x8000, 0x3, 0x3, 0x100, 0x2f8}], "87c6cfd300eca4fad13ae58de74cad3376e9707b3c93280e881d57", [[], [], [], [], [], [], [], [], []]}, 0x993) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000380)={0x27, 0x0, 0x1, 0x7, 0x800, 0x6, "84c9de0fc129cebf4753d7c77a448cad4f900926ab45be5a8c1e1167bb6a12c2ebca7ea6dbd2c2ea8858c5365454d6c7366ad5b264e156bad9886466c3f516", 0x25}, 0x60) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) fstat(r0, &(0x7f0000000240)) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x3}, &(0x7f0000001000)=0x8) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000010c0)=0x2, 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000001040)={r1, 0x94a}, &(0x7f0000001080)=0x8) write$FUSE_OPEN(r0, &(0x7f0000000180)={0x20, 0xffffffffffffffda, 0x5, {0x0, 0x4}}, 0x20) 19:23:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 840.468728] REISERFS warning (device loop0): super-6506 reiserfs_getopt: bad value "n" for option "barrier" [ 840.468728] 19:23:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x19000000, &(0x7f0000000240)=ANY=[]) 19:23:52 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861722b65743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:52 executing program 5: umount2(&(0x7f0000000000)='./file0/bus\x00', 0x0) r0 = dup(0xffffffffffffff9c) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x4c9) 19:23:52 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:52 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x400c01, 0x0) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:52 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x400, 0xad, 0x8a, 0x18, r1, 0x4}, 0x2c) 19:23:52 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:52 executing program 5: syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000014c0)=ANY=[@ANYBLOB='umask=']) socket$rds(0x15, 0x5, 0x0) 19:23:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x4000000, &(0x7f0000000240)=ANY=[]) 19:23:52 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727865743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) [ 840.676534] jfs: Unrecognized mount option "uid=" or missing value [ 840.707484] jfs: Unrecognized mount option "uid=" or missing value 19:23:52 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x32}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xdb26, &(0x7f0000000240)=ANY=[]) [ 840.768662] ntfs: (device loop5): parse_options(): The umask option requires an argument. [ 840.782156] jfs: Unrecognized mount option "uid=" or missing value [ 840.798185] ntfs: (device loop5): parse_options(): The umask option requires an argument. [ 840.820698] jfs: Unrecognized mount option "uid=" or missing value 19:23:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1af897}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:53 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861722365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:53 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000240)={0xbf}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x24200, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000700)={0x7, 0x1b, 0x1}, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000780)={0x0, @in={{0x2, 0x4e23}}}, &(0x7f0000000840)=0x90) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000880)={r2, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1b}}}}, 0x84) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc02c5341, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00'}) r3 = gettid() readv(r0, &(0x7f0000000680)=[{&(0x7f0000000400)=""/135, 0x87}, {&(0x7f00000002c0)=""/125, 0x7d}, {&(0x7f00000004c0)=""/86, 0x56}, {&(0x7f0000000540)=""/103, 0x67}, {&(0x7f00000005c0)=""/156, 0x9c}], 0x5) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r4, 0x3a, 0x1, &(0x7f0000000280), &(0x7f0000000000)=0x4) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000980)=""/20) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) setsockopt$bt_hci_HCI_FILTER(r4, 0x0, 0x2, &(0x7f0000000940)={0x6, 0x3, 0x100}, 0x10) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) r5 = syz_open_procfs(r3, &(0x7f0000000000)='smaps_rollup\x00') setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f0000000140)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) tkill(r3, 0x1000000000013) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000740)={0x7, 0x3, 0x5, 0x100}, 0x10) 19:23:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x6c, &(0x7f0000000240)=ANY=[]) 19:23:53 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861722a65743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x79}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 841.400132] jfs: Unrecognized mount option "uid=" or missing value [ 841.422123] jfs: Unrecognized mount option "uid=" or missing value [ 841.520263] jfs: Unrecognized mount option "uid=" or missing value [ 841.541151] jfs: Unrecognized mount option "uid=" or missing value 19:23:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x2000000000000000, &(0x7f0000000240)=ANY=[]) 19:23:54 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727565743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x63}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:54 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x800, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) sendmsg$nl_route_sched(r1, &(0x7f0000001000)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20068000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000740)=@deltclass={0x8a4, 0x29, 0x100, 0x70bd28, 0x25dfdbfd, {0x0, r2, {0xf, 0xfff3}, {0xf, 0x8}, {0xc, 0xb}}, [@tclass_kind_options=@c_hfsc={{0xc, 0x1, 'hfsc\x00'}, {0x44, 0x2, [@TCA_HFSC_FSC={0x10, 0x2, {0x6, 0x9, 0x1ff}}, @TCA_HFSC_USC={0x10, 0x3, {0xfffffffffffff800, 0x4, 0x8}}, @TCA_HFSC_USC={0x10, 0x3, {0x4, 0x3fe0000000, 0x80000001}}, @TCA_HFSC_FSC={0x10, 0x2, {0x84a, 0x80000001, 0x2}}]}}, @tclass_kind_options=@c_qfq={{0x8, 0x1, 'qfq\x00'}, {0xc, 0x2, [@TCA_QFQ_LMAX={0x8, 0x2, 0x1}]}}, @TCA_RATE={0x8, 0x5, {0x2, 0x101}}, @tclass_kind_options=@c_htb={{0x8, 0x1, 'htb\x00'}, {0x80c, 0x2, [@TCA_HTB_CTAB={0x404, 0x3, [0x2, 0x95f3, 0x10001, 0x8, 0x101, 0x8, 0x10001, 0xdb, 0x7, 0x3ff, 0x18, 0xfff, 0x0, 0x1ff, 0x3ff, 0x4, 0x20, 0x4, 0x8, 0x101, 0x0, 0x1, 0x2, 0x1, 0x5, 0x5, 0x7000000, 0x80, 0x8, 0x3, 0x100000001, 0x200020, 0x8001, 0x8, 0x1, 0x6, 0x2000, 0x6, 0x400, 0x100000001, 0x1, 0x100000000, 0x33c, 0x10000, 0x1, 0x9, 0x0, 0x200, 0x3b9, 0x1, 0x4, 0x6, 0x0, 0xfffffffffffff001, 0x2, 0x40, 0x6, 0x9, 0x100, 0x1, 0xfffffffffffffffe, 0x5, 0x1, 0x5, 0x0, 0x0, 0x200, 0x0, 0x40, 0x4, 0x80, 0xfff, 0x6, 0x75, 0x6, 0x6, 0xfffffffffffffc00, 0x598, 0x10000, 0x2, 0x3f, 0x100000000, 0x9, 0xfff, 0xfffffffffffffe01, 0x7, 0x4, 0x2, 0x1, 0x7fffffff, 0x5, 0x9, 0x10000, 0x0, 0x3, 0x3, 0x6, 0xfffffffffffffbff, 0x2, 0x6, 0x8, 0x100000001, 0x1, 0x1000, 0xa, 0x10001, 0x1ff, 0x5, 0x2, 0x7f, 0x100, 0xffff, 0x101, 0x100000000, 0xfffffffffffffffd, 0x7f, 0x3, 0x0, 0x1, 0x0, 0xa8, 0xab5d, 0x80, 0x2, 0x7fffffff, 0x800000000000000, 0x4, 0xb, 0x8, 0xc45, 0x2, 0x3, 0x1, 0x1, 0xb6, 0x2, 0x401, 0x81, 0x7, 0x5, 0x7, 0x8, 0x6, 0x7, 0x401, 0x5, 0x80000000, 0x0, 0xff, 0x6, 0x8, 0x59, 0x100000000, 0x1ff, 0x6, 0x6fd5f87, 0xffffffff00000000, 0xffff, 0x6, 0x6, 0xffff, 0x3, 0x80000001, 0x5, 0x5, 0x2, 0x8, 0x0, 0x88d1, 0x8, 0x6e17, 0x0, 0xffffffff00000001, 0x0, 0x5, 0x9, 0x1, 0x1ff, 0x0, 0x0, 0xfffffffffffffffe, 0x80000000, 0x7, 0x0, 0xc17a, 0x7d, 0x0, 0x20, 0x81, 0x2b, 0xbc7, 0x4, 0xaef, 0x337a, 0x1, 0x8, 0x3, 0xffffffffffffffff, 0x5, 0xff, 0x744, 0x80000001, 0x4, 0x0, 0x8, 0xb134, 0x8, 0x796, 0x0, 0xfff, 0x1, 0x9, 0x100000000, 0x5, 0x101, 0x96d, 0xfffffffffffff669, 0x8, 0x658a3d0b, 0x5dd, 0x401, 0x0, 0x1, 0xe83a, 0x3, 0x2, 0x0, 0x9, 0xfffffffffffffff9, 0x5, 0x4, 0x0, 0xffffffffffffff81, 0xffff, 0x5, 0x9, 0x0, 0x20, 0x4, 0x9, 0x4, 0xfffffffffffffff9, 0xc57, 0x1, 0x5, 0x101, 0xffffffffffffffff, 0xffffffff, 0x5, 0x4, 0x3, 0x1daf, 0x9, 0x0, 0x0, 0x9]}, @TCA_HTB_CTAB={0x404, 0x3, [0x7, 0x40, 0x0, 0x8, 0x8, 0x0, 0x100000001, 0x10000, 0x81, 0x0, 0x8, 0x4b, 0x6, 0x0, 0x0, 0x9, 0x7fffffff, 0x8000, 0x1ff, 0x5, 0x62a7, 0x4, 0xc60c, 0x7, 0x9, 0x7f, 0x0, 0x8000, 0xde, 0x3, 0x5, 0x8, 0x0, 0x7ff, 0x6, 0x2, 0x8cf, 0x6, 0x2, 0x1ff, 0x1f, 0xdc0000000000, 0x3, 0x10000, 0x4, 0xa975, 0x7, 0x4, 0x4, 0x2, 0x4, 0x9, 0xea, 0x3, 0x4, 0x9, 0x80000001, 0x18abd28000000000, 0x5, 0x800, 0x9, 0xab, 0xfffffffffffffffa, 0x0, 0xff, 0x1, 0x0, 0xffffffffffffffc0, 0x9, 0x0, 0x5, 0xffffffffffffff14, 0x3ff, 0x4, 0x3, 0x0, 0x0, 0x2, 0x3, 0x1, 0x8, 0x9, 0x1, 0x5e9, 0x3, 0x1, 0x5, 0x2, 0xffffffffffffffe0, 0x4520, 0xdac, 0x10001, 0xfbe, 0x9, 0xe225, 0xde66, 0x8, 0x7, 0x0, 0x0, 0x5, 0x7fffffff, 0x5, 0x3, 0x1ff, 0x6, 0x7, 0x7fff, 0x80000001, 0xd4, 0x1, 0x99, 0x1, 0x4, 0xb, 0x9, 0x8, 0xfffffffffffffffb, 0x8, 0x0, 0x637b, 0x9e, 0x7, 0x10001, 0x100, 0x6, 0x4, 0x7f, 0x1, 0x8, 0x2, 0x1f, 0x7, 0x3, 0x7f, 0xfffffffffffff1c5, 0x3, 0x5, 0x10000, 0x200, 0x2, 0x8001, 0x80, 0x8, 0x0, 0x7, 0x1, 0x6, 0x6, 0x1, 0x5, 0x9, 0x400, 0x7, 0x4, 0x100, 0x4c, 0x8001, 0x1, 0xf, 0x6, 0x1, 0x4, 0x2, 0x8, 0x40, 0x1, 0x5169f402, 0x1, 0x6, 0x2, 0x4, 0x59a, 0x200, 0x7fffffff, 0x28, 0x9, 0x8, 0x0, 0x2, 0x6, 0x6, 0xfffffffffffffffc, 0x3, 0x8ce, 0x4, 0x100000001, 0x7, 0x10001, 0x5, 0xf286, 0x6, 0xfff, 0x6f26, 0x10001, 0xfffffffffffffffe, 0x7, 0x9, 0x2, 0x5, 0x6, 0x7, 0x2, 0x4d, 0xd5e8, 0x0, 0x9, 0x3, 0x4, 0x1400000000, 0x3800000000000000, 0xa3, 0x3d, 0xffffffffffffffff, 0x40, 0x33a, 0x60, 0x100000002, 0x10001, 0xa04, 0x14be9ab2, 0x20e4, 0x200, 0x2, 0x1, 0x4, 0x7, 0x10000, 0x0, 0x4, 0x100000001, 0x7fffffff, 0x100, 0x35, 0x5, 0x9, 0x0, 0x800, 0x1, 0x100000001, 0x2, 0x89, 0x2, 0x6, 0x400, 0x9c, 0x10000, 0x80000000, 0x5, 0x3ff, 0x4, 0x0, 0x80000001, 0x2, 0xffffffffffffffff]}]}}]}, 0x8a4}, 0x1}, 0x4000000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x6da366ad0ad476d2) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000240)={{0x2, 0x4e21, @rand_addr=0xff}, {0x306, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x40, {0x2, 0x4e21}, 'veth1_to_bond\x00'}) 19:23:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1600000000000000, &(0x7f0000000240)=ANY=[]) 19:23:54 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) 19:23:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 842.203770] jfs: Unrecognized mount option "uid=" or missing value 19:23:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xffffff7f, &(0x7f0000000240)=ANY=[]) [ 842.248046] jfs: Unrecognized mount option "uid=" or missing value 19:23:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xff000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:54 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861722e65743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="5f691fa9", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 842.604052] jfs: Unrecognized mount option "uid=" or missing value [ 842.635688] jfs: Unrecognized mount option "uid=" or missing value 19:23:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x13b5, 0x80800) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f0000001280)={{0x9, 0x2f9, 0x6, 0xffff, 0xffff, 0x6}, 0x6, 0xd8, 0x4, 0x7, 0x40000, "49a10ed1e8e922c6be3f6480bd19f27b85b2d7292037794fe36c8441aaaddb5c42a0fc11ed9c4e3ebb3289d7ef446293f7705e4d2a6640877e88d22be5d278c15ee01ad6a4432e37910ac5af551e266d13e7fedc09e7cb4885d23efed5af03468ce1166cab6fc70a45591d28d3d2f5cd086875397545002b631fc3d62739e93e"}) recvmsg(r1, &(0x7f0000000000)={&(0x7f0000f7ffa8)=@alg, 0x61, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0xfffffe45}], 0x1, &(0x7f0000fb3fa9)=""/87, 0x57}, 0x0) 19:23:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x500000000000000, &(0x7f0000000240)=ANY=[]) 19:23:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:54 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861726465743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000340)={0x9, 0x8005, 0x87f7, 0x0, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={r2, 0x8}, &(0x7f0000000640)=0xc) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) open$dir(&(0x7f0000000180)='./file0/file1\x00', 0x80, 0x40) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x61}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1e000000, &(0x7f0000000240)=ANY=[]) [ 842.767307] jfs: Unrecognized mount option "uid=" or missing value [ 842.803851] jfs: Unrecognized mount option "uid=" or missing value 19:23:55 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0xfffffffffffffead) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) pipe(&(0x7f0000000180)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:55 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:55 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861720a65743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:55 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x10002) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, "1df105fc45e3188a3d026de1a9c8f3de55df5841185e7477c64ebfce9467d3a90cba9f1cab65b8321e4c69f9"}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000200)={{0x5, 0x0, 0x0, 0x0, "86195c5f6d862e013a2f76442ee8b753ffe838973c28fddca83501e3463516037660c46107d1ab965d3aa901"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "260a799355392df37b409772ec0b18ad45f8393ae38dfa72eb8a4c6cb6de26c4c869de5ed38f81dbb4b0b77d9c52f5836999c6f111f4769edd21d83716cbf3be", &(0x7f00000001c0), 0x7}) 19:23:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1700, &(0x7f0000000240)=ANY=[]) [ 843.397882] jfs: Unrecognized mount option "uid=" or missing value [ 843.413475] jfs: Unrecognized mount option "uid=" or missing value 19:23:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:55 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:55 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f000043d000/0x2000)=nil, 0x2000, 0x1000003, 0x8031, r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x1ffc, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f00000000c0)={0x7, 0x7}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$sndseq(r1, &(0x7f0000000280)=[{0xffffffffffffffff, 0x3f, 0x7, 0x4, @time={0x0, 0x1c9c380}, {0x1, 0xbe40000000000000}, {0x0, 0x8}, @control={0x5, 0x6, 0x1}}, {0x3, 0x0, 0x0, 0xf97a, @tick=0xfa9, {0x3ff}, {0x214, 0xff}, @connect={{0x7, 0xfffffffffffffffe}, {0x0, 0x4}}}, {0x1004000000000000, 0x1ff, 0x6, 0x40, @tick=0x9f, {0x4, 0x69f}, {0x751c, 0x8}, @raw8={"73e65438765af72c7d7cd135"}}, {0xff, 0x7ff, 0x100, 0xffffffff, @time={r2, r3+30000000}, {0x4, 0x20}, {0x40, 0x4}, @raw32={[0x5, 0x6, 0x9]}}, {0x100000000, 0xff, 0xff, 0x9ae, @time={0x77359400}, {0x107, 0x2}, {0x5c741bd3, 0x1}, @addr={0x20, 0x8}}, {0x3f, 0x79, 0x1000, 0x0, @time={0x77359400}, {0x1f, 0x93}, {0x7, 0x2}, @result={0x4, 0x800}}], 0x120) connect$bt_sco(r1, &(0x7f0000000100)={0x1f, {0x7fffffff, 0xe8, 0x1, 0x800, 0xffffffffffff0000, 0x1}}, 0x8) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000140), 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:23:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x300, &(0x7f0000000240)=ANY=[]) 19:23:55 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:55 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861725865743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [{0x20, '*'}, {0x20, '@vmnet0!$vboxnet1bdev'}, {0x20}, {0x20, '&\x00'}, {0x20, 'wlan1selinuxem0\x00'}], 0xa, "8bc0262d995cb2e07d41ccab55392510deab37b3e8cbbd4d04bd8991cd8debb026d00a6eff0b12acbef59f24a99affc055a9fb4b4253a23abbe2b7a8210682a25ba38831f6c45701a038978c6708d66338dfe00c569eff642dfb5536e441dfefe950da7d72d5e4641a3175d52e49d7441ed5379d79559d43a68ff65c0357841a7d4d9dea3378b52f04c5d0df531600b2bed28b6e53722cb5feeca5e55e7e215926987e"}, 0xdb) sendmsg$nl_route(r0, &(0x7f0000000440)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000520003040000000000f800001c00000008000100", @ANYRES32=0x0], 0x2}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 19:23:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x9300000000000000, &(0x7f0000000240)=ANY=[]) [ 843.768449] jfs: Unrecognized mount option "uid=" or missing value [ 843.816664] jfs: Unrecognized mount option "uid=" or missing value 19:23:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x1, 0x0) sendmsg$nfc_llcp(r1, &(0x7f0000000900)={&(0x7f0000000240)={0x27, 0x0, 0x2, 0x0, 0x200, 0x5, "f7d0c52ae881df3c836f3e4efcc98d5df3817023e94f0471781ee8da2cf21a6535a9fca1b9955a0e478467c001039e116b20a1b2155d2c1873794a1b501579", 0x29}, 0x60, &(0x7f0000000840)=[{&(0x7f00000002c0)="bfbb8cf7df9aaf494ae2e584b191f52c6d2b24db6ca5c39b185f3d1e50c6dc0e6ddb78eb45e741e5fa0b58c8048e44c7f8bb", 0x32}, {&(0x7f0000000340)="2b4f585d184144c5a67219bf9b3aad6dfd555e88039cca72e737404373986f26958412300e6a38092b6631ff39863f4163f0ee177dd8240f837020b02f959b2951515f88400bd3a47ed145a5aa16681db43b56944723c4600624381a44d9cadb9a879699d1b9edbc8551fee61acd72ae8e7ab9334aa632f3fcc2affb0f61081aef34d9125b9183fff798c647ba3bd3223c71b9f8e0e3a273fbf4c9682226", 0x9e}, {&(0x7f0000000640)="434482c5322dcbc9", 0x8}, {&(0x7f0000000680)="8d8764a04ce2295e0d61ce7f75de79c5d30a49b94142351645f5e5c8f897042ade8b887b5df62a785bcc3491c8e9bc6cf217454bd77a2525d421b380ce008bf18afb", 0x42}, {&(0x7f0000000700)="49e600f23ecaa7cd5e81c34aac48220561e95201f8399cad3ce4283d611c600c4d12", 0x22}, {&(0x7f0000000740)="53a46ecce815ad5cbd5e7efa901103e61fb89c3dfec600a157ea9d405e7e56114962f67aee498f432034fa54fdad0ca276b34995db05ef5a929ec783f4043bf4b01a8762bf04087a6baf5f1ae09d7e4d5e175460d909203894cf", 0x5a}, {&(0x7f00000007c0)="36c09b82dba94e90b75ed41fb8653569bd19c0dceb3ef81c91a86f596a319aeb2bdcd26f00ed511cf834b9dcfc6b0e5cc35c94d0eacba71d3587ca957e32087eaf190f68d2cbb9aebf191eb68ad1d7bf9bb1321ff88213da84c7f46321c4ad92c94141", 0x63}], 0x7, &(0x7f00000008c0)={0x18, 0x117, 0x7ff, "e5b030ea20fc539d"}, 0x18, 0x8010}, 0x200440d5) 19:23:56 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffe4}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = fcntl$dupfd(r0, 0x406, r0) sendmsg$nl_crypto(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@delrng={0x10, 0x14, 0xc09}, 0x10}, 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x90, "5b5218ec341eee82f50dbe15486a367e08fb5b420588fe72d3849c85aac88afb0561370626c408f5db4b906e21d1cad605388739a2f29169d1c275d1db1d9f98a058ecb88d84279bc7df1bc8602e31a93d92675978aa18686045c138d97ed66d9457a61e2ceebe24a3eb4352a860367222d678535eb5f237cb14ba1648ba2dda660dd229e13d0d8ce5e013e7c033165f"}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0x7ff, 0x8008, 0xea, 0x4, r2}, &(0x7f0000000240)=0x10) 19:23:56 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='pd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) remap_file_pages(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000004, 0xfffffffffffffff7, 0x100000) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d310000000000000000000000000000000000000000e400000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:56 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861722565743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xab040000, &(0x7f0000000240)=ANY=[]) 19:23:56 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x97f81a0000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:56 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3"}, 0x60) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "48fb39fe415d8475fe41318cdaa8cb821aaba7ba58c6a4d537711ecd89e537bc02b181f187b19423316480477beec2c29087e9a63a84d101b8f1617ab346e6"}, 0x60) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000140)=0x2, 0x4) write$tun(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x119) dup2(r1, r0) [ 844.297932] jfs: Unrecognized mount option "uid=" or missing value [ 844.322735] jfs: Unrecognized mount option "uid=" or missing value 19:23:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:56 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x80, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x4, @loopback={0x0, 0x1}, 0x6}, @in6={0xa, 0x4e24, 0x5a14ccc0, @empty, 0xac75}, @in6={0xa, 0x4e23, 0x100, @loopback={0x0, 0x1}, 0x1}, @in={0x2, 0x4e24, @multicast2=0xe0000002}, @in6={0xa, 0x4e22, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0xfffffffffffff71e}], 0x80) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8001) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000100)=""/4096) r3 = syz_open_dev$usbmon(&(0x7f0000001100)='/dev/usbmon#\x00', 0x1, 0x101000) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000001140)) prctl$setmm(0x23, 0x1, &(0x7f0000ffc000/0x2000)=nil) close(r1) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x7) fadvise64(r3, 0x0, 0x3, 0x7) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000001180)) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, &(0x7f00000011c0)=""/194, &(0x7f00000012c0)=0xc2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000014c0)=0xe8) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f0000001500)={r4, 0x0, 0x1, 0xffffffffffffff25, 0x1, 0x8, 0x5}) getsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000001540), &(0x7f0000001580)=0x10) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000015c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r3, 0xc1105518, &(0x7f0000001640)={{0x8, 0x4, 0xe4, 0x1ff, 'syz1\x00', 0x5}, 0x3, 0x10000000, 0x80, r6, 0x2, 0x3045, 'syz1\x00', &(0x7f0000001600)=['/dev/usbmon#\x00', 'security\x00'], 0x16, [], [0x401, 0x9, 0x0, 0x9]}) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000001780)) setsockopt$inet6_buf(r3, 0x29, 0x6, &(0x7f00000017c0)="22ad77c922e7b56c6b9ccecf098d630a37fffea7ea3d06c8a6eb8c1700b368e76695873c50468d847bbff30adf4daac6403474aa1d0ce957918a8d2c24eb67ab9ad0300f97f455795e7b586416fd4a4035a03e9abc156948399f03ba7e5b55585de5e9a2e59f5f3d453ff79968daeb2013c1c10267710159671de49594c956bb16a8f2a4d9570f0d9ec504ab2f6e06c0b7449900892e50001c8894a6", 0x9c) getresgid(&(0x7f0000001880)=0x0, &(0x7f00000018c0), &(0x7f0000001900)) fchown(r2, r5, r7) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) perf_event_open(&(0x7f0000001980)={0x3, 0x70, 0x2, 0x80000001, 0x81, 0x1000, 0x0, 0x2, 0x200, 0x8, 0x5, 0x883, 0x1, 0x7, 0x7, 0x6, 0x7fff, 0x8, 0xff, 0x3, 0x5e, 0x3f, 0xffffffffffffff7f, 0x68153, 0x3, 0x10000, 0x8, 0xa634, 0x7fff, 0x228, 0x2, 0x2, 0x8, 0x1, 0x0, 0x950, 0x73c, 0x36, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000001940)}, 0x1280, 0x800, 0x7fffffff, 0x2, 0x80000000, 0x51000000, 0x200}, r6, 0x2, r0, 0x1) getsockname$inet6(r3, &(0x7f0000001a00)={0x0, 0x0, 0x0, @remote}, &(0x7f0000001a40)=0x1c) rt_sigpending(&(0x7f0000001a80), 0x8) ioctl$KVM_GET_MP_STATE(r3, 0x8004ae98, &(0x7f0000001ac0)) timer_create(0x7, &(0x7f0000001b00)={0x0, 0x34, 0x0, @tid=r6}, &(0x7f0000001b40)) mknod$loop(&(0x7f0000001b80)='./file0\x00', 0x100, 0x1) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) 19:23:56 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6300}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:56 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x8000, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000240)="115db22396b674ded407baf0f6066990", 0x10) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:56 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861726965743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x13, &(0x7f0000000240)=ANY=[]) 19:23:56 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) eventfd2(0xc6, 0x800) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x22000, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:23:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x23, &(0x7f0000000240)=ANY=[]) [ 844.934442] jfs: Unrecognized mount option "uid=" or missing value [ 844.973312] jfs: Unrecognized mount option "uid=" or missing value 19:23:57 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:57 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80800, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000040)=@buf={0xaf, &(0x7f0000000200)="ade5c6531dd6cc5c2b34d6adad9f29d9843aff8306a80f9c7f3ab05348881c520482ba6ecf7313bacef9fbd5156a0aa3844f58ccad3a78b25a6ebbccf2a3336b00baf88ccc07b7e4231dabc4bca0e6ff8ed13fad1b6bf27693b7f932b2906e15d5874acb6427c50d3ac49f7bde63163ef06b553974ad0abefba18e300be4a26f5b3adb91620eec9a79e74b6585d10e449253ed35687870b0c3f46544d5c988c7c33fc6ece80b788a141288886bccd7"}) clone(0x0, &(0x7f0000000100), &(0x7f00000001c0), &(0x7f00000000c0), &(0x7f0000000040)) 19:23:57 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861726f65743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xfffffdfd, &(0x7f0000000240)=ANY=[]) 19:23:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = memfd_create(&(0x7f00000002c0)='cgroupnodev\x00', 0x3) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000180)='./file0/file1\x00', &(0x7f0000000240)='fuse\x00', 0x8800, &(0x7f00000006c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions', 0x2c}, {@allow_other='allow_other', 0x2c}, {@max_read={'max_read', 0x3d, 0x7}, 0x2c}, {@allow_other='allow_other', 0x2c}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 845.213410] jfs: Unrecognized mount option "uid=" or missing value 19:23:57 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xd226000000000000, &(0x7f0000000240)=ANY=[]) 19:23:57 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000001240)={0x0, @in={{0x2, 0x4e21, @loopback=0x7f000001}}, 0x0, 0x1, 0x7f, 0x6, 0x6}, &(0x7f0000001300)=0x98) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000140)={@empty, @dev={0xac, 0x14, 0x14, 0x6}, 0x1, 0x4, [@empty, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, @broadcast=0xffffffff]}, 0x20) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000001340)=ANY=[@ANYRES32=r1, @ANYBLOB="0700000013b8eb6342ce05ed275e58d0a7469b4557dd0434acc92c4bf2dbf62e1bff6e9ad7190bc186545db8"], &(0x7f0000000180)=0xf) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000001c0)=ANY=[@ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000001200)=0x1008) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff}) select(0x40, &(0x7f0000001380)={0x5, 0x7, 0x4, 0x65, 0x2, 0xffff, 0x80, 0x7ff}, &(0x7f00000013c0)={0x7fffffff, 0x7c, 0x9, 0x200, 0x10001, 0x1, 0x5, 0x2}, &(0x7f0000001400)={0x4, 0x4, 0x2, 0x8, 0xc32, 0xffffffffffffff81, 0x81, 0x81}, &(0x7f0000001440)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000000040)={@remote, @broadcast, 0x0}, &(0x7f0000000080)=0xc) setsockopt$inet_mreqn(r3, 0x0, 0x1c, &(0x7f00000000c0)={@broadcast=0xffffffff, @dev={0xac, 0x14, 0x14, 0x1c}, r4}, 0xc) syz_emit_ethernet(0x11, &(0x7f0000005faa)={@empty, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "c8fba2", 0x18, 0x4000ffffff88, 0x0, @empty, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@mld={0x0, 0xd, 0x0, 0xb, 0x18, @mcast2={0xff, 0x2, [], 0x1}}}}}}}, 0x0) [ 845.269582] jfs: Unrecognized mount option "uid=" or missing value 19:23:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:58 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727065743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:58 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7300}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xf2030000, &(0x7f0000000240)=ANY=[]) 19:23:58 executing program 5: r0 = shmget$private(0x0, 0x4000, 0x78000000, &(0x7f0000ffa000/0x4000)=nil) syz_open_dev$sndmidi(&(0x7f00000000c0)='/dev/snd/midiC#D#\x00', 0x0, 0x20100) munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/191, 0xbf) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/143) 19:23:58 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x80000, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x80) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r2, &(0x7f0000000640), 0xffffff5f) read$FUSE(r2, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000003000)=""/4096) 19:23:58 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000b15000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000)=0x2fc7, 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:23:58 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) r1 = dup(r0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000180)) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000340)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b00000000001ab4d3902d89fc091967d289a39dc37966ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000400000000000000000001c000000000000002b73797374656dcc6370757365546367726f7570246367726f757015000000"], 0x90) [ 846.122739] jfs: Unrecognized mount option "uid=" or missing value [ 846.178133] jfs: Unrecognized mount option "uid=" or missing value 19:23:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000740)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c, {[{@default_permissions='default_permissions', 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@default_permissions='default_permissions', 0x2c}]}}) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x501002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f00000002c0)={0xa, 0x4, 0xfa00, {r2}}, 0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) write$FUSE_DIRENT(r0, &(0x7f0000000640)={0xd0, 0x0, 0x2, [{0x5, 0xfffffffffffffe00, 0x21, 0x7, 'cpusetwlan0@+\\vboxnet1vmnet0eth0#'}, {0x1, 0x68, 0x8, 0x1ff, 'group_id'}, {0x5, 0xfffffffffffffffc, 0x24, 0x5, '#securityBeth1+.em0procwlan0vboxnet0'}, {0x4, 0x1f, 0x5, 0x757, ':ppp0'}]}, 0xd0) 19:23:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x81000000, &(0x7f0000000240)=ANY=[]) 19:23:58 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x10}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:58 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861726c65743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) write$evdev(r1, &(0x7f00000002c0)=[{{0x77359400}, 0x4, 0x0, 0x7f}, {{r2, r3/1000+30000}, 0x72, 0x6, 0x1ff}, {{r6, r7/1000+10000}, 0x800, 0x8000}, {{r4, r5/1000+30000}, 0x7ffe, 0x7fffffff, 0x7}], 0x60) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) getsockopt$bt_BT_RCVMTU(r8, 0x112, 0xd, &(0x7f0000000080)=0x1, &(0x7f00000000c0)=0x2) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x8000, 0x4) 19:23:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000080)={0x9bf, 0x5, 0x6, 0x1f, 0x6, 0xff}) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000001980)) write(r0, &(0x7f0000000000)="0ee11d04f41c3cfa52943241c3cfc4556aac7a0b3522dffd3ea14cd08fe4cc4f", 0x20) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000200)={0x0, @rand_addr, @dev}, &(0x7f0000001300)=0xc) sendmsg$kcm(r1, &(0x7f0000001940)={&(0x7f0000001340)=@hci={0x1f, r2, 0x2}, 0x80, &(0x7f0000001880)=[{&(0x7f00000013c0)="01b8da229f8a9ee2fee56529520ab7fbeb56299c1045b520e3173d8d54ac32997011149ef1d5d6ff34405156058adf0386e229d64ecb7f32d64c657daabd98d2159af1783206d1ee1850214b", 0x4c}, {&(0x7f0000001440)="baad5015d7e1f3b44d6e72d5585e5cec0baaae10707f50f8f39bcbf3a6004c642c350605ce7d51b5", 0x28}, {&(0x7f0000001480)="6444c4a772db1d2d9daf95783656ba215ac44e69b5d29a692d524e7d7170f13140809b4e514bee52fc11735dbcc691e2f5442f61b1c5f69df0460e7232b0a3795f3230a664931eebc864ffc1fb853f441e7f120ad375554faecc87e0", 0x5c}, {&(0x7f0000001500)="6cf02babc05b566b253282298c26146df4621d7f29ddddde95e08a30df23f7bd418d8c0fd8bc155dd423e406fe234a265eb3687405aae841a75e579cabc8658e8a0426d80a98ac3c389eb777db98957a11bd04baa59d4f9e6671c0bbbf248362a8760f5a3564c368a18e7e95763c36915ce53d1703f00ba98e6a19f922686a38ec291057220bc061a85419791847d018f2a0e15c0c9fa9967712ac2f8b52e6c8b815e804f2d15b7d95a5c709620387b7882fd6d0e5922c2b42b89953aa305d1680e99f1964532f59946a9d9d9111ca1ed514a1ccf670f21ef0bd807fa2879b27d37d22ef6c1246c812419bc8865fdc61ae30c6", 0xf3}, {&(0x7f0000001600)="211668bed9f3fcd1d2f1aaa64e263b840726106fa8e3e10e4ab01b48d79da5b6f67e36", 0x23}, {&(0x7f0000001640)="d4cffa1c0be0bcaf89fdf73106179d535924ef35cb60f0e0be71a909f7cbb55529fcb23cf5d892bf70b891996f4b92f109087068e3f36f676199cd3039cafe7f913589b56447ad98f8ca6e1d3640b05795843905e6496fcfb7fcfdd383efd180cf1c3f59", 0x64}, {&(0x7f00000016c0)="7c5be2495ac20f4cf69023f41bc2f2091bea0f75817516785d93ab4315298d8638d5b71eea614bdc30e823c1ce7c27bcc7ec563a5af85c3b801c87f1dfb1cf06ea5f7b3c4d9050c4fe57528bcbdd372f059939c1648b7ce907e47f747f84c5178d48eafa2b535dfec89fcef1fff27f8ec39f70c9efb97772fe19466945d81588be13758b8396", 0x86}, {&(0x7f0000002000)="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", 0x1000}, {&(0x7f0000001780)="e2c92d9196f06651e35694b458548dbb911b790b07a28aa0fb451173dd006d4c474bc874571895bf7a4cc0ee07e25e78b3bb454a79d8fed661cfabc66ced708ce4e2f5adeec16ab29cfcab096acb4787f6f33198cf7453176fe58b0b2afe411652156d7e32413809acc441c13eeef1202ae60165d8d2f3782ea463e4363a605d7834f7e354a55526d8bc98", 0x8b}, {&(0x7f0000001840)="64f5e3fa8233e36d9ebbca1717793e4a14a53625146a8aaca45abd35c35d12315e3c9ea34ea86eae94e605c9bbdf6d", 0x2f}], 0xa, &(0x7f0000003000)=[{0x100, 0x88, 0x401, "f8bfd4d612179e7ff1ecb628b44d772feb2cdc61b4b1065803a22f2573dd0338f82c8d860305fe5311f888bd82696437bcc27bb7d8ca1802f2b4ed33d39b8ae5d1a3c9030b2aa757d4c621335e725b7ab6aacb28f258c10acdcaac4b4ab8e5d45b9e0d7ba96ca78260dbbcbaeaa1107eb12bcd9575453b34c9113247f8dc925dc411474854368ae8eb760edfc87c3cb763840bd1925cc86592a36ab440801ecbf216e0dc7856c3c1be69841358a2e2a15c632345a5778a8ce553f15b81c8a5f59e1dcf717aa835684bb0d87cc686c961813ad8eebd7f9610be7636938e8a113dba734b87437935ab3460ccce13"}, {0x38, 0x117, 0x1f86, "4e08c9107a1ea0ca418b84c2f44894bfc054de017f8834b03be9272acef57fdc55a7abb9"}, {0x98, 0x29, 0x9, "bed8d886a83658dda9ff63cabb1003eb84f0437503803073dbb2e0a758b4daaebacf077445247d1e7c297a998a3fb330e5ff2269161a056e1e3362cffe4b44501e4f90e8c1fc4dc969cbf95c7dbc1557a7c776fa59fb7d01e34f03f6ac545376f5de433e7b71c7b32ea08074f4a2df1853167c0cff461a60924c18dd5f5f4deee4df9eaa0d"}, {0xb0, 0xd7c21f647f5bf7e9, 0x8, "0f8a33c09da8181d2e624b6b05a31d2b46d22fcdca59572974a16489bce2068d175df89f99e67923c60c8ba4a435457589415645aae7a6faf6c9c59e49c959cb4b18b2930e071d41bee9a7fb6ffb1a666a9d18fd20fc413f1e8284017cece13b293f771465aa05da3b21c5dfa0df0b245128624af46376d13b07bc9e5c9314599a2862842a02f48ea106129529f7aea73a2c5ef109ea85f92eba1f25c8"}, {0x50, 0x10e, 0x1000, "fe50aca2de3221d1b54b1e6392355a4b10c483b0529c53c07eb55b9fff86c195597f5f82ba69699f4f337cc25fb4bea5cbbbce766d5669aacb7612"}, {0x48, 0x10f, 0x1ff, "ec1a37b06b72a294163c1740cfb82058bbae8ce9f5c625b5d703eae19d4df147feea46edaa3eb896ce5930e0e14bdf52f5580476c5a6"}, {0x80, 0x119, 0x27e86e84, "d868162331864b185c3601feab072cac0b862b0671ec0da9a116a08c1b8ab49dc6ecb0e9be9e220ceca0e785a74bbd8e737ee9a137dd3c51f67b25214a87da17f3dbeb73665c75fab39d1f751ce3c75ef6d87e75b38baf5244e1d5c9c08dfbf43197c0fc9c745e881c90657b"}, {0xb8, 0x10f, 0x0, "99f9fcaba98b481abb2622fd6666d7949fc777e878d671d3b1fe275df6d88820b3ae93fea2b73610752b4627ecb47ca98625601490636e3f5aac1553b4ad353a669f4d236fa9242825711e119a8f3678d5006af4c3334f2e350f844dcb70e1c1c8790c168c13083fa74c974de543908e81d15f679db3a5990e74e49fe828409ce6d250dc3535c2d530389680e78c5a1a556ffadd4ebd0ac005f49b6c1e8277b57d9f2877"}, {0xb8, 0x13f, 0x8, "6b4e52008aebda3e9ba5bd743a6e04ce1720e98d1290be12cb797b8b58cdd61316d842c60dd882b238a77f79b1da540f3a73e7199ee9e295fe5d3a0d09de7e786b7c514d9b0d3aa114d9408e0238b401ba851b59f717abcce5e9725c9b63fc5983261efa78978bc67159333b88a76b4112b664a717c784fbc3fc14491bc16daac327704cf092b710d039d8b0712ae0421eb099bb8a0c3f0aa86bb99e1f3e3aa664f586c4157740"}, {0x1010, 0x103, 0x0, "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"}], 0x1518, 0x20000000}, 0x80) fgetxattr(r1, &(0x7f0000000100)=@known='system.posix_acl_default\x00', &(0x7f0000000140)=""/177, 0xb1) r3 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x5, 0x5) clone(0x0, &(0x7f0000000180), &(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300)) ioctl(r3, 0x200080044100, &(0x7f0000008000)) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000300)=""/4096) 19:23:58 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x100000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xff0f, &(0x7f0000000240)=ANY=[]) [ 846.371535] jfs: Unrecognized mount option "uid=" or missing value [ 846.397897] jfs: Unrecognized mount option "uid=" or missing value 19:23:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:59 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861726365743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xc00000000000000, &(0x7f0000000240)=ANY=[]) 19:23:59 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x40000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:59 executing program 5: r0 = socket$inet6(0xa, 0x80000, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") r1 = socket(0x10, 0x2, 0x0) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x100a00}, 0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') sendfile(r1, r2, &(0x7f00000000c0)=0xfffffffffffffffc, 0x80000002) 19:23:59 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x99b) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="ff3ad4c2c6f49ef75005db08389ea503"]) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 847.310379] jfs: Unrecognized mount option "uid=" or missing value [ 847.370944] jfs: Unrecognized mount option "uid=" or missing value 19:23:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1300000000000000, &(0x7f0000000240)=ANY=[]) 19:23:59 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1810}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='com.apple.FinderInfo\x00') read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:23:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x20000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x0, 0xbff, [0xc1, 0x1, 0x40000106]}) 19:23:59 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861722d65743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:23:59 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:59 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x3) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000017c0)={0x0, 0x8, 0x9, 0x7, 0xffffffffffffdd3e, 0xbd, 0xabe3, 0x8, {0x0, @in6={{0xa, 0x4e20, 0x10000, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0xffffffff}}, 0x4, 0x3, 0xaa, 0x23d34645, 0x1000}}, &(0x7f0000001880)=0xb0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000018c0)={r2, 0x1, 0x5}, &(0x7f0000001900)=0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000012c0)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f00000013c0)=0xe8) r4 = geteuid() getpeername$packet(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001440)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001480)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000001580)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000001780)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x101}, 0xc, &(0x7f0000001740)={&(0x7f0000001940)=ANY=[@ANYBLOB="44010000170002002cbd7000fedbdf2500000000000000000000000000000001000004d5ff000000fe80000000000000000000000000001afe800000000000000000000000000018fe8000000000000000000000000000bb4e2200074e2100040a0080202f000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="fe8000000000000000000000000000bbac1414aa0000000000000000000000004e2000024e2100020200202029000000", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0x80}, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000001280)={0x6a5, 0x7000000, 0x1, 0x75}, 0x8) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000140)) r7 = pkey_alloc(0x0, 0x1) pkey_free(r7) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x8000, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000280)=""/4096) shmget$private(0x0, 0x11000, 0x7800000c, &(0x7f00006ac000/0x11000)=nil) socket$inet6_tcp(0xa, 0x1, 0x0) 19:23:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x79260000, &(0x7f0000000240)=ANY=[]) [ 847.587977] jfs: Unrecognized mount option "uid=" or missing value 19:23:59 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:23:59 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861723065743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) [ 847.633616] jfs: Unrecognized mount option "uid=" or missing value [ 847.716980] jfs: Unrecognized mount option "uid=" or missing value [ 847.730971] jfs: Unrecognized mount option "uid=" or missing value 19:24:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:00 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r1, 0x0, 0x100, 0x3, 0x5}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) umount2(&(0x7f0000000140)='./file0\x00', 0xd) 19:24:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:00 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffd, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x7a260000, &(0x7f0000000240)=ANY=[]) 19:24:00 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f63686172730a743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:24:00 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c475a812f5900"]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000100000000000066ce656d316e6f646576656d3100000000000000000000000000000085f300000000000001000000000000002c0000000000003eb3aee5000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f7570150000000000000000000000000000000000"], 0x90) write$FUSE_WRITE(r0, &(0x7f0000000180)={0x18, 0x761cad96bd2d42c7, 0x5, {0x5}}, 0x18) 19:24:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x61000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 848.504558] jfs: Unrecognized mount option "uid=" or missing value [ 848.538570] jfs: Unrecognized mount option "uid=" or missing value 19:24:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000640)="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") stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:00 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) connect$bt_sco(r0, &(0x7f0000000240)={0x1f, {0x5, 0x0, 0x8, 0x0, 0x5, 0x6}}, 0x8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000340)='./file0/file1\x00', &(0x7f0000000380)) r1 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x3, 0x200000) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) getpeername(r1, &(0x7f0000000280)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f00000000c0)=0x80) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:00 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000004, 0x5c832, 0xffffffffffffffff, 0x2000000000000000) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xc8f, 0x81) r2 = dup2(r0, r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r2, 0x4, 0x3}, 0x10) r3 = syz_open_pts(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCSETAF(r3, 0x5408, &(0x7f0000000040)={0x1ff, 0x8315, 0x5, 0x0, 0x80000001, 0x10000, 0xfc00000000000000, 0x1, 0x7, 0x3}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_1\x00'}) 19:24:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1b000000, &(0x7f0000000240)=ANY=[]) 19:24:00 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727325743d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:24:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x700}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:00 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [{0x20, "2d95a973797374656d2f21"}, {0x20, 'system\''}, {0x20, 'nr0\x00'}, {0x20}, {0x20, 'nr0\x00'}], 0xa, "cfde9643cb3d229176fb96f2730c974e03c910959603729eb8ceb6691ca83001a7b4913fc989788d5cd853b9c487632c33635c69c694ebc6f3f8f5a3152aa692a7d047b059f47bbc3a01ba73142034d6fcfa09735a0ab5722a99004495e77118ce45f6382facb4703169899412310b23488fc3eb542baf6c306ea1b6e0517c977c32"}, 0xac) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000000)={'nr0\x00', 0x8}) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000001640)=""/4096) [ 848.707140] jfs: Unrecognized mount option "uid=" or missing value [ 848.762038] jfs: Unrecognized mount option "uid=" or missing value 19:24:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1d000000, &(0x7f0000000240)=ANY=[]) 19:24:01 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f6368617273650a3d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:24:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xffff8000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:01 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x802, 0x88) r2 = socket$netlink(0x10, 0x3, 0x4) sysfs$2(0x2, 0x0, &(0x7f0000000040)=""/187) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4000000000, 0xc2, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0xffffffffffffffb8) writev(r2, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000100)={'mangle\x00'}, &(0x7f0000000280)=0x54) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000004c0)=0xe8) setreuid(r3, r4) tee(r2, r2, 0x4, 0x5) poll(&(0x7f00000002c0)=[{r0, 0x1000}, {r2}, {r2, 0x2000}], 0x3, 0x8) 19:24:01 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000002b80)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000340)={0xa0, 0xffffffffffffffda, 0x4, {{0x2, 0x2, 0x1cf, 0x7f, 0x7ff, 0xe7, {0x6, 0x8, 0xdf, 0xe4c, 0x8, 0x0, 0x4, 0x8001, 0x7f, 0x3, 0x5, r2, r3, 0xffffffff, 0x7}}, {0x0, 0x6}}}, 0xa0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000480)={0x0, 0x2c, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x103, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f00000004c0)={0x1, 0xffffffffffffff0c, 0xfa00, {&(0x7f0000000400), r4}}, 0x18) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/qat_adf_ctl\x00', 0x1, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) recvmsg(r5, &(0x7f0000001ac0)={&(0x7f0000000500)=@ax25, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000580)=""/157, 0x9d}, {&(0x7f0000000640)=""/215, 0xd7}, {&(0x7f0000000740)=""/150, 0x96}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/129, 0x81}, {&(0x7f00000018c0)=""/220, 0xdc}], 0x6, &(0x7f0000001a40)=""/89, 0x59, 0x1010000000}, 0x20) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000001b80)=""/4096, &(0x7f0000000100)=0x1000) 19:24:01 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000180)='./file0/file1/file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 849.680361] jfs: Unrecognized mount option "uid=" or missing value 19:24:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x9300, &(0x7f0000000240)=ANY=[]) 19:24:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66e43d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d5f3553e551b19bc3f3eaca3ff37b2ff361623cc92f5e60db6492dcfa8bf1d3ddfc42e0967972498d862db7064cf220e05dd1b64e9035867c40db8ee3c3a6a84bcb1da10f2c7999ed493f07569a58b6d86488b5fdef483ab3b00ed8a37f6564d6ce1eca4584156f47b97d6edefa", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x408080) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:01 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365253d6d43ff0c6be90900000000000000ae3c3934392c00aa"]) [ 849.722051] jfs: Unrecognized mount option "uid=" or missing value 19:24:01 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x14, 0x0, &(0x7f00000002c0)=[@increfs_done={0x40106308}], 0x0, 0x0, &(0x7f0000000f4d)}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x40096101, &(0x7f0000000040)) 19:24:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1ce43d}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 849.812079] jfs: Unrecognized mount option "uid=" or missing value [ 849.812654] binder: 26101:26102 BC_INCREFS_DONE node 63 has no pending increfs request [ 849.845133] jfs: Unrecognized mount option "uid=" or missing value [ 849.853794] QAT: Device 20 not found 19:24:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x4a7, &(0x7f0000000240)=ANY=[]) 19:24:01 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f63686172736574256d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:24:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 849.864713] binder: BINDER_SET_CONTEXT_MGR already set [ 849.866106] binder: 26101:26108 BC_INCREFS_DONE u0000000000000000 no match [ 849.885121] binder: 26101:26102 ioctl 40046207 0 returned -16 [ 849.923440] QAT: Device 20 not found [ 849.930739] jfs: Unrecognized mount option "uid=" or missing value [ 849.981075] jfs: Unrecognized mount option "uid=" or missing value 19:24:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x2300000000000000, &(0x7f0000000240)=ANY=[]) 19:24:02 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x6, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x1}, 0xe) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, {}, 0x0, 0x1}, 0xe) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x800, 0x800) r1 = dup3(r0, r0, 0x80000) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000100)={0x0, 0x2710}, 0x1cb) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x9, 0x3, 0x0, 0x4, 0x1d, 0x1c, "bda43bf843bccc6385f5799321665abcfe97de8ba80cf20db633658bfc6005c7b235a832f6c0736b1044f444b5289fcc584ce83f6a98a8b5d8f2053d67a11c1b", "726b8bc88cecfe6c8c3b5dbe0b6273ae2d61029e34125fde8c2c9242730af7dd735de4deed0902de82f4cdf950449a6c0fee4b7722817123ab33aaa8aa5df1fa", "2ac9fda435face3464eb7cb89a8e51feae432feb3c343f7d31cae039165852ce", [0x3, 0x1]}) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000180)={&(0x7f0000000080)=""/18, 0x0, 0x1000, 0x6}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') 19:24:02 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x69000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:02 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f63686172736574466d43ff0c6be90900000000000000ae3c3934392c00aa"]) [ 850.878680] jfs: Unrecognized mount option "uid=" or missing value [ 850.907238] jfs: Unrecognized mount option "uid=" or missing value 19:24:03 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6100}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) rt_sigtimedwait(&(0x7f0000000240)={0x5}, &(0x7f0000000280), &(0x7f00000002c0), 0x8) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000180)={0x31, 0x6, 0x0, {0x0, 0x4, 0x8, 0x0, 'rootmode'}}, 0x31) 19:24:03 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) prctl$setname(0xf, &(0x7f0000000180)='fd') stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f830c4740653d3030303030303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:03 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x8, 0x101000) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) close(r0) 19:24:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xffffffff00000000, &(0x7f0000000240)=ANY=[]) 19:24:03 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365740a6d43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:24:03 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000100)={0x20, "45e7211d806469bae779cfaed2038dba87b706d7b4f73fd12967606034a7b40d"}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) setgid(r2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x73000000, &(0x7f0000000240)=ANY=[]) 19:24:03 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xff00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 851.170887] jfs: Unrecognized mount option "uid=" or missing value 19:24:03 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6e43ff0c6be90900000000000000ae3c3934392c00aa"]) [ 851.227950] jfs: Unrecognized mount option "uid=" or missing value 19:24:03 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 851.305118] jfs: Unrecognized mount option "uid=" or missing value [ 851.339645] jfs: Unrecognized mount option "uid=" or missing value 19:24:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:04 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:04 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d0a43ff0c6be90900000000000000ae3c3934392c00aa"]) 19:24:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xda260000, &(0x7f0000000240)=ANY=[]) 19:24:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') exit(0x0) getdents64(r0, &(0x7f0000000080)=""/57, 0xffffffff000000ba) getsockopt(r0, 0x200, 0x8fe, &(0x7f00000000c0)=""/56, &(0x7f0000000100)=0x38) r1 = fcntl$getown(r0, 0x9) syz_open_procfs(r1, &(0x7f0000000140)='net/ip6_mr_vif\x00') getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) [ 852.029773] jfs: Unrecognized mount option "uid=" or missing value 19:24:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x25220000, &(0x7f0000000240)=ANY=[]) [ 852.076486] jfs: Unrecognized mount option "uid=" or missing value 19:24:04 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d2543ff0c6be90900000000000000ae3c3934392c00aa"]) 19:24:04 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:04 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x800, 0x8) readlinkat(r1, &(0x7f0000000340)='.\x00', &(0x7f0000000380)=""/114, 0x72) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d31005d3a6ef6b1eb7561a0cd1b55789a44000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x500, &(0x7f0000000240)=ANY=[]) 19:24:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) mount(&(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000340)='devpts\x00', 0x0, &(0x7f00000005c0)="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") ptrace$setregs(0xf, r1, 0x2c, &(0x7f0000000240)="d27874e23edc8f41cd3ee6f32d1caff3cc8973480aa968b23fc9417d8718b5a1855e8fcc524d7c6a") read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="66403d2f312ae692b70d25798d490b7e4b14d6649975ae041eba3f45bf857f513edfe121f48558cc9c4aee04baea1972458e71111b70eceeab9f13cc2d3ad856361b833bec2da0ded56de57b130bd503186a0cf869bc38ea4e48", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read(r0, &(0x7f00000007c0)=""/224, 0xe0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 852.326824] jfs: Unrecognized mount option "uid=" or missing value [ 852.386823] jfs: Unrecognized mount option "uid=" or missing value 19:24:04 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @broadcast=0xffffffff}}, 0x8, 0x20, 0x8, 0x4, 0x8}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000280)={r2, 0x6}, 0x8) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:04 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x7926, &(0x7f0000000240)=ANY=[]) 19:24:04 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d46ff0c6be90900000000000000ae3c3934392c00aa"]) 19:24:04 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 852.842289] jfs: Unrecognized mount option "uid=" or missing value [ 852.876157] jfs: Unrecognized mount option "uid=" or missing value 19:24:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000180)=0x4) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x14, &(0x7f0000000240)=ANY=[]) 19:24:05 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d09ff0c6be90900000000000000ae3c3934392c00aa"]) 19:24:05 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:05 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x1, 0x2) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000700)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r1) 19:24:05 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) listen(r0, 0x20000003) recvfrom(r0, &(0x7f0000000080)=""/208, 0xd0, 0x10000, &(0x7f0000000180)=@ethernet={0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0xc, 0x0) recvmmsg(r1, &(0x7f0000001e00)=[{{&(0x7f0000001800)=@un=@abs, 0x80, &(0x7f0000001c00)}}, {{&(0x7f0000001c80)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/37, 0x25}}], 0x2, 0x40012021, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000002300)=@nl=@kern={0x10}, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x1, 0x0) [ 853.236423] jfs: Unrecognized mount option "uid=" or missing value [ 853.266566] jfs: Unrecognized mount option "uid=" or missing value [ 853.292782] devpts: called with bogus options [ 853.418784] devpts: called with bogus options 19:24:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_STATFS(r0, &(0x7f0000000240)={0x60, 0x0, 0x4, {{0x7f, 0x20, 0x6, 0xaa5e, 0x7ff, 0x0, 0xfffffffffffffffa, 0x3}}}, 0x60) stat(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000003c0)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x880, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='\x00d=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socket$inet6_udplite(0xa, 0x2, 0x88) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:05 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:05 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d25ff0c6be90900000000000000ae3c3934392c00aa"]) 19:24:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x93, &(0x7f0000000240)=ANY=[]) 19:24:05 executing program 6: r0 = open(&(0x7f0000000340)='./file0/file0\x00', 0x1, 0x25) mkdirat(r0, &(0x7f00000003c0)='./file0/file0\x00', 0x20) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f00000070c0), 0x8c0) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 853.582679] jfs: Unrecognized mount option "uid=" or missing value [ 853.659258] jfs: Unrecognized mount option "uid=" or missing value 19:24:06 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000440)=[{&(0x7f0000000080)=""/128, 0x80}, {&(0x7f0000000100)=""/56, 0x38}, {&(0x7f0000000140)=""/47, 0x2f}, {&(0x7f0000000280)=""/74, 0x4a}, {&(0x7f0000000300)=""/111, 0x6f}, {&(0x7f0000000380)=""/135, 0x87}], 0x6, 0x0) 19:24:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1f00000000000000, &(0x7f0000000240)=ANY=[]) 19:24:06 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xe000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0xffffffffffffff45) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030a330303030303030303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000500)={'broute\x00'}, &(0x7f0000000580)=0x78) write$FUSE_DIRENT(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="90000000000000000200000000000000000b836329c45f8b5d6d2b7d3c34fc00003b624d0066ce656d316e6f646576656d3100000000400000000000000000000000000000000b00625861bbbac90000002ced9000000000000000000000000000000000000000000000001c000000000000002b73f9ca74656dcc6370"], 0x90) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000001880), &(0x7f00000018c0)=0x4) syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f0000000240)='./file0/file1\x00', 0x400, 0x5, &(0x7f0000001700)=[{&(0x7f0000000280)="d7f67ed58d39c3353e7069a7dd78574847147233ab5bbaaedcb0071955a30d", 0x1f, 0x3}, {&(0x7f0000000340)="5f109ccc88a4fd899eae81b43893560096f2797c2129ccf9337507d017bb5af2676a75e4866a597a7d981e7523d8ad268416fbf86805fef27d81c0f2eb94e2b1ad6cc38a2e8086819218c8b6ef9be6f8ac5dca90c4862018ab71ed98a25c148b47964dafb4f20c2b5e1487b558d5838873786268f941a35cc8d7a05879d56c64e63bfe367d0e1852ef8bc4a337", 0x8d, 0xfff}, {&(0x7f0000000640)="7bad6021157a3c8343444f548a5bbfcf51611587290f4e7bd23e0356b86aa02d09cef4afda220d58012294601ffb5de337716402d9897602d08736316448b61528594ac2941c4757b66888d085de9df5c18995c6e1cda37854612955c54b86b442ace91e6a4c1c5f78e8ed813b94c2e23f2dfbccd7557e30621cc4a75c6c203bc6415881626e8b4ccb50d3dbe8054e12b5b5a9", 0x93, 0x2}, {&(0x7f00000002c0)="82d51cfc712b4c9aa1343bacf7ef2471a49c82134a99c29f75d382e4", 0x1c, 0x80010000}, {&(0x7f0000000700)="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", 0x1000}], 0x200020, &(0x7f0000001780)={[{@errors_ro_remount='errors=ro-remount', 0x2c}, {@hash_tea='hash=tea', 0x2c}, {@jqfmt_vfsv0='jqfmt=vfsv0', 0x2c}, {@tails_small='tails=small', 0x2c}, {@balloc_notest4='block-allocator=notest4', 0x2c}, {@nolargeio='nolargeio', 0x2c}, {@replayonly='replayonly', 0x2c}]}) 19:24:06 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@broadcast, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) r2 = syz_open_dev$vcsa(&(0x7f0000001c40)='/dev/vcsa#\x00', 0x4, 0x40) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001c80)='/dev/net/tun\x00', 0x200000, 0x0) r4 = syz_open_dev$rtc(&(0x7f0000007040)='/dev/rtc#\x00', 0x5, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = mq_open(&(0x7f0000007080)='/dev/fuse\x00', 0x0, 0x0, &(0x7f000000a2c0)={0x401, 0x8, 0x9, 0x6, 0x4c, 0x0, 0x7fff, 0x4}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f000000a300)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = syz_open_dev$midi(&(0x7f000000a340)='/dev/midi#\x00', 0x1000, 0x101000) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) r10 = fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000000a380)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6}}, &(0x7f000000a480)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000000a4c0)={0x0, 0x0, 0x0}, &(0x7f000000a500)=0xc) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f000000a540)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000000a580)={0x0, 0x0}, &(0x7f000000a5c0)=0xc) fstat(0xffffffffffffff9c, &(0x7f000000a600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f000000a680)={0x0, 0x0}, &(0x7f000000a6c0)=0xc) r18 = getgid() r19 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f000000a700)='ns/mnt\x00') r20 = getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f000000a740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f000000a7c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r23 = fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f000000a840)='./file0/file0\x00', &(0x7f000000a880)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f000000a900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r26 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r27 = socket$inet6_dccp(0xa, 0x6, 0x0) sendmsg$netlink(r0, &(0x7f000000aac0)={&(0x7f00000003c0)=@proc={0x10}, 0xc, &(0x7f0000001c00)=[{&(0x7f0000000a00)={0x1144, 0x3d, 0x200, 0x70bd27, 0x25dfdbfb, "", [@nested={0x1134, 0xc, [@typed={0x8, 0x6d, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}, @generic="81460d71c4a4f766801f6f51419c916f00cd6a0917703d48e642e96614d80f0e9c34542cce3a6c20bf3110566582fe36ed2a1688a1775f962a5d2c5ba8421e914014ba21a203a904084f821030019769b52ffc5d812e30e4fde049d498ec4d419668e931aeadb4db1f778142529147faab855d46d127715bcd7897cd77e27abfb55c1977adc2e3ce51942fe484ab835fd57bd0cf196227c729d48fdeb3a2787d6b063c0a", @typed={0xc, 0x74, @str='self}\x00'}, @generic="ab7741f683ff9d695a4db298be0c52045d788999acc2496a74022e954c69c4bb3ab828b29c49eb72f34190d7ba5c4c7016aae9be38d8faba5917fb91087140e72eb134fc5c5d4dbc90bd6adb22cbbab6126f8a2dd133c02a81fcd7954af3dd89f3b48ce5", @typed={0xc, 0x3c, @u64=0x7}, @generic="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", @typed={0x8, 0x20, @uid=r1}]}]}, 0x1144}, {&(0x7f0000001b80)={0x44, 0x2f, 0x100, 0x70bd2d, 0x25dfdbfc, "", [@generic="29b7f9073fb9b66a9c9845880225e69493ba5bbd9a8c728aecbe1f8eb99e9c5893b22fa9d94c86d0c58f695c5c8349868ec170"]}, 0x44}], 0x2, &(0x7f000000a980)=[@rights={0x28, 0x1, 0x1, [r2, r3, r4, r5, r6]}, @rights={0x20, 0x1, 0x1, [r7, r8, r9]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @rights={0x18, 0x1, 0x1, [r19]}, @cred={0x20, 0x1, 0x2, r20, r21, r22}, @cred={0x20, 0x1, 0x2, r23, r24, r25}, @rights={0x18, 0x1, 0x1, [r26]}, @rights={0x18, 0x1, 0x1, [r27]}], 0x130, 0x40}, 0x8000) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r28 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r28}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r29 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='em07\x00', 0xffffffffffffff9c}, 0x10) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r29, 0x800448d2, &(0x7f0000000380)={0x4, &(0x7f0000000640)=[{}, {}, {}, {}]}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r28, &(0x7f00000070c0), 0x8c0) read$FUSE(r28, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r28, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) getrusage(0x1, &(0x7f0000000240)) write$FUSE_DIRENT(r28, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = open(&(0x7f0000000180)='./file0/file1\x00', 0x20000, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xf, 0x100000000, 0x7, 0x8, 0x5, r1, 0x7}, 0x2c) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:06 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff146be90900000000000000ae3c3934392c00aa"]) 19:24:06 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) shutdown(r0, 0x2) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000040)=""/46) ioctl$sock_SIOCOUTQNSD(r0, 0x8905, &(0x7f0000003940)) 19:24:06 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x500}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x93000000, &(0x7f0000000240)=ANY=[]) 19:24:06 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4d}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:06 executing program 5: r0 = inotify_init1(0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) write$FUSE_GETXATTR(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffffe, 0x8, {0x52}}, 0x18) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) ptrace$getregset(0x4205, r2, 0x202, &(0x7f0000000000)={&(0x7f0000002100)=""/4096, 0x1000}) 19:24:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x4, &(0x7f0000000240)=ANY=[]) [ 854.339484] jfs: Unrecognized mount option "uid=" or missing value 19:24:06 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x400000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:06 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff466be90900000000000000ae3c3934392c00aa"]) [ 854.394951] jfs: Unrecognized mount option "uid=" or missing value 19:24:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xff0f000000000000, &(0x7f0000000240)=ANY=[]) [ 854.510894] jfs: Unrecognized mount option "uid=" or missing value [ 854.541810] jfs: Unrecognized mount option "uid=" or missing value 19:24:07 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x10013, r0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) ioctl(r1, 0x7, &(0x7f0000000080)="45c652ea65b2512c81351572de2fe6aaafe9bec24a2de6b76d9f48d077500064461c6c6a53e056bccce80629f748cbd934fd143e7510b3877351344a88c697f0d15ab53e3aeeaa5855d9c89b3ea638bf7ee1e21c760689c8cbcfe1037434db587a345727bb5b36ec3528fc80133edabbd7ede8bd2e876c1c432a2486f27ad388571ddba9a5bd266202f0574add1c672d68a292d78c6385ffe5ff808515753c9d365ee5cbb0f0") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8}, 0x2c}, {@blksize={'blksize', 0x3d, 0x1c00}, 0x2c}, {@allow_other='allow_other', 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@max_read={'max_read', 0x3d}, 0x2c}, {@allow_other='allow_other', 0x2c}, {@blksize={'blksize', 0x3d, 0x1000}, 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@blksize={'blksize', 0x3d, 0x1000}, 0x2c}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x1000) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x7fff, 0x80240) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x9, 0x400) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000240)={0x4, [0xecf, 0xecd1000000000000, 0x9, 0x59a]}, 0xc) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:07 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0b6be90900000000000000ae3c3934392c00aa"]) 19:24:07 executing program 5: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f00000001c0)='net/ip_mr_vif\x00') getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x3f}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000080)={r2, @in={{0x2, 0x200, @multicast1=0xe0000001}}}, 0x84) fcntl$getflags(r1, 0x40a) sendto$inet6(r1, &(0x7f0000000200)="c6ea0360fc8b7e90b091f99f9f609e3247567281ea204a4a90b958324f4f58ce8783f65eac7684bbf45a0bc4df057e9254606e216dcc67538d2622c5bdb39b495fc67321166bc29e19200841a38d244fd1ba055e0f6546636a0af46e1c1d4c4cfee4d539", 0x64, 0x20040000, &(0x7f0000000180)={0xa, 0x4e22, 0x147a, @loopback={0x0, 0x1}, 0x2}, 0x1c) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000140)={0x1, {}, 0xca, 0x8000}) ioctl$VT_WAITACTIVE(r1, 0x5607) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xe0, r3, 0x308, 0x70bd2b, 0x25dfdbfc, {0x11}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote={0xfe, 0x80, [], 0xbb}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbc10}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xa898}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff10}]}, 0xe0}, 0x1, 0x0, 0x0, 0x15c91afe2bb862c0}, 0x84) preadv(r1, &(0x7f0000000280), 0x1000000000000314, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000280)=0x3ff, &(0x7f00000002c0)=0x4) 19:24:07 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x79000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:07 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69603dce5f71518971110fc93baa6b01fb65099623bb8f4a650dc445e5aafcb2fb79d33d59e6019385512d80860990dd3b3126c2c972b856b0b1a8565389850c9a426e320b06746b6c4a104786bdab89222a5b0d3ae2d67e4b95e53acf9a12161e872f6257029cc774ea1ec641686682f75b585bad618526b177bcdb740f908515e6d0e08fd2adb28b29fc564dd9f3a2b91ec1eb79d17fc71d0472988b8f3c6a5bdd04e5efc3f370db52b4812a91f1a4704227277b57cc824f14ac53259b8ad3ad2c695455521a65286860ab89652d6fd82af715ea80b7cb3abc533fd6b6251791b0fc16d2ad1e9b551b9edc", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000400)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d, r1}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) write$FUSE_IOCTL(r0, &(0x7f0000000080)={0x20, 0xfffffffffffffff5, 0x2, {0x81, 0x4, 0x9, 0xdd}}, 0x20) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0xc00, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000240), 0x3, r3, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x4081, @empty, 0x8000}}}, 0xa0) 19:24:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1d00000000000000, &(0x7f0000000240)=ANY=[]) 19:24:07 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x9fffffff}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 855.756319] jfs: Unrecognized mount option "uid=" or missing value 19:24:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file1\x00', 0x204000000000c) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:07 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000380)={0x1000, 0x8000}) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x2) mq_notify(r2, &(0x7f0000000240)={0x0, 0x5, 0x0, @thr={&(0x7f0000000640)="0058ca1e841f2f61587df78e45a638e7dd07d9bc3f648b1b87fa8f2b6bab6ee266e6e711db0549abd5a2b9a41ae4e2543a3650486585508c830a64b8fbf14ba13d132d078c7be5cdd13b7e6d757d6991ac0915d53395cea3eff84a2d3747eb5a9893e76926b7d98de3b200e07d7ce34531ede41480b36c6d6f5328e1094c36ae70ada13fc9b6473ae60254c785319e921d908652bc41b7d61c201f8c6cfcc23652556aa4285eab87dae7befbe2f4c7eb456c18292a4a3c5e6faac32224506a66671b18bef3f875c2ef28aa980a1c431b185532606e45f2f42fea1294efc9ae70ccc731e107bd550b944a147707ed3a474af8b4", &(0x7f0000000740)="4efa4997e6aab90b4e625f2c95a1903814b1cc63b99096e772a56b2faac3cb1aea28c684140c41f4526a7ecd87038bb8b838c8756efc23b0bcd9ee697076c44d0c2b0b75485b1055cc8c38a8c3bc5ce2a7f383988a7fd02446019328fabfb629b7d6f308b311fdb80b62a361461c2bf3bac530fbf19412a22166b29c00fa69618110353b45372691f439bfba417e692966844cfd4201db6d32498cfb4aa044f8e87832b4b8811be58aa4371daccdf1ae99469cc6df149067beb04461e4460f146b85d20332b3404af6a01b11e1f7ebd756b390b4c1c4284b8db015efcd4988971eef8aac70e075d3c77082f1cf7b4af11e4109"}}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) getsockopt$sock_buf(r2, 0x1, 0x1c, &(0x7f0000000280)=""/20, &(0x7f00000002c0)=0x14) 19:24:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1e, &(0x7f0000000240)=ANY=[]) 19:24:07 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000440)=[{&(0x7f0000000080)=""/128, 0x80}, {&(0x7f0000000100)=""/56, 0x38}, {&(0x7f0000000140)=""/47, 0x2f}, {&(0x7f0000000280)=""/74, 0x4a}, {&(0x7f0000000300)=""/111, 0x6f}, {&(0x7f0000000380)=""/135, 0x87}], 0x6, 0x0) [ 855.812927] jfs: Unrecognized mount option "uid=" or missing value 19:24:07 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0d6be90900000000000000ae3c3934392c00aa"]) 19:24:07 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) lseek(r0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000240)={0xa0, 0x0, 0x6, {{0x1, 0x0, 0x6, 0xa6b8, 0x1800000000000000, 0xb67, {0x3, 0xb4, 0x6, 0xffffffff, 0x7, 0x1, 0x1, 0xfff, 0x380e, 0x5cf, 0xe092, r1, 0x0, 0x1000000000000, 0x6}}, {0x0, 0x7}}}, 0xa0) chdir(&(0x7f0000000340)='./file0/file0\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x10000, 0x0) [ 855.908988] jfs: Unrecognized mount option "uid=" or missing value [ 855.954425] jfs: Unrecognized mount option "uid=" or missing value 19:24:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xd826000000000000, &(0x7f0000000240)=ANY=[]) 19:24:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0xfffffffffffffffd, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',r\x00otmode=00000000000000user_id=', @ANYRESDEC=0x0, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00d=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x8, 0x1) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x1) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000108000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002bb5b2871b5d3a2ea2232998158e638273797374656dcc637075736574636772"], 0x90) 19:24:08 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3de41c0000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:08 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90a00000000000000ae3c3934392c00aa"]) 19:24:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x6, 0x402000) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x80000000, 0x800, 0x7, 0xadb, 0x100, 0xffff, 0xfff, {0x0, @in={{0x2, 0x4e20, @rand_addr=0x7e89e303}}, 0x2, 0x100000000, 0x3f, 0x7, 0x196b}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e24, @multicast1=0xe0000001}}, 0x9, 0x7, 0xffffffff7fffffff, 0xffffffffffff7fff, 0x100000000}, &(0x7f0000000380)=0x98) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000400)={0x303, 0x33}, 0x4) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000003c0)={0x29, 0x15, 0x17, 0xb, 0x3, 0x8001, 0x4, 0x133, 0x1}) 19:24:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xffff1f00, &(0x7f0000000240)=ANY=[]) 19:24:08 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3c00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 856.907616] jfs: Unrecognized mount option "uid=" or missing value [ 856.937805] jfs: Unrecognized mount option "uid=" or missing value 19:24:09 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90200000000000000ae3c3934392c00aa"]) 19:24:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:09 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) r1 = dup3(r0, r0, 0x80000) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000180)={0xa, 0x0, 0x2, 0x5, 'syz0\x00', 0x20}) 19:24:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x14000000, &(0x7f0000000240)=ANY=[]) 19:24:09 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 857.041829] jfs: Unrecognized mount option "uid=" or missing value [ 857.076080] jfs: Unrecognized mount option "uid=" or missing value 19:24:09 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000440)=[{&(0x7f0000000080)=""/128, 0x80}, {&(0x7f0000000100)=""/56, 0x38}, {&(0x7f0000000140)=""/47, 0x2f}, {&(0x7f0000000280)=""/74, 0x4a}, {&(0x7f0000000300)=""/111, 0x6f}, {&(0x7f0000000380)=""/135, 0x87}], 0x6, 0x0) 19:24:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000280)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000005c000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:09 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90800000000000000ae3c3934392c00aa"]) 19:24:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1a000000, &(0x7f0000000240)=ANY=[]) 19:24:09 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4d00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:09 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x11}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1b00, &(0x7f0000000240)=ANY=[]) 19:24:09 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 857.361629] jfs: Unrecognized mount option "uid=" or missing value [ 857.389478] jfs: Unrecognized mount option "uid=" or missing value 19:24:10 executing program 0: read(0xffffffffffffffff, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:10 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90e00000000000000ae3c3934392c00aa"]) 19:24:10 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xaa04, &(0x7f0000000240)=ANY=[]) 19:24:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file1\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="666484", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x2, 0x0) sendmsg$nfc_llcp(r1, &(0x7f0000001840)={&(0x7f0000000340)={0x27, 0x0, 0x1, 0x4, 0x8001, 0x7fff, "ab5f62848c4fe20695505fc3328c050dd9c0bd6c19f25c584194de4a184d02376706b7473b7e4c294f36ab43dc523c5061f651028866b933b8a570056e2655", 0x2a}, 0x60, &(0x7f00000003c0)=[{&(0x7f00000002c0)="97f8681938e666389994bba4a7469654761f5ef8557662eae1aea905c3e6119c3d49c048df7314157c03cae0970170f95c52", 0x32}, {&(0x7f0000000480)="da1665358d4df3189fca00747eb60cf800a48534a2ca65993d6a46d6c5b8c3d588cd76a954962955c7d4110cc5cbd93f62de923c0e99277d2f8d6c84fd5c5413ce1fafb76ca06c16df3d1117be11a4388165a01a13f43c41cc9e2ffd574775f23d168ad455a343f1b8a583279c2476e670b53d1827ac25", 0x77}, {&(0x7f0000000640)="718da6079e5181933c7748f87aa84161e57dd88c8fa8a37dc6b2cc5727ed4d1775696bbe0ade97f6c766c6b4ece9eb86b480b22c05b3a60fb319791c39da7d470118164961096dfe9f760692bfa772bb5be3deb4c9eee031f65ed508c2a3a121263bb566967cb2c317a12b403e4229cc7602cfda794eb25e09cbcf08890b5b9153e6a807de68507daeac6fe0096faae71ca589989cb24beade6a21e975c917cf5b68ce4455dd0a0cbb5f583700f59bfa979a47d1a142da7ee42e6d5f9ba53d34a278847a9883f6", 0xc7}, {&(0x7f0000000740)="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", 0x1000}], 0x4, &(0x7f0000001740)={0xf8, 0x84, 0xffffffffffff8000, "38b968e1e96cf96745bfdb5bb1be1d064ea844f6a3444e89b442ab1fb40c4fee3b7d0fde5dac5f021ba62cc55e2af934f9bf6164300dca97314d916b8835836ca1f46c03ee3edf764f805ac15e216077b35fc207e42b0edc41e9dbf984c0a250e8eaef9dda8ac6b434cc5555fefe4f966d33fa54f24a251a5b119a5430ae1baa1964d5a92bfa1500fd0dd23a709ae612f7be043374e140665f9ffd22c9984f0152f568aea554bac704b8f29f3910e8c57fb7d1d7c43a8b677ae054d01cc016470cfa4bd8654faf5b18dab447b7fb65f869d96adc0562039c281652997792b2c82e"}, 0xf8, 0x40000}, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 19:24:10 executing program 6: r0 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0xc4, 0x400000) mkdirat(r0, &(0x7f0000000340)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="a8e64f9a319668c3872c80"]) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x200800, 0x0) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r1, &(0x7f00000070c0), 0x8c0) r5 = fcntl$dupfd(r2, 0x0, r2) write$9p(r5, &(0x7f0000000240)="5b907e", 0x3) write$FUSE_ATTR(r0, &(0x7f0000000380)={0x78, 0x0, 0x3, {0x4846, 0x5, 0x0, {0x0, 0x4, 0x80000000, 0x5, 0x9, 0x14, 0x1, 0x4, 0x3f, 0x1, 0x9, r3, r4, 0xd39e, 0x1}}}, 0x78) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x2, 0x2, 0x17}}, 0x30) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) fcntl$setstatus(r2, 0x4, 0xc00) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1d, &(0x7f0000000240)=ANY=[]) 19:24:10 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 858.452778] jfs: Unrecognized mount option "uid=" or missing value [ 858.490217] jfs: Unrecognized mount option "uid=" or missing value 19:24:10 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xe78f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x12, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040)={0x303, 0x33}, 0x4) 19:24:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000180)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:10 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[], 0x0) 19:24:10 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90c00000000000000ae3c3934392c00aa"]) 19:24:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x3f00000000000000, &(0x7f0000000240)=ANY=[]) 19:24:10 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 858.612685] jfs: Unrecognized mount option "uid=" or missing value 19:24:10 executing program 5: 19:24:10 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90600000000000000ae3c3934392c00aa"]) [ 858.658850] jfs: Unrecognized mount option "uid=" or missing value [ 858.740748] jfs: Unrecognized mount option "uid=" or missing value [ 858.777559] jfs: Unrecognized mount option "uid=" or missing value 19:24:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x11000000, &(0x7f0000000240)=ANY=[]) 19:24:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=""/69, 0x45) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3800}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:24:11 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90700000000000000ae3c3934392c00aa"]) [ 859.148603] jfs: Unrecognized mount option "uid=" or missing value [ 859.181342] *** Guest State *** [ 859.184810] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 859.193294] jfs: Unrecognized mount option "uid=" or missing value [ 859.193729] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 859.209207] CR3 = 0x0000000000000000 [ 859.213042] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 859.219118] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 859.225172] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 859.232046] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 859.240383] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 859.248430] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 859.256461] ES: sel=0x0000, attr=0x00081, limit=0x00000000, base=0x0000000000000000 [ 859.264595] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 859.272642] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 859.280768] GDTR: limit=0x00000000, base=0x0000000000000000 [ 859.288957] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 859.297014] IDTR: limit=0x00000000, base=0x0000000000000000 [ 859.305079] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 859.313219] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 859.321071] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 859.328723] Interruptibility = 00000000 ActivityState = 00000000 [ 859.334999] *** Host State *** [ 859.338276] RIP = 0xffffffff811f4fc4 RSP = 0xffff8801927df350 [ 859.344387] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 859.351063] FSBase=00007f13ce689700 GSBase=ffff8801dae00000 TRBase=fffffe0000003000 [ 859.358919] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 859.364922] CR0=0000000080050033 CR3=00000001b905a000 CR4=00000000001426f0 [ 859.372005] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87a01380 [ 859.378738] EFER = 0x0000000000000d01 PAT = 0x0000000000000000 [ 859.384953] *** Control State *** [ 859.388473] PinBased=0000003f CPUBased=b5a06dfa SecondaryExec=000000c2 [ 859.395208] EntryControls=0000d1ff ExitControls=0023efff [ 859.400895] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 859.408057] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 859.415138] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 859.421773] reason=80000021 qualification=0000000000000000 [ 859.428164] IDTVectoring: info=00000000 errcode=00000000 [ 859.433836] TSC Offset = 0xfffffe307e939e56 [ 859.438348] TPR Threshold = 0x00 [ 859.441779] EPT pointer = 0x00000001d8a4101e 19:24:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) inotify_init1(0x80000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce655c316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000dbb7839a7aaa8176f86d0aff04f289453cbe50b0404e701e49742ed3c9956c985114212c86466582b5a4e2f085a26bf4e911875442b82ae3a2c7ff3db0ed65ab2c82b781f9798ab7ddc8d8233359e2aad54a62183ab319c3779da6967c2b684b610eb5cb5c3c3c4cab2bf0dbf64c10a5dd7fafe3ccf6c0cd1575aa38"], 0x90) 19:24:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xfdfdffff, &(0x7f0000000240)=ANY=[]) 19:24:11 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x8100, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000280)={0x0, 0xa0d2}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000300)={r2, 0xfffffffffffffff8, 0x6, [0x4, 0x8, 0x3c, 0xff, 0x4, 0x7f]}, &(0x7f0000000340)=0x14) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0xfffffffffffffffd, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl(r3, 0x4, &(0x7f0000000080)="322e58b718bfd113521217c88db099672cfc46e8483421c947d829e55709adfde372db4e75123b982511a052fc6dcb5d34884decf15599e5a35f7b01fa96bf5dc1531771c5f91d5ea52dc525b02fa274a67603861fc01fde0afd461c4020de97adfdc432301e333e40586977afce8475368be9a8ec6f12d19eb894ce7b095d03550e9ec003234c76a39bd141713675a3d41e7e3806e172b4f27cd5b0fcd4fd39458db7a466aeb7bd14bdbc1edfbf3ead8a4116b15848bf579987") 19:24:11 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x71000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be94600000000000000ae3c3934392c00aa"]) [ 859.479737] *** Guest State *** [ 859.483212] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 859.492567] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 859.501484] CR3 = 0x0000000000000000 [ 859.505384] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 859.511471] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 859.517717] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 859.524643] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 859.532687] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 859.540770] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 859.548803] ES: sel=0x0000, attr=0x00081, limit=0x00000000, base=0x0000000000000000 [ 859.556864] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 859.564995] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 859.573051] GDTR: limit=0x00000000, base=0x0000000000000000 [ 859.581331] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 859.589386] IDTR: limit=0x00000000, base=0x0000000000000000 [ 859.597629] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 859.606611] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 859.613101] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 859.620622] Interruptibility = 00000000 ActivityState = 00000000 [ 859.626913] *** Host State *** [ 859.630197] RIP = 0xffffffff811f4fc4 RSP = 0xffff880191707350 [ 859.636417] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 859.642883] FSBase=00007f13ce667700 GSBase=ffff8801dae00000 TRBase=fffffe0000003000 [ 859.650780] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 859.656737] CR0=0000000080050033 CR3=00000001b905a000 CR4=00000000001426f0 [ 859.663935] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87a01380 [ 859.670990] EFER = 0x0000000000000d01 PAT = 0x0000000000000000 [ 859.677183] *** Control State *** [ 859.680868] PinBased=0000003f CPUBased=b5a06dfa SecondaryExec=000000c2 [ 859.687672] EntryControls=0000d1ff ExitControls=0023efff [ 859.693237] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 859.700395] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 859.707152] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 859.713405] jfs: Unrecognized mount option "uid=" or missing value [ 859.713795] reason=80000021 qualification=0000000000000000 19:24:11 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 859.726739] IDTVectoring: info=00000000 errcode=00000000 [ 859.732259] TSC Offset = 0xfffffe305534a04c [ 859.736633] TPR Threshold = 0x00 [ 859.740045] EPT pointer = 0x00000001c673b01e [ 859.759696] jfs: Unrecognized mount option "uid=" or missing value 19:24:11 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) socket$vsock_stream(0x28, 0x1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={&(0x7f0000000980)={0x10, 0x3}, 0xc, &(0x7f00000014c0)={&(0x7f0000000000)=@newsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000001, @in=@local={0xac, 0x14, 0x14, 0xaa}}, {@in=@multicast1=0xe0000008, 0xffffff9e, 0x3c}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}, 0x1}, 0x0) 19:24:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) socket$can_bcm(0x1d, 0x2, 0x2) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xc000000, &(0x7f0000000240)=ANY=[]) 19:24:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90300000000000000ae3c3934392c00aa"]) 19:24:11 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 859.852190] mip6: mip6_destopt_init_state: spi is not 0: 2667577343 [ 859.874807] jfs: Unrecognized mount option "uid=" or missing value 19:24:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000080)={[], 0x0, 0x6, 0x10000003}) 19:24:11 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:11 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be91100000000000000ae3c3934392c00aa"]) [ 859.898743] jfs: Unrecognized mount option "uid=" or missing value 19:24:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1a00, &(0x7f0000000240)=ANY=[]) [ 859.963699] jfs: Unrecognized mount option "uid=" or missing value [ 859.988746] jfs: Unrecognized mount option "uid=" or missing value 19:24:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000240)=@req={0x28, &(0x7f0000000180)={'veth0_to_bond\x00', @ifru_names='veth0_to_bridge\x00'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:12 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000080)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:12 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be91200000000000000ae3c3934392c00aa"]) 19:24:12 executing program 5: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6_sctp(0xa, 0x200000000000005, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000000)=0xfffffffffffffff7, 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x21, &(0x7f0000ad2000), &(0x7f0000000080)=0x23c) 19:24:12 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x9cffffff}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x4800, &(0x7f0000000240)=ANY=[]) 19:24:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0xa040, 0x0) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:12 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = dup(r0) accept$packet(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000240)=0x14) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 860.941043] jfs: Unrecognized mount option "uid=" or missing value 19:24:13 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x85ffffff}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:13 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xf46, 0x200000) r1 = mq_open(&(0x7f0000112000)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x0, 0x6, 0x1}) mq_timedsend(r1, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x2000400) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000440)=ANY=[@ANYRES64=r2, @ANYRESDEC=r1, @ANYBLOB="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", @ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYRESHEX=r2, @ANYRES64, @ANYRES64=r0, @ANYRES32=r2, @ANYRESHEX]], 0x150) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) futimesat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={{0x77359400}, {r3, r4/1000+10000}}) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x4) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) flock(r1, 0x9) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x1000000016, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_notify(r1, &(0x7f00000003c0)={0x0, 0x24, 0x0, @thr={&(0x7f0000000600)="69e9396f340897f6aeb606e639ea2325534fea74f167e11f6f861393e92996deb147afb8c811d1564b0287b5784e421f9c76f224f96cdc162fe52423774648fec2f07c88839f9736767645f98a44b25dd7148f0c17a7555d3c97f5a20fdaae1075421d26ec2422bf19909043ff9262252485c46497399c118b45040439163a0a5390cad61c4e8d6e4f94d2e24181c17d06b2ad6819a523d0b9f5dc19b75180b5b8c31928718bc3b9", &(0x7f00000006c0)="d9b6c91e36b8aa8f65c11108e4e05212a1609fdc423d4ab43ea1dff1ab2197575e762de157c11b6536b64f953f80bc030556d5b44284336a6e22e9ab2797331076e60d1a374543e72561474ab6dbbba290a4d3c9b1695e046d48640ac46dbe6dfcd8436143e3716ae2593df3d2fc0abc95e829857feaeb3d5d584b0c5b3012ac90f10efc48b05c58614134add2450fbae06ac0aa885c505c"}}) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f0000000100)={'ifb0\x00', {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}) recvfrom$inet(r0, &(0x7f0000000080)=""/52, 0x34, 0x40, &(0x7f00000000c0)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) mq_timedsend(r1, &(0x7f0000fe5fff), 0x0, 0x81, &(0x7f0000438ff0)={0x0, 0x1c9c380}) 19:24:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x900, &(0x7f0000000240)=ANY=[]) 19:24:13 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be91000000000000000ae3c3934392c00aa"]) [ 861.019809] jfs: Unrecognized mount option "uid=" or missing value 19:24:13 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1100}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x10, &(0x7f0000000240)=ANY=[]) 19:24:13 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x40001, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}) getitimer(0x0, &(0x7f0000000240)) memfd_create(&(0x7f0000000180)='\x00', 0x2) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f00000000c0)=""/157) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000040)={{0x3a, @dev={0xac, 0x14, 0x14, 0xe}, 0x4e20, 0x1, 'none\x00', 0x4, 0xe800000000000000, 0x68}, {@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e23, 0x1, 0x6, 0x1, 0x1000}}, 0x44) write(r0, &(0x7f0000c34fff), 0xffffff0b) prctl$intptr(0x1d, 0x0) 19:24:13 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x80ffff}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 861.120136] jfs: Unrecognized mount option "uid=" or missing value [ 861.162916] jfs: Unrecognized mount option "uid=" or missing value 19:24:14 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) mkdirat(r0, &(0x7f00000003c0)='./file0\x00', 0x81) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f00000070c0), 0x8c0) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYRES64], 0x8) 19:24:14 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90d00000000000000ae3c3934392c00aa"]) 19:24:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6900}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x600000000000000, &(0x7f0000000240)=ANY=[]) 19:24:14 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000240)={0x40, @tick=0x8, 0x4, {0x8, 0x8001}, 0x1, 0x3, 0xffffffff}) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x145000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f00000002c0)) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x20840, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000640)='/dev/audio#\x00', 0x80000001, 0x4000) linkat(r1, &(0x7f00000003c0)='./file0\x00', r2, &(0x7f0000000680)='./file0\x00', 0x1400) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000002c0)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000006c0)={0x0, 0x1, 0x30}, &(0x7f0000000700)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000740)={r4, 0x9, 0x2, [0x1, 0xfffffffffffffff9]}, 0xc) r5 = syz_open_dev$sndpcmp(&(0x7f0000000340)='/dev/snd/pcmC#D#p\x00', 0xff, 0xb0040) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x2, 0x9, 0x4, 0x4, 0x0, 0x9, 0x1204, 0x0, 0x890b, 0x1, 0x40, 0x1, 0x8, 0x8, 0x7, 0x800, 0x8000, 0x7, 0x5c, 0x6, 0x80, 0x0, 0x9, 0x7, 0x40, 0x401, 0x5, 0x6, 0x1, 0x1000, 0x7, 0x4, 0x6, 0x9508, 0x9, 0x20, 0x0, 0x6, 0x0, @perf_config_ext={0xfffffffffffffffc, 0x158000000000}, 0x4040, 0x5, 0x2, 0x5, 0x200, 0x8, 0x1}, r3, 0xa, r5, 0x0) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7580e6a4bc22", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) socket$inet6(0xa, 0xa, 0x8b) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d303030303030303030304f78e6e9f01d92bb353030300f2c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x4000, 0x1fff5, &(0x7f0000ffc000/0x4000)=nil) shmat(r1, &(0x7f0000003000/0x3000)=nil, 0x0) 19:24:14 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0xa0000) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) fchmod(r0, 0x4) sched_setscheduler(r2, 0x1, &(0x7f0000000080)=0xffffffffffff0001) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) sendmsg$key(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x13, 0x9, 0x0, 0x7, 0x0, 0x70bd2d, 0x25dfdbfc, [@sadb_x_sa2={0x2, 0x13, 0x6, 0x0, 0x0, 0x70bd2a, 0x3501}, @sadb_x_sa2={0x2, 0x13, 0x2, 0x0, 0x0, 0x70bd2c, 0x3500}, @sadb_x_nat_t_type={0x1, 0x14, 0x1000}]}, 0x38}, 0x1}, 0x14) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xffffff85}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xffff1f0000000000, &(0x7f0000000240)=ANY=[]) 19:24:14 executing program 5: [ 862.611805] jfs: Unrecognized mount option "uid=" or missing value [ 862.647562] jfs: Unrecognized mount option "uid=" or missing value 19:24:14 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90500000000000000ae3c3934392c00aa"]) 19:24:14 executing program 5: 19:24:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x69}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x8cffffff, &(0x7f0000000240)=ANY=[]) 19:24:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3de41c00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:14 executing program 5: [ 862.761880] jfs: Unrecognized mount option "uid=" or missing value 19:24:14 executing program 5: 19:24:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x9cffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 862.816173] jfs: Unrecognized mount option "uid=" or missing value 19:24:15 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x100000000, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @multicast2=0xe0000002}}, 0x3, 0x0, 0x18879e1d, 0xfffffffffffffeff, 0x3}, &(0x7f0000000340)=0x98) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000380)={r2, 0x0, 0xfffffffffffffffb, 0x4}, 0x10) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:15 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90400000000000000ae3c3934392c00aa"]) 19:24:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1f00, &(0x7f0000000240)=ANY=[]) [ 863.787836] jfs: Unrecognized mount option "uid=" or missing value [ 863.821256] jfs: Unrecognized mount option "uid=" or missing value 19:24:16 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:16 executing program 5: 19:24:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x0, 0x0) getsockname$inet6(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x1c) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:16 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90b00000000000000ae3c3934392c00aa"]) 19:24:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x2, &(0x7f0000000240)=ANY=[]) 19:24:16 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) prlimit64(r1, 0x0, &(0x7f0000000100)={0x547, 0x9}, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) recvmsg(r2, &(0x7f0000000140)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000280)=""/144, 0x90, 0x1}, 0x40) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:16 executing program 5: 19:24:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x68, &(0x7f0000000240)=ANY=[]) 19:24:16 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x97f81a00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:16 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be91400000000000000ae3c3934392c00aa"]) 19:24:16 executing program 5: [ 864.106093] jfs: Unrecognized mount option "uid=" or missing value [ 864.137729] jfs: Unrecognized mount option "uid=" or missing value 19:24:16 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x9fffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 864.209450] jfs: Unrecognized mount option "uid=" or missing value [ 864.234810] jfs: Unrecognized mount option "uid=" or missing value 19:24:16 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) rt_sigsuspend(&(0x7f0000000180)={0x1}, 0x8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="664f01", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000000f64ca9773adf69d0d2d145bb3e3e0000000b000000000066ce30d6f2d9c0cd0473656d3100000000000000000000000000000000000000000001000000000000002c000000000000000000170000000000008c0000000000001c000000000000002b63797374656dcc6370757365746367726f0000000000000000000000"], 0x90) 19:24:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xffffffffffffffff, &(0x7f0000000240)=ANY=[]) 19:24:16 executing program 5: 19:24:16 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be909fcfdffff000000ae3c3934392c00aa"]) 19:24:16 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='fuse\x00', 0x80000, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1400}, 0x2c}, {@max_read={'max_read', 0x3d, 0x5}, 0x2c}, {@allow_other='allow_other', 0x2c}, {@default_permissions='default_permissions', 0x2c}]}}) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0xffffffffffffffc6) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) open$dir(&(0x7f0000000180)='./file0\x00', 0x101000, 0x10) write$FUSE_DIRENT(r0, &(0x7f00000002c0)=ANY=[], 0xfffffffffffffca5) [ 864.914959] jfs: Unrecognized mount option "uid=" or missing value [ 864.961087] jfs: Unrecognized mount option "uid=" or missing value 19:24:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000002000000000000000001000000000000002c00000000afd700000000000000000000000000000000001c000000000000002faed576f5f66ebb1270757365746367726f7570246367726f757015000000002c9204071ac3c1dd6f1073d22ae042d3da4f81e1855fe95a9972e971e149dcf0395a44eb576fbec7ff8b0d03cbfa2320132abd5d81f22dea8552b0b7fac100808ad55f6e9cfaaa595f9319fcbec1299920d0311cd7fe8f5750c46433cabef4aa7c07f0d42b53d7e2a75ff2769123b5000000000000000000000000"], 0x90) 19:24:17 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000400)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x48, &(0x7f0000000180)=""/72}, &(0x7f0000000000)="fbe0654bcf00", &(0x7f0000000200), 0x0, 0x0, 0x0, &(0x7f0000000300)}) 19:24:17 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6900000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:17 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x8000, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:17 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) ptrace(0x4207, r1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x52, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000001c0)=0x5, 0x4) ptrace$getsig(0x4202, r1, 0x0, &(0x7f00000000c0)) 19:24:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x11, &(0x7f0000000240)=ANY=[]) 19:24:17 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000002000000ae3c3934392c00aa"]) 19:24:17 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4d000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:17 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001280)='/dev/kvm\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28}) ioctl$KVM_SET_GUEST_DEBUG(r3, 0xc018ae85, &(0x7f0000000100)) ioctl$KVM_RUN(r3, 0xae80, 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='.', &(0x7f0000000480)="b3b8155713fb18dea1325403cf49458ea055d7591982903d491d14c2e9cbc39e8bf705c21d4cc6c570ba1b1b03c6db40040c163a6dee9329d669c3a83a02ef2119957d6d4d06f79c5d29c3f97acbbbd1a0034898939712cc63020f31107f31c3a7ea6b055a3d9cd058451eefee6ebdb0357831796761e16f810e2452be7d0bbb99ee890739873f2de48187428342a5e95f625e7b49265dcb01cdb718bd2920863ed6af48bf044ad87394625a24423d5fefebc93d3a4a96d582c636a0bc3ec3fa80854deb41daa221d12ed5bdc1aeaabed9dcbb850b47a98ab25649387ab11d7b205a07b9082b736c17f97d", 0x1004, 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='.', &(0x7f0000000480)="b3b8155713fb18dea1325403cf49458ea055d7591982903d491d14c2e9cbc39e8bf705c21d4cc6c570ba1b1b03c6db40040c163a6dee9329d669c3a83a02ef2119957d6d4d06f79c5d29c3f97acbbbd1a0034898939712cc63020f31107f31c3a7ea6b055a3d9cd058451eefee6ebdb0357831796761e16f810e2452be7d0bbb99ee890739873f2de48187428342a5e95f625e7b49265dcb01cdb718bd2920863ed6af48bf044ad87394625a24423d5fefebc93d3a4a96d582c636a0bc3ec3fa80854deb41daa221d12ed5bdc1aeaabed9dcbb850b47a98ab25649387ab11d7b205a07b9082b736c17f97d", 0x0, 0x0) mount(&(0x7f0000000140)='.', &(0x7f0000000380)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f0000000180)) [ 865.626783] jfs: Unrecognized mount option "uid=" or missing value [ 865.656341] jfs: Unrecognized mount option "uid=" or missing value 19:24:17 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="e2643d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="52e9cbeccc913cd42c005da6e7bc9a7b90c8a881d05e3432d244e09113b2e2f5936cd7bc62d172e4c77986256fdd23fb8586dfe5743b937061b039cf3b3d139cf1c461fc44a73837112072b29bb88a20a4dbbc547c1f4b30852d8d78f187d97407c90cb452d27ced42cd67d3cd5367ce9fdfba9414c0b002c66764883d5f474c371ebf3193b898e57dd138ee9ba3b6d3fdc541bf3fd7d3cff53c9cb79bb9eef49097d9c44529e1c0710b9e3a5ba8"]) socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000180)="2a5b73656c667b766d6e657430da706f7369785f61636c5f6163636573736d643573756d00"}, 0x10) accept4$nfc_llcp(r1, &(0x7f0000000280), &(0x7f0000000340)=0x60, 0x80800) 19:24:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xfdfdffff00000000, &(0x7f0000000240)=ANY=[]) 19:24:17 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90960000000000000ae3c3934392c00aa"]) 19:24:17 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3f00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:17 executing program 5: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() capset(&(0x7f0000000380)={0x19980330, r1}, &(0x7f00000003c0)) [ 865.933771] jfs: Unrecognized mount option "uid=" or missing value [ 865.966345] jfs: Unrecognized mount option "uid=" or missing value 19:24:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',r\x00\x00\x00\x00ode00040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) mount$fuse(0x0, &(0x7f0000000180)='./file0/file1\x00', &(0x7f0000000240)='fuse\x00', 0x24802, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c}) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f00000018c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x3ffc}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x80400, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000005c0)={0x9d, {{0xa, 0x4e23, 0xb6, @empty, 0x10001}}, 0x1, 0x1, [{{0xa, 0x4e21, 0x6, @local={0xfe, 0x80, [], 0xaa}, 0xfffffffffffffffa}}]}, 0x110) stat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="67643d29e94c4bb8e348fcbd3c5a3ffdb337ecfd8cb0b4f5b13a055c9d7ba1c85f00bdd6a0121ec3c52c593684595a7d88d821ab9f753924d7e34e915eef73f8cafb7c83c132a6ca4bcf53447bc6cab5eb5511dfb9081b18e7e4ffbd5f2d074a27f8dc073395f89d5aeb5cf7edecc9f932a78bf8bef84f29dfb1d60245f4f3dd3cdfed5dde0e3aa3023650f584ec8cca52e8a66443ef4af90404bedcbe44196a426a87599026165fc63b9a74dc3e402683362eb750f33e669e42711b6d3f77ec0c45e7d06eccc4633a83d37ce52c4348ac8844e0130784358270c6ea52919d416af2415de15ed3", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000240)) read$FUSE(r1, &(0x7f00000008c0), 0x1000) 19:24:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x800000000000000, &(0x7f0000000240)=ANY=[]) 19:24:18 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x40000002211080, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0xbc) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:19 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000140)={0x1d}, 0x10) sendmsg$key(r0, &(0x7f0000cbe000)={0x0, 0x0, &(0x7f0000005ff0)={&(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_port={0x1, 0x0, 0x4e22}, @sadb_lifetime={0x4}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast2=0xe0000002}}, @sadb_x_nat_t_port={0x1}]}, 0x58}, 0x1}, 0x0) 19:24:19 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be909fffffff6000000ae3c3934392c00aa"]) 19:24:19 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xf5ffffff00000000, &(0x7f0000000240)=ANY=[]) 19:24:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000280)=ANY=[], 0xfffffffffffffdc0) 19:24:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netstat\x00') r1 = accept$inet6(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000280)=0x1c) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000002c0)={0x7f, 0x8204, 0x0, 0x4, 0x0}, &(0x7f0000000300)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000340)={0x200, 0x800, 0x8000, 0x100000000, 0x2, 0x1ff, 0x8, 0x51c5, r3}, 0x20) read(r2, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) sched_getparam(r4, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:19 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000000640), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file0/file0\x00', 0x40, 0x8) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000280), &(0x7f0000000340)=0x68) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x200042, 0x0) setsockopt$packet_buf(r2, 0x107, 0x0, &(0x7f0000001640)="738d25c11e6874d7406b57abed5abdcb153c56bfa4dae89dd0e69ec898e219e554506e698a061875bc121fc0809e1878a3e88ce55bf807490149a36d9fa38a049b2e14dd13221e42378e15e695f169855313fc84b951e68087f30a6940079bbd259accbeaf7c20d8f94814116d7b0ba317e67ee7accfd1b5f29a09bf007580e13eb6034a7d57cdb63bdb52027313e679c0df48ad82ba8bbb10bfea2f2fd82eccc55fa3966808f62f965ebfc0567e275416d2c70d4038762bb372ff006f9308b35d8a344808329a3bfb492f04f1fbf88d2a04ec9c9c9b838cb4ee5f087cc1f3c8", 0xe0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xd8260000, &(0x7f0000000240)=ANY=[]) [ 867.035429] jfs: Unrecognized mount option "uid=" or missing value 19:24:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) pivot_root(&(0x7f0000000000)='./file0/file0/file0\x00', &(0x7f00000001c0)='./file0/file0\x00') stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d, r1}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)=0x4, 0x4) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2cecdc6f75705f69643d2b4daff80402e11a957ac8392083cc836334da7699f525e2ec2d5b797fad8c97a7267ef8eec56d7b79b1fea9b9c0e98e6d7763287ff03277d619c582a3d063f54ab947fc20a1cd536367cdee5ff2577c51bbf04250b80d338f2f6b58e96718b5d648a9a8887edc3ddd46f83227", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af300200f5abfb9845f9e19859c9693206f2c60b0000000719e1d66e970123d893d974e5b9c3285677b2139823e5500c92ab5b94da3a7de19f063bb765b02bd5b660fb7fa898c6f5c6369c3f363068d10af833f6475bbe8b7967255b177607ba100f6c4654718232dbda64aa1f69cf9ab5b3ea3ed63452b7ebd37c9dae664e322e08ad8f6029fe8fd0b34c7117480471aeca0a3fc9eceb28509ca8a83e4f8b85131808bc5cfb4cc24e1901769c084c082712b470666b6dddf74ced693973ba1ded8b") fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x100000086, &(0x7f00000001c0)=0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000080)="025cd83daae65f8f762070") io_submit(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000000040)={0x0, 0x0, 0x8, 0x0, 0x0, r0, &(0x7f0000000080)="fc", 0x1, 0x1000000}]) 19:24:19 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 867.118952] jfs: Unrecognized mount option "uid=" or missing value 19:24:19 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be9090000007a000000ae3c3934392c00aa"]) 19:24:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x8000000, &(0x7f0000000240)=ANY=[]) 19:24:19 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3c000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") shmctl$IPC_SET(0x0, 0xb, &(0x7f0000000580)) 19:24:19 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x337103eed5d56805, 0x0) mkdirat$cgroup(r0, &(0x7f0000000280)='syz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f00000002c0)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000640)) r2 = socket(0xb, 0x2, 0x9) getpeername$llc(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x10) read$FUSE(r1, &(0x7f00000070c0), 0x8c0) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 867.246317] jfs: Unrecognized mount option "uid=" or missing value 19:24:19 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x11000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:19 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xffffff85}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xf00, &(0x7f0000000240)=ANY=[]) 19:24:19 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90974000000000000ae3c3934392c00aa"]) [ 867.293504] jfs: Unrecognized mount option "uid=" or missing value [ 867.397601] jfs: Unrecognized mount option "uid=" or missing value [ 867.428942] jfs: Unrecognized mount option "uid=" or missing value 19:24:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x267a, &(0x7f0000000240)=ANY=[]) 19:24:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xe00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:20 executing program 5: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x10600, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0xc, &(0x7f0000000100)={0x0, {{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, 0xffffffffffffff02) 19:24:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:20 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000040000000ae3c3934392c00aa"]) 19:24:20 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = fcntl$dupfd(r0, 0x0, r0) write$binfmt_elf64(r1, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0xffffffff80000000, 0x4, 0x6, 0x4, 0x3, 0x7, 0x2, 0x40, 0x40, 0x182, 0x80000000, 0xffffffff, 0x38, 0x1, 0x100, 0x1, 0x3}, [{0x70000000, 0xfffffffffffffffd, 0x5, 0x1, 0x9, 0xffffffffffffffa6, 0x8, 0x6}, {0x7, 0xa09c, 0x5, 0x3, 0x5, 0x7, 0x9347, 0x6}], "a4264ec162b1f60c73f1f5313fd74263feeffa42cf01f6262ad2d50e742ed3bc6a98c83e4745bdf5a049b017f817b1d962347b230f6ee504fb15126ca5b8a49f7f8c3dcfd81fd0afcab3c38ee690a151a1655d9c66942ee6022264fa78bc54dfc9079b01", [[], [], []]}, 0x414) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:20 executing program 1: pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x4000) r1 = open(&(0x7f0000000440)='./file0/file1\x00', 0xc0080, 0x100) mkdirat(r1, &(0x7f0000000600)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00e505333eb0a34f452ce6c7aac8bb627d5f359ccde7008b9cfcea41f531922660b42fa792faa7f7e400764f1c427af08b27340735ba7dd9a7e9ea747ecaeef0f378d8d0b0d0c15f432bb7fd60652bd5dec3d59b18d906eb784ce6a2954bd5b516e5d3c510cd0bfbc3fc4e085a2ea441faec768052793fe7ab718fec91ed7b76d525bea521ba332f28d048"]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r2, &(0x7f0000004000), 0xca08a7b7155ac657) read$FUSE(r1, &(0x7f0000000b80), 0x1000) read$FUSE(r2, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="66643d515c5cdbbd0554b87d9bb7c653a7cfefadb906df8aaedc5581f893159bf921f8de3f757630d26af2db6d0d09f3bae2", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r2, &(0x7f00000009c0)=ANY=[@ANYPTR=&(0x7f0000000b00)=ANY=[@ANYRESDEC=r4, @ANYRESHEX=r4, @ANYRESOCT=0x0, @ANYBLOB="da7da32ad1db1b052ef5e225a22edd8e2b03405634528bdcb5aac27d7bd4db6308b95e5d7403f467baf9481505", @ANYPTR=&(0x7f0000000a00)=ANY=[@ANYRES32=r4, @ANYRES32=r0, @ANYRES64, @ANYBLOB="494d30aab3e1c43036ac948a2ff2645a1120f8003fc4cc29e3d88be9a31a14121616734a5cf2c47df36011bb7c180ccf9432e9aa0110fb9647e2d765ec4881162ce85c225c24cc5672ef7628c4aeb7a2cb3bccf38e0e80d654cc995990e80b2d309e473da18464dc1db181eba2d46a8cdfe47078b8db00fd5b241802eb8d8737cd4d8b3ed7fcf421b6824d7a9c8764661184", @ANYRES32=r1], @ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYPTR, @ANYRESHEX=r3]], @ANYPTR, @ANYPTR=&(0x7f0000000900)=ANY=[@ANYRESOCT=r1, @ANYRESOCT=r1, @ANYRES64=r1, @ANYRESHEX=r0]], 0x95034c5aec7640c1) 19:24:20 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f00000003c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000440)=0x9f) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) write(r0, &(0x7f0000000080)="fa027bcda41a24a1716334cb0e79bf80480035b0cad8df937ab4631c4cb6b2ef1ce880bcba8118ea47a3867138db05761d551631885509ef7d0d5a6cdc030ae824787f53b59d3e717a3ea355afbd04fea42963a6a8f3ce5ef57590b001f9e24aa67f3aa81103f6ede19c513f41689015ec34a867c7913e6f5c89b07f5f4c6ff32da0346a0104572720a0bd54f137d6f092d0e88599b04036342010e7898d00143bb6bbca325e88c878d8d8fbe1de7eaa68160a42e8436e9a3e4bc33ca577d4687e34f06026f0ef4c3511d65691a407e9fa171ab237b5160aacd99e132cc3fd7d8699b4f1f07c8a420674d255e8cb83d5e5f02a", 0xf3) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) connect$rds(r1, &(0x7f0000000380)={0x2, 0x4e21, @broadcast=0xffffffff}, 0x10) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f00000001c0)) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000280)) 19:24:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) pivot_root(&(0x7f0000000000)='./file0/file0/file0\x00', &(0x7f00000001c0)='./file0/file0\x00') stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d, r1}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)=0x4, 0x4) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x2000000000000, &(0x7f0000000240)=ANY=[]) 19:24:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1018}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000000980), 0xfffffffffffffd19) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x8001, 0x1) sendmsg$unix(r1, &(0x7f00000008c0)={&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000840)=[{&(0x7f0000000340)="6e0fa7c6bf5617cae5ee21c4ad3a186fb462fe2a5e0e97ff4210b7bef3e831c0170a77d05a9cc199aff64640136049b6e72e34d29f8d867be372e0e9573e96969b746b702c651ea5c2a9d71e906083ebf22a63b8d5cf3d88eab92ca97b949d63fbd91221ed88d54bf37b0ff860d79079bbe53c9d9eb3b03c89b7e4c77f42043b6716cfa39520daf0698bb0bc9ee464c8ca842d7f57b28a07c1284ec6f42c79eb6f3f7508364ab308bd9eb30b08cdd698", 0xb0}, {&(0x7f0000000640)="5f2324be3992ca37675e168ce284ffe336f8728ec3194f45432c3a6ba9e3164a78c2edc1a487f5f5c00dccab550f432501312a9eaa87c73ecf476bf7c1e6db4d9c643699b446728bdc275b292a5ad3f1eae90975356e15808d007cdf98c4371b36765a966044cbce872037c76db7bc4520fb4aad6e4cbcfb30be8c1d43bb0648bed55d9c20eceeeb272ef47598d4b4a1262ee5cc68031e0d43bc045d", 0x9c}, {&(0x7f0000000700)="78c0179a4eba9121e519de2aaa6d162eae6fa6379439d7f6e6472d309ee24f97ab10df6fd597fd78e25d83baaeac1a63ae9c4fcee6ece45aef6b7c14fd2cd68f6a5a7b2ab5b618da2f2d57d99f776f4e6be49940966d25d564b4edcbba553e3467874b459d69345e0acd994952eaa53b855d1e754f0d1b5befee04bdd006030a48ae9bd9c3ad5ab6a75ec619", 0x8c}, {&(0x7f00000002c0)="050373fe55a6f3", 0x7}, {&(0x7f00000007c0)="e12979599d2b7e2d40", 0x9}, {&(0x7f0000000800)="908e100f0f2240a33fcca38f0fc3d268d5d4318424f21d", 0x17}], 0x6}, 0x20000810) renameat2(r1, &(0x7f0000000900)='./file0/file1\x00', r1, &(0x7f0000000940)='./file0\x00', 0x3) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) fstatfs(r1, &(0x7f0000001980)=""/248) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 868.477948] jfs: Unrecognized mount option "uid=" or missing value [ 868.515316] jfs: Unrecognized mount option "uid=" or missing value 19:24:20 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000004000000ae3c3934392c00aa"]) 19:24:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xf00000000000000, &(0x7f0000000240)=ANY=[]) 19:24:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xa8040000, &(0x7f0000000240)=ANY=[]) 19:24:20 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90903000000000000ae3c3934392c00aa"]) 19:24:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3200000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 868.613685] jfs: Unrecognized mount option "uid=" or missing value [ 868.635329] jfs: Unrecognized mount option "uid=" or missing value 19:24:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x85ffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 868.722036] jfs: Unrecognized mount option "uid=" or missing value [ 868.745810] jfs: Unrecognized mount option "uid=" or missing value 19:24:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="90000800000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d31000000000000f8ff0000000000000000000000000001000000000000002c00000000000000000000000000000000200000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000a79992be84450794014c0805ea53dbdbb3c25153179ee808a35c908de239e7d5658527633a9dfe5603d9af26b4ce9155bc5c042caa7438c969220ebb4392d1f52e08d5c8c7938edacb1f88e2bec78480a6f3d684750b42f17217317820ffd88213b3377805448fbd8cca7e547e2d6ac0687a3027f827d2335183afe5319f43cc66ac74d46bdb597f119d2c5f5b8152c024c4c8107075429c5ad4f0ceff782ce720864988b69e2b9d151b66a8e2eca0a2ed6bef8725a04f76bc9b1f02ec80ec31728320f20d1889c5b91c7a74e423a3b4fb4a7d24"], 0x90) 19:24:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xc0, &(0x7f0000000240)=ANY=[]) 19:24:21 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7900}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:21 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90948000000000000ae3c3934392c00aa"]) [ 869.613465] jfs: Unrecognized mount option "uid=" or missing value [ 869.646889] jfs: Unrecognized mount option "uid=" or missing value 19:24:22 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000000c0)=0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:22 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x18100000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:22 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000240)=ANY=[]) r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0xc0185879, &(0x7f0000000000)={0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}) 19:24:22 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="80f1"]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000034c0), 0xfffffffffffffdb0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000640)='/dev/qat_adf_ctl\x00', 0x800, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000840)={{{@in=@rand_addr, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}}}, &(0x7f0000000940)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001bc0)={0x0, 0x0, 0x0}, &(0x7f0000001c00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000001d40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001d80)={'lo\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001dc0)={{{@in6=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000001ec0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000001f40)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f80)={@dev, @local, 0x0}, &(0x7f0000001fc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003000)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003040)={'sit0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000003480)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x4000040c}, 0xc, &(0x7f0000003440)={&(0x7f0000003080)={0x388, r2, 0xb04, 0x70bd26, 0x25dfdbfc, {0x3}, [{{0x8, 0x1, r3}, {0x78, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r5}, {0xb8, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x20}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4}}, {0x8, 0x7}}}]}}, {{0x8, 0x1, r7}, {0x22c, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4}}, {0x8, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r10}}, {0x8, 0x7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x692}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8}}}]}}]}, 0x388}, 0x1, 0x0, 0x0, 0x10}, 0x840) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x94) r13 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x10000, 0x0) ioctl$BLKBSZSET(r13, 0x40081271, &(0x7f0000000240)=0x3) r14 = open(&(0x7f00000002c0)='./file0\x00', 0x200, 0x2) ioctl$KVM_CREATE_VM(r14, 0xae01, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000280)={0x20, 0x0, 0xb, {0x0, 0x4}}, 0x20) 19:24:22 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90906000000000000ae3c3934392c00aa"]) 19:24:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x19, &(0x7f0000000240)=ANY=[]) 19:24:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x210001, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000640)={{0x3, 0x3, 0x26b8, 0x0, 0x2}, 0x7fffffff, 0x0, 'id0\x00', 'timer0\x00', 0x0, 0x7, 0x2, 0x9da, 0xffff}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 870.088151] jfs: Unrecognized mount option "uid=" or missing value [ 870.100803] FAT-fs (loop5): bogus number of reserved sectors [ 870.106780] FAT-fs (loop5): Can't find a valid FAT filesystem 19:24:22 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x63000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x4000, &(0x7f0000000240)=ANY=[]) 19:24:22 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x80, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000340)=[{{}, 0x6, 0x6, 0x1}, {{0x77359400}, 0x10001, 0x40}, {{0x0, 0x2710}, 0x1, 0xfffffffffffffffc, 0x2}, {{}, 0x7, 0x6, 0x6}, {{r1, r2/1000+10000}, 0x8, 0x2, 0x8}], 0x78) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r3, &(0x7f00000070c0), 0x8c0) read$FUSE(r3, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r3, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r4 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0/file0\x00', 0x48401, 0x140) ioctl$TIOCSSOFTCAR(r4, 0x541a, &(0x7f0000000240)=0x3) write$FUSE_DIRENT(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:22 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90968000000000000ae3c3934392c00aa"]) [ 870.131421] jfs: Unrecognized mount option "uid=" or missing value 19:24:22 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x300}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 870.242624] jfs: Unrecognized mount option "uid=" or missing value [ 870.271351] FAT-fs (loop5): bogus number of reserved sectors [ 870.277306] FAT-fs (loop5): Can't find a valid FAT filesystem [ 870.291561] jfs: Unrecognized mount option "uid=" or missing value 19:24:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x2, 0x0) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f00000002c0)=0x6bbc, 0x4) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) socketpair$inet6(0xa, 0x6, 0x4, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000240)='bpq0\x00') 19:24:22 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:22 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be9097a000000000000ae3c3934392c00aa"]) 19:24:22 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000240)=ANY=[]) r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000200)="025cc83d6d345f8f762070") r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0xc0185879, &(0x7f0000000000)={0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}) [ 870.801734] jfs: Unrecognized mount option "uid=" or missing value [ 870.812214] FAT-fs (loop5): bogus number of reserved sectors [ 870.818207] FAT-fs (loop5): Can't find a valid FAT filesystem [ 870.828870] jfs: Unrecognized mount option "uid=" or missing value 19:24:23 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000080)) 19:24:23 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000010000000ae3c3934392c00aa"]) 19:24:23 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000640)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) syz_mount_image$ceph(&(0x7f0000000480)='ceph\x00', &(0x7f00000004c0)='./file0/file1\x00', 0x342, 0x2, &(0x7f00000005c0)=[{&(0x7f00000006c0)="469f145f4ea72c7cabe41a005045c0d1d5da2bdfdcc7e8c48583b864290f88aac2a904983ac10cf7603e633231c53c790b4c388f87e071ba3f6f95dac39d82297c1e8f19bca6c55a1d18a04570a65b4a143a5f5bf581582cc28428c2894d83877d7507f573725459799263b9694ad099ae19e8263425d2417ab778e151a2b87b6478d307b6b530b5d2912fd592cf2d45346a4a4b1940804c5391481d306395a3139ced9de4ec04561f0df7781f39a0b48f2336b36475a4d0b11890", 0xbb, 0x9}, {&(0x7f0000000780)="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", 0x1000, 0xc0000}], 0x2380000, &(0x7f0000000600)='/dev/dsp#\x00') r1 = socket$inet6(0xa, 0x80000000005, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rtc0\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000540)={0x0, 0xfd, 0x1, [0x3]}, &(0x7f0000000580)=0xa) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000001840)=ANY=[@ANYRES32=r4, @ANYBLOB="cf0000000530842eccae4c80a28da24411a3fcd16902e0016d9cf756aa4dca0bc92981aa8bfa59d084490c98f58e0e36c9cdbd1062963dd5634d5fa02dc7a60195dfd2915cd64b968ae6d67f2be1e0134d0b33596e0bc6fd515c4202b09e3f7ac48f17d5faa1a42c1653871b3bdb6bf14eeb9743025987906c326378fa8293ca227bc2d8b89b042d5137dc2d6cdc5b6abc1bea197c28a5e05f613887b76a50ebcccf3d21d82870b16738df66b6d53a995e1f4c11df33ea7f2685a5f9c969218f29974e59409fa1f3d61421d9502f673a2e5126"], &(0x7f0000001940)=0xd7) sendto$inet6(r2, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000200)={0xa, 0x8035, 0xd, @remote={0xfe, 0x80, [], 0xbb}}, 0x1c) read$FUSE(r0, &(0x7f0000002000), 0x1000) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000001980), &(0x7f00000019c0)=0xc) r5 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0xb5, 0x200100) ioctl$KVM_HAS_DEVICE_ATTR(r5, 0x4018aee3, &(0x7f0000000280)={0x0, 0x7fffffff, 0x8, &(0x7f0000000240)=0x6}) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303a30303030304130303030302830303030303030302c759faac7c3e972940270727365725f698000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) seccomp(0x0, 0x1, &(0x7f00000003c0)={0x8, &(0x7f00000002c0)=[{0xfffffffffffffff9, 0x3f, 0x200, 0xb008}, {0xdd, 0x800, 0x4, 0x10000}, {0xfe, 0xfffffffffffffffd, 0x8001, 0x7}, {0x3, 0x9, 0x1000}, {0x8, 0x8, 0x3a, 0x9}, {0x10001, 0x54c, 0x8, 0xfffffffffffffff7}, {0x7, 0x100000000, 0x3dd3, 0x5fce5abd}, {0x6, 0x2, 0x3, 0x5}]}) socket$inet_udp(0x2, 0x2, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000001780)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f757024636772f866dd7f2ebddf06560cd06d6f75701500000000"], 0x90) 19:24:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x7300000000000000, &(0x7f0000000240)=ANY=[]) 19:24:23 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3c}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:23 executing program 5: r0 = socket(0x9, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) r2 = syz_open_pts(r1, 0x20201) fcntl$setstatus(r2, 0x4, 0x2800) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000180)="bf", 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000698000)=0x200) close(r1) 19:24:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x80302, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000240)={0xaa, 0x8}) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000280)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c, {[{@allow_other='allow_other', 0x2c}]}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x6000000, &(0x7f0000000240)=ANY=[]) 19:24:23 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x4d00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 871.508852] jfs: Unrecognized mount option "uid=" or missing value [ 871.539311] jfs: Unrecognized mount option "uid=" or missing value 19:24:23 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be909fffffdfc000000ae3c3934392c00aa"]) 19:24:23 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vcan0\x00', r1}) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000200)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) prctl$setname(0xf, &(0x7f0000000040)='\x00') 19:24:23 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1810000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 871.622091] jfs: Unrecognized mount option "uid=" or missing value [ 871.651391] jfs: Unrecognized mount option "uid=" or missing value 19:24:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="49403960837ec41fc82c94496a157c789f83619732c3b536057cc6307dcaf79978dec87edc3aa87f93216b9bec30bc1e5c2317b135bd6f0a6a5fc604000000000000002e56f0d1df43bbed67dee12031c1861b4aa6ee1a08ceb2c88e81500f73c944c2ba48bb2260f5f56edab9d0670f17669b5042997d4ed8a78798feb64629e0bedbdc2c116f6c6f8398f00adc8461e90afa"]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x101100, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000400)={0x0, 0x6, 0x8, 0x3, 0xfffffffffffffffe, 0xa44e}) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) r3 = fcntl$dupfd(r1, 0x0, r0) write$P9_RLOPEN(r3, &(0x7f0000000240)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x7}, 0x800}}, 0x18) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726e6f746d6f646d3d3030303030303030303030303030303630304169045730303030302c75736572", @ANYRESDEC=0x0, @ANYBLOB="acc7012126e500be4b5dcf983b4a75845ef9e680e4b3d1b8155c41e5758239d539607bedb1f9ea1d92c14b5f4094ef7e23c8", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1200, &(0x7f0000000240)=ANY=[]) 19:24:24 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x6, 0x20100) getpeername$unix(r0, &(0x7f0000000080), &(0x7f0000000100)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000140)) ioctl$KDDISABIO(r0, 0x4b37) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000280)={'broute\x00', 0x0, 0x3, 0x61, [], 0x2, &(0x7f00000001c0)=[{}, {}], &(0x7f0000000200)=""/97}, &(0x7f0000000300)=0x78) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) preadv(r1, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) 19:24:24 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:24 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f00003de000/0x3000)=nil, 0x3000, 0x1000006, 0x810, r0, 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x4, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={"76657468022f405400", &(0x7f0000000100)=ANY=[]}) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 19:24:24 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900740000000000ae3c3934392c00aa"]) 19:24:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1100, &(0x7f0000000240)=ANY=[]) 19:24:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) getresgid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)=0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d, r1}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x202000, 0x0) recvfrom$llc(r2, &(0x7f0000000640)=""/4096, 0x1000, 0x100, &(0x7f0000000380)={0x1a, 0x304, 0x1f, 0x7, 0x8001, 0x538, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x11}}, 0x10) write$FUSE_WRITE(r0, &(0x7f00000002c0)={0x18, 0x0, 0x7, {0x8001}}, 0x18) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:24 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x32000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:24 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0/file0\x00', 0x100, 0xc0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000002c0)={0x90000000}) syncfs(r0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000340)={0x30, 0x5, 0x0, {0x0, 0x4, 0x800, 0xff}}, 0x30) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) pipe2(&(0x7f0000000380), 0x4000) read$FUSE(r2, &(0x7f00000070c0), 0x8c0) read$FUSE(r2, &(0x7f0000002000), 0x1000) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000080)={0x3, 0x9, 0x2}) mount$fuse(0x0, &(0x7f0000000180)='./file0/file1\x00', &(0x7f0000000240)='fuse\x00', 0x2000008000, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[], 0xed9b7f28a93cd237) 19:24:24 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c5e8b85835be91bb6f0746d6f6465c83837303030000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000640), 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x4c00, &(0x7f0000000240)=ANY=[]) 19:24:24 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be909fdfdffff000000ae3c3934392c00aa"]) 19:24:24 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x73}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 872.855219] jfs: Unrecognized mount option "uid=" or missing value [ 872.887765] jfs: Unrecognized mount option "uid=" or missing value 19:24:25 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7900000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:25 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x3, 0x8100) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000200)='./control/file0\x00', 0x80000000, 0x8, &(0x7f0000001800)=[{&(0x7f0000000480)="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", 0x1000, 0x5}, {&(0x7f0000000240)="3a7ae05b663d8de94cf92bfd6a9b49b8467d7c1d9aeaf6557d300e07466e5eb4c53b1513a0198427d034cabc14c27de3e7d11e873119e581238c2ca50feeff1c8cb807b9346f357b863c4cb37a1de5826994ef49d4a0af6e30a48f984b93d52c8cebeeb4cf4d12be776090cbd15c1f0e78b138a1c2387ab929270d09d8fb588d15768eb51beab23e503a2532ea9d12693b634f592909ca325cd85d51997b8f27d6dfa62a0246cc697989a0fd0a95672295d1f7533ca81e86ca9dfaaa54a9e19f2964aad07211d8910cefa0c368b6042495930fc6aeecd12ec2560c9eff50ce88ddcea0ddfc67e5028cbea3488ad47719", 0xf0}, {&(0x7f0000000340)="142545eae30aa9dadd787ab53b0bdb2e1ef0f01eb41edec10c435967af59faa086b72187e97fc88d43f55c3e6c54d6b217aec202ab6590c8467b1aff13d9dc860da80be696c6d381e8ae35e4b58a4f33727595138b468586c410b1a921063d4cd46f1649649688121607cf43a170fd4e9b328d4a3cb77007fc00117174fa18691a7bf9e3adba44e4d9c5a214d7e4aa58fe491f612867f2d533a7c8e76d3873aa7e2af6f4342f5c93ee8e4a40f8eeed71af14d1f1f5864a7703ade073cefe7fd2c12339d1c16786dfab9aba2a65904f44bbcf5701ac938e79820c22752bbfe968e93a41fb2c399d149f", 0xe9, 0x1}, {&(0x7f0000001480)="d57d014086f115bc09861226c561f4f774648a85a775121766ff9bbb780ade3d3b6e203bf05145ec819ca5ede13028c17a7d", 0x32, 0x7}, {&(0x7f00000014c0)="8cf6ffa119080fa78d4ea3a896dc4c7f1167811a5e8d1b39d0dc68f5d52dbe1dcf68f888768713659c43ace06722e8954d25de7f63a9e2118a22767357b572fc1676fe8a92048744ca3520684147cf31d1ca5d854b603c5bf4a419629b518226cfbbc23b268415139c90eaafc3a0c17dc1c7c097c19b08fe90da21d54b073756f2f2bf5fd0a1a1a8a826046743a7ae4d42165823398acc8f9de0e0b8618a41191fa38f99cf289d", 0xa7, 0x6}, {&(0x7f0000001580)="9d93c3a6ee244cf3cc28c8cafee4f6640b848fe7069883b12b46aa9ba63a75662e16d6b07edbc2e73b1c85fd08d9d99dd88b914c315df1ccf0633bc4dddd1326a480a77f88946db2cb47865bc239be369aa6eecd20c60998b1a339990b8a6a044986ccabb08b92b0e0b6fc78bc10fab435dc9d4e994450bb3c8a821ed26826981eb79295e8afe4a4562dfc7ac28897c472cbc373c5a093ba6e85102f7a129528759433085acf653aebff28cb8256a851c00f5c75c6269bf2a037ee72a2671b0e00e14b6c4ad6c14eff60", 0xca, 0x2}, {&(0x7f0000001680)="8a7442666ffda54d4beb3b70066f3561928cbe1a02a36981d6deee7c173d4eccd930c16349e59cc5aa871b2acf6d2af418fb491620b4000dc94006660c8b1c3184e2779c6b90", 0x46, 0x3}, {&(0x7f0000001700)="131d461fccfd5ac28fcf80f0ea9ff128c69d2ea9968aaac53fc81cbbd6298d3511d9cbcf23220295fa11d0bfcb6f36fce817afd48d2b5f531943bfd3431b8c422a193a6aca291f71da433c34589b0b23d44c86963ee79b6c0b496e852d138c7979fc97eccaf1e52360bf0ab2b033fee6a958109cab351e9230a327ef8393696a9afe78e8095e4d6018b381c4e330ff8eaade98b33e1d202907fbe96d4a938d766e2aed849e4020c4f6e185290dd908cada983c48cc1eb1b365d24d496165fddecd2503f32f20", 0xc6, 0x5}], 0x83041a, &(0x7f00000018c0)=ANY=[@ANYBLOB='dots,nots$\x00<']) accept4$packet(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x14, 0x80000) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") mkdir(&(0x7f0000000000)='./control\x00', 0x0) r2 = inotify_init() r3 = dup3(r1, r2, 0x0) lsetxattr(&(0x7f00000000c0)='./control/file0\x00', &(0x7f0000000440)=@random={'osx.', '\\ppp0posix_acl_access\x00'}, &(0x7f0000001900)='+wlan0-))\x00', 0xa, 0x2) creat(&(0x7f0000000040)='./control/file0\x00', 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000001940)=0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000001980)=r4) [ 872.962820] jfs: Unrecognized mount option "uid=" or missing value [ 873.002166] jfs: Unrecognized mount option "uid=" or missing value 19:24:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1fffff, &(0x7f0000000240)=ANY=[]) 19:24:25 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000074000000ae3c3934392c00aa"]) 19:24:25 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xe}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 873.094967] jfs: Unrecognized mount option "uid=" or missing value [ 873.122571] jfs: Unrecognized mount option "uid=" or missing value 19:24:25 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x200, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x16) r1 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(rmd320-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="000000000000000000200017d4edb818d1326c3b28ec092dddcabde168e80db8ed46ffff104cab926118c1c34059fb3729c1a8a06b16c7feefa16a309a7e9b82e9aa64571c5c17b9c00eb8ccc15457406cd623e89165e7f5d81ac935c303c6c908b960aac347b9dd47b9ca90a1c323a582ad9a9cc8413301", 0x78) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:25 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:25 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="021000000a000000000000ebffffff0008001200000000000000610340fa44f468780900f002000000000000060000000000000000000000000002000020000000000000000800000000000000000000370aef2ba35934138ef82c6e26214b33671dca0a1915e3e1390bc9d1b59aacca24460b4a8769de22603b8eba08469cc1b490f8da3300305a005fb399634977e975bff2947a08d8a9cfd3408cf0707ca23d7f0796fe047ec7216d31e62b7a45d23fa4f980c9b25cc1d135f0781e265f40095dc3aa15db"], 0x50}, 0x1}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x2b7e0ec1b8e7a46, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000200)='./file0\x00', 0x6, 0x2, &(0x7f00000013c0)=[{&(0x7f00000003c0)="ba27ab2fa39096db3fbe53515a53625b25a0aa38637e0d53519f662edfec3ddeaf8a0f037cd2f9a76d404a434a1c9ff68a4fdf066c2bfd4f8cf3493f58dad6e1648906d430e8226e1f23bd927af137295111586a4ce8e1f374910ce07ca6cfeae671990ec34c1944ddc4ff3cae6907b26356a4ce73409e57a0ac21c8d477d41a2320d9ddb0c085471e55a813465fef7913f94df5b277a133439ddc901ef1e43c8b39fb38e0c87abee04cf3d40c53ac3a8a9c8dffd2cf37ce092fe15a9f309ef9eeec12b4fba8555568c97180c5bd77aa3786cfab3dbb52b663a80c280e770fe729e40c40e39dcb47361632faf29ead029d507ffa35c62e8891091e887e4a568026597991a9a4ace0d31196c408a508e6d7b729b1ab62d4c9e3bb35921c5f2cbe35aac38615fad0caa30e9268d21f4a403083b6e50bd7bbe20fbb976d33979e8e96ace2724e84582b2f624c2d0c18f839e30b116c9b9efdeca97534f9d42016ca0a4a6f706b151d4ed5c1f95cb2ca1d3521736ca5f44d733ac123b4594dd57366a7cad0a605269ee80b54593660eebfa34bcdc28cee4513d8e08dcd04515de041060e0e38ed8f3c5eb2f8b92f45c51882927e7005270b6cd3f2f3dbeb007b79ce85bd04aac9dde84cb1ea69ec2471e639a6b81058c0452fbe348a29ad0f7fc6be47f83a60a318ee53e7bda86cdba7da595fcd5b6a20a3052f31acd5258e79a785ac6c24bf872537ab2bce88251f7d4fd54748c7aa78d51ff1b213b68f44d25765a7a9ec1929c9883309ec18f93d323bc76910908284372df3ce7c3fc9d1e65c4c90cd431d2d19a1d92d0a96adaa26888afe0cac6381aed9d425e869667423bfb2608f3bb4fd32793daafdc78e4d377b3c6bb483d2ef79696fed3cefd949f0a9cdbf3076e977edf4e07b0c66fe75eccbfeb587d13dd202752adb5594b11136d0242c52a2f27411b332fb9d2047f6898632535e785b21ce83b0efbed936d514b0fef42c8d3351414f4997f2308955082edd242a8b78eb673489f8d3b33e63f88c095a8096c118468c4e14dd9d700cfef9d9b794eeedd7454b32f0c34ec65dc0e466935a053b339a61e57c2480e2783bb33121396cf78fbef440db0c292856be773ec159fdc252cd2b87bb23937b4cbb7c8feb77542ad47c80ebdc161527704d1a64ab76507420507f6409017732677ee9fa9d10c779e35ba233e24c9315f801a6afe3779d56082e8eade6bcad720b7c09976a8940e616d1fb5cf8e090e4ee79f6b1e72f3b99cdbf440c7e7fa5c2f89331d951751682c033d0049b13799a96147b61aa98f920c12a2ea58d2882a0ca0970b3303ebf3d9072fd5da83097f4680d54917cc2cfe4703f1d5872e91b8c01f34ad17161d18181c57c116d4b4c7d5fc96ed5a8f5d0909e89503fde5209132c239bd7d71c0d85062b1e6ddce1e2efcded40ffe7c6cddb7c14a3fd2baaf3938c754377e503602c469f6e54d9580f815ef20939ef26e435d4780ba62a44f84d993cf71df7d2b2be07828b6012e5d0a2fb1279c48825d7f842c3cf67a98482f0cf4aa7793106e17018257fb111df2606ab0f039566c1d04e9e1a07cd016a71b29248d7eef7ab21152c281f40c09c4bf14462e2b04057a36aaf9f05054910d9ce16294060c278b2c0d0fbb31289bd4976a955e0c1a79493439c620cfe0f31c023c01f9e796e56fb7bce9bff538ef68ef7c389bcd0436bf2bc6f0aafa85a6fbfe52ce449c046ff95be5edaae0a9462c2657caac10902e84a496f75a5f71dd34ac16a2ac7245d7932a29313b42c9572031b4afc47c82a7a0f8196ba5e1a0bfc28d878541f935e6021eeaaffc593bc05e1c8a83c7437a47237b26e96e9064709e2658a8ccf2d637a9ed09d09010479dd835c452546519d8d94cb0493d0a03daf55dda1f4ec31587613af3d8df5c02bf74be0b1b4b13ad43741140b7a0bfcd591c19f415e4025cfd3b85f0d935be2da2a92c87009879848f56d74e357b0db64541898adc1f1cd28958177e6308be11c5e38491b308eebd612edd2105060bd1300f0b1f5924f7dd16e0d779f3e96ee4aa247b92566ce82f00cad03a95c48e50f3b699974cc20265a8451098e6b66a788ea53ad5f229631ef8298637ea2e62c8a3924bbf8ad84127f186a0b7c3f7a400b966de1d6e68c71bc5799f4cdc1b941541713ce24bab07706e9b7a0f49317064ba2f091e5cde69c562d45922ec858377cd791e2bcf20de59975f4b877eaa756519387412ef8627822340b3c5aed49df5683f0b07fe1fc1e6eab129bf72300ac81209f22cbe1f4d4f726528fc3e08b216b1e8bd755f42c963e346488b479cee455e5131f924b982f4bb4088dd7183a8527d3772c0568277e6bfab374f66fb8c2c035f614ab278579f3ff8dc33bb69734669f4f0794c3aabff2b88305f89001719c3a079bc0f828b63fa1bdac92a60b9758bc55d902fc54c52d1221d92cc99d08825b2cadfc567d617dfeee01a99370b0b862b86ad7a08258a9a242695e31b46fead3b0cd11d96f2ba7125b066e893e8972ccba2e00745ffac8b8d2688fcc154738e20ed757e08bf3e2f9a527aaa33c72750a881d762f8d2c9bebeca36cdcd2ec993f3c0e8d7dfc10cee3be632e1ce2c52a9c55f26bf51dbff155d69e500e19de515a9e3badc7aa26987e2ca955553e0ba9aaf91877eb7552351915fd8f887347264ce73413c92cd00876e6d21f9d7f16ee374a9dab6278fbaaea85a596d81db463aa2fbd514bbac50bffc5b708c70ff572151398089858def006afca513177c32cb17f00bb45fe7ef734cc8f7f038dd7035dd948fa011ef789f801ca40ed88e5c2eb85c6e289959cba9b870531dca4015d9bf4da6fee23a6f6fe76d53134758d0ff0acd49a658c596b967553babfeec870da84a5606056419ab48afa440477882cb985e094cef7500676bc7bc4d7b22482a17c83a37807e67834023393114bc45cc9b7e73f0c607dae344f6a4553085d26bdfa35bc11907b2839ef3ba3a95ced5b987d2bd8f867da168b49a45f09506df56529c3f55d3eb010501e213d6d5c89ae9a3bdfe55d87cc807aab43c5e7bff01fb72fa32621afc545fc2f5dbdc6f4d1a9757878960dda9b2fb526df93dfb77438535baf9f4e6a28701e9abcda097490161138de79fd6c4f04429672abdc52e2e2b888d4f5e7db3db25bbc81084ee8e2bc167d6b9393316aac9285d8e37a73b0b83a178a2e090701976e0f7d74e99e643653af9f01f46817a683c2b18bc969db2c5ef8409744257e11ef9c6de3bb308b027776449e881796e358611ca1509cd045819288dce9942563284fe84461e03580af4f78d921d984e46635abc704c1032715338f87c2650a1ff19eae9cfac2f330d78b0b0e2b3d378e843f5dc4e133ceb916c67da038f23092e8f3d87174508850043c81a4805121a9b578c9c579dfd29437b7b10e728a23b86c1d181f97d4582f5bc6bd2123317ea904605e79a08b1e6efe68e46eb4cdccf0065477edadbd09ced78e0876497503a79cc7f01218151d3a0f29afc9ef50a168193f25fb1e24782fc9ec9c9e21b7e4b3982ddb1e8864d61907b429ce0c8edb5431381cb1002ed65be8f869d6e8ce13005c25184583df107949ebb8385ad2581e554e14e2028c968cab5fb38695c21cb2de7e1b71719233e8dbbf7045bc7fa08ee422a10a2a365fbcca47751172854fc0ea2d80c4e8623dd0748abe67fdc8d0835a3b66e03c91d1f4d3eacef4131cd1a09445586d8bc232cdb57ceb6c656dd8ec187f84623c6a5f883ff65a4c9788f8a64e64b8b02499d329cc87e0f9ab66c955ace90bda103e3c9b4b1ef7be6fef385807d7636b28f4fa162a9182ceb19e5ab798400407d68ee7b6ec2941dcd58ee3573aabb4803d1bb36ff89a8466b5fa8553c6be055d6ea2c4b776ee0f0d50bbd01c145d040dbb0e43305f6d13be4ee7fde1e3f6eba2125a0e4c92804b36a8a7be917b10cbfc6974672ab69898b740113e319b190022b914f522b12865b5a4a9d79ab4c8f9f034e56e4e1580559b61d375776f5f876a59534f4a6647530377262c3314bd061c7ddaef99d354767f18731dbdd068a26a624d999180148bb2cf146e53460cc72f4a18bd30ec13811219922ec03d0228149d16c4a944fa1b7483fb50304d3520d5fe0cb0e01bc7d244e0bdeb20f537a81991591a8379456102d3304b308a58b10f9c146551cfdba6ba23790f2af6b5745e2e1c25d1a236a0ae0ce92ddef6f604e63aa548fd7d6aca79ce0620cc4b131c29d1c66bb8ab793e04b8d6a33bcc8f837e3d4036fb6f28fc829773733d3a2d7d9be1133e9ff61c8e36efcc900141416f8b2e31c90cb476eeff047498c5e5f2fe78ba73433eb9be0ee22d43b9dbf98c2c1937d74f044c61f154054612f0d9dac31815ad15373ab21f775245860ea54b7e10cf306d56ff8f155f92527b5d6b316e074b5335d7923d2a5e4e2b747ae3e8ad264973c6e37d384ce6852833c3a25aeecabce0a56890a09917d536440c3e58739aa6d1ffa069b440d7f4248a3553ef3f4a0b5dc97a2890d945c92f7dd64e76fb917ccf298f0d37ac5ecaa3b3a66cf138eea06e08383b9dcfb9d6f41aa36f4f22ff2061e9da4e8ea2051be4d5455d7b5841509a2d87f3d8b66202c7ac6f3003c441c3a5ef38408b73e96b812c5025d86a94bc79dc821966e76c72d0cb7a159e99a590dc2a683178eb40d54a8329414648451915e7b536f553c48de7ccd3709a733c946de23bd83d25c4dcb3977f9afeea9bbbfc8ec6f25b6e4210d662274edee87e2759dd74a54e706d5e5027690490ed906bdd7cffd74bc6be0751e3f66e362dd77bb27eec6f2bf56b708d5d1093e30b663a3e95780be2eef1905cc2e78c9b4b23b02a2fbae9e53bfbea4badb46cc6c3cdedf61b65e7bdb8b7fe20579ff2590cbd25fbf79dcf9e10f2b8e7ed4d3ef0e05ede1560aaa499ea7c7338f7fab2332183065d9ef54cbdb0e94b04b557a69863c016e50a2dd4690226016c15237b7e50564d007b484fc61c971fede8a2a6d91c559add28697da18e461ab7b2b7a8d6e706a822cbab5dbf200ae581fac23089fcc7c1b5aecd9ed127f72902287a20462c83ea6112651f016f22caaeb417e68dc34502ff268eb51742dd9a80ee640e1d7d27dbf2f7fdefefdd05b683149d54cb7ac99265f8d39134846039ef5169ab731b1cc134ea3175c64aca32a016c9e86cafe74bbff037ab7e0d22ae2a69569cc0fc423e8a42e1dafd37f437a24d9cc250b460d0c5626a6c085c8e41715952ffead692fd5a4d1af5fd1c4b09797ec3d0616057115ad38adafafd5f1d2d61d036eb1629d2a5f9dde2f07f6fa4a6fc9954a1fddd63abc62e95e5d5851f9011f4b019320a91158574e21441f64b8ca26813bbc95cb4177ba3d9280be6c79cc33718a26a9924c46c35a02aff58eacd5d1ea9e1c48874b15a07482d79f6ff00256a1252891c28ab90fd5b41d643dcff4886f578877d1d18e9063dd66371e9771de41baace86eaf23866192801ae5fc7d0133c78b139a0b8741164d65b50d582fe293bed710aa6bdce294c7c745aaabd1993aff4b93531a9e92127c98bd8b2ff7386645ba843552dfbc974d042e9d546a90355875bb83fcc50343d484047ca9ac99b7baacedbbaae3a07b8dd75bade68db5de3ed7a416f7a592466bbbc249ced70ecf9fe39dc0a8f4743b5cf656eec7b3df4b341525167671e05c0d1e20fcb678e8835a0c4ad079366af13d1e1c0d0cc447dba73e71f01ad7b6d319bcb4016a32b", 0x1000, 0x1}, {&(0x7f0000000240)="abb44a42ea1ac3cdb4ea0227f90149af856e10cf8ba77390e2c80f51ca64cbe613a6a6c5f816c5fbb458cb027513a00133d964675d68d8aff122c30546cfd57d996138cc596d835fd219c4be38006964135bb508a86f1b65", 0x58, 0x3ff}], 0x4008, &(0x7f0000001400)={[{@prjjquota={'prjjquota', 0x3d, 'nodev'}, 0x2c}]}) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:25 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000060000000ae3c3934392c00aa"]) [ 873.888951] jfs: Unrecognized mount option "uid=" or missing value [ 873.906979] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0xea424ab4) [ 873.914819] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 19:24:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000240)=0x1c) getsockopt$inet6_int(r1, 0x29, 0x3f, &(0x7f0000000280), &(0x7f00000002c0)=0x4) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) semget(0x3, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:26 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) mount$fuse(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x3fff}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d}, 0x2c}) socketpair(0x3, 0x4, 0xe97, &(0x7f0000000200)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=0x0, &(0x7f0000000300)=0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000340)={r3, 0x0, 0xffffffff, 0x1000}, &(0x7f00000003c0)=0x1a6) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f463aeb14b03d582e3a8be21cf969643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x300000000000000, &(0x7f0000000240)=ANY=[]) 19:24:26 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) socketpair(0x2, 0x80000, 0x2, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000240)={0x140, @tick=0x3, 0x7f, {0x64f2c016, 0x100}, 0x1, 0x2, 0x8000}) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 873.946276] F2FS-fs (loop5): Unable to read 2th superblock [ 873.954298] jfs: Unrecognized mount option "uid=" or missing value [ 873.963019] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0xea424ab4) [ 873.970836] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 873.980298] F2FS-fs (loop5): Unable to read 2th superblock 19:24:26 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be909006c0000000000ae3c3934392c00aa"]) 19:24:26 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x7100}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xa804000000000000, &(0x7f0000000240)=ANY=[]) [ 874.062640] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0xea424ab4) [ 874.070412] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 874.082850] jfs: Unrecognized mount option "uid=" or missing value [ 874.105963] F2FS-fs (loop5): Unable to read 2th superblock 19:24:26 executing program 6: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x800, 0x0) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x20000, 0x0) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0x100) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000640)={'nat\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000380)=[{}, {}], 0x0, [{}]}, 0x88) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r3, &(0x7f00000070c0), 0x8c0) accept4$packet(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0x14, 0x800) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@mcast1={0xff, 0x1, [], 0x1}, 0x2c, r4}) read$FUSE(r3, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r3, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:26 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900300000000000ae3c3934392c00aa"]) 19:24:26 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x73000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 874.118336] jfs: Unrecognized mount option "uid=" or missing value [ 874.131702] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0xea424ab4) [ 874.150301] Unknown ioctl 35096 19:24:26 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="021000000a000000000000ebffffff0008001200000000000000610340fa44f468780900f002000000000000060000000000000000000000000002000020000000000000000800000000000000000000370aef2ba35934138ef82c6e26214b33671dca0a1915e3e1390bc9d1b59aacca24460b4a8769de22603b8eba08469cc1b490f8da3300305a005fb399634977e975bff2947a08d8a9cfd3408cf0707ca23d7f0796fe047ec7216d31e62b7a45d23fa4f980c9b25cc1d135f0781e265f40095dc3aa15db"], 0x50}, 0x1}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x2b7e0ec1b8e7a46, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000200)='./file0\x00', 0x6, 0x2, &(0x7f00000013c0)=[{&(0x7f00000003c0)="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", 0x1000, 0x1}, {&(0x7f0000000240)="abb44a42ea1ac3cdb4ea0227f90149af856e10cf8ba77390e2c80f51ca64cbe613a6a6c5f816c5fbb458cb027513a00133d964675d68d8aff122c30546cfd57d996138cc596d835fd219c4be38006964135bb508a86f1b65", 0x58, 0x3ff}], 0x4008, &(0x7f0000001400)={[{@prjjquota={'prjjquota', 0x3d, 'nodev'}, 0x2c}]}) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 874.184073] Unknown ioctl 35096 [ 874.212881] jfs: Unrecognized mount option "uid=" or missing value [ 874.253612] jfs: Unrecognized mount option "uid=" or missing value 19:24:27 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x5000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xf0ffffff, &(0x7f0000000240)=ANY=[]) 19:24:27 executing program 6: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000740)=[@in={0x2, 0x4e24}], 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f00000070c0), 0x8c0) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) recvmsg$kcm(r2, &(0x7f0000000700)={&(0x7f0000000240)=@sco, 0x80, &(0x7f0000000640)=[{&(0x7f00000002c0)=""/7, 0x7}, {&(0x7f0000000340)=""/189, 0xbd}], 0x2, &(0x7f0000000680)=""/119, 0x77, 0x20}, 0x20) 19:24:27 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be9096c000000000000ae3c3934392c00aa"]) 19:24:27 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="021000000a000000000000ebffffff0008001200000000000000610340fa44f468780900f002000000000000060000000000000000000000000002000020000000000000000800000000000000000000370aef2ba35934138ef82c6e26214b33671dca0a1915e3e1390bc9d1b59aacca24460b4a8769de22603b8eba08469cc1b490f8da3300305a005fb399634977e975bff2947a08d8a9cfd3408cf0707ca23d7f0796fe047ec7216d31e62b7a45d23fa4f980c9b25cc1d135f0781e265f40095dc3aa15db"], 0x50}, 0x1}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x2b7e0ec1b8e7a46, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000200)='./file0\x00', 0x6, 0x2, &(0x7f00000013c0)=[{&(0x7f00000003c0)="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", 0x1000, 0x1}, {&(0x7f0000000240)="abb44a42ea1ac3cdb4ea0227f90149af856e10cf8ba77390e2c80f51ca64cbe613a6a6c5f816c5fbb458cb027513a00133d964675d68d8aff122c30546cfd57d996138cc596d835fd219c4be38006964135bb508a86f1b65", 0x58, 0x3ff}], 0x4008, &(0x7f0000001400)={[{@prjjquota={'prjjquota', 0x3d, 'nodev'}, 0x2c}]}) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYRESOCT=r0], 0xfffffffffffffe1d) 19:24:27 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xfffffffffffffff9, 0x420000) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) ioctl$TIOCCBRK(r0, 0x5428) stat(&(0x7f00000000c0)='./file0/file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r1, &(0x7f00000070c0), 0x8c0) read$FUSE(r1, &(0x7f0000002000), 0x1000) getsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000240), &(0x7f0000000280)=0x4) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f74ae6d6f64653d30303030304f30303030303030b22838dd9e6fe8406836ca2c94303030d517303030302c757365325f696400", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d4aede97f", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b00000000656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) write$P9_RSTATu(r0, &(0x7f0000000480)={0x77, 0x7d, 0x1, {{0x0, 0x4f, 0x603dc92d, 0x8000, {0x3, 0x1, 0x6}, 0x0, 0x0, 0x4, 0x4, 0x1, '-', 0x1, '$', 0x8, 'rootmode', 0x12, 'mime_typeselinux))'}, 0x13, "1576626f786e6574316d696d655f7479706540", r2, r3, r2}}, 0x77) mount$9p_xen(&(0x7f0000000780)='fuse\x00', &(0x7f00000007c0)='./file0/file1\x00', &(0x7f0000000800)='9p\x00', 0x1, &(0x7f0000000840)={'trans=xen,', {[{@uname={'uname', 0x3d, 'mime_typeselinux))'}, 0x2c}, {@debug={'debug', 0x3d, 0x1}, 0x2c}, {@cache_loose='cache=loose', 0x2c}, {@access_user='access=user', 0x2c}]}}) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) chroot(&(0x7f00000002c0)='./file0/file1\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000003c0), 0x0) mount(&(0x7f00000003c0)='./file0/file1\x00', &(0x7f0000000680)='./file0/file0\x00', &(0x7f00000006c0)='f2fs\x00', 0x40000, &(0x7f0000000700)="3bd1db5153dbda93b24473dff8edc3755501b613feb5a86be2b6d279e06d7414b3f38f63c2e53edc4cf6bb5759d0b581ee4c621b41a8d5f28cdec62aef151122403394a033070377def670a98e51ad385802775aeecd32abb0fb331fa9722fbe93eae496bda30619570cf0bca1db4484ccdd89a12c7f95028eba7e") 19:24:27 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x8, 0x7ff, 0xc4c7, 'queue0\x00', 0xfff}) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x0, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000002c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000140)=""/61, 0x3d}, {&(0x7f0000000340)=""/80, 0x50}, {&(0x7f00000003c0)=""/207, 0xcf}, {&(0x7f00000004c0)=""/189, 0xbd}], 0x4, &(0x7f00000005c0)=""/219, 0xdb, 0x7}, 0x0) 19:24:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000280)='./file1\x00', 0x6000, 0x8) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f00000002c0)=""/27) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f0000000240)='fuse\x00', 0x800002, &(0x7f0000000640)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions', 0x2c}, {@allow_other='allow_other', 0x2c}, {@allow_other='allow_other', 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@blksize={'blksize', 0x3d, 0x800}, 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@max_read={'max_read', 0x3d, 0x2cd}, 0x2c}]}}) read$FUSE(r1, &(0x7f0000000740), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='~k']) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000001740)=ANY=[@ANYBLOB="900000000000000002000000000000000100000000450000007e9c23401f000000000000000b000000000066ce656d316e6f646576656d310000000000000000000000c82fc8a56194f43a0000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746267726f7570246367726f75700212f4bf1e7bd87094b9fe48e15ba6113647157c843c55b275b450cd3cebaa3f4beb985a0c19f23f79cacf63e2be5d59a1322f45c9404a0302b822cf51718470c2d850908633a7543826590c4df5"], 0x90) symlink(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/file0\x00') 19:24:27 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x6, &(0x7f0000000240)=ANY=[]) 19:24:27 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="021000000a000000000000ebffffff0008001200000000000000610340fa44f468780900f002000000000000060000000000000000000000000002000020000000000000000800000000000000000000370aef2ba35934138ef82c6e26214b33671dca0a1915e3e1390bc9d1b59aacca24460b4a8769de22603b8eba08469cc1b490f8da3300305a005fb399634977e975bff2947a08d8a9cfd3408cf0707ca23d7f0796fe047ec7216d31e62b7a45d23fa4f980c9b25cc1d135f0781e265f40095dc3aa15db"], 0x50}, 0x1}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x2b7e0ec1b8e7a46, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000200)='./file0\x00', 0x6, 0x2, &(0x7f00000013c0)=[{&(0x7f00000003c0)="ba27ab2fa39096db3fbe53515a53625b25a0aa38637e0d53519f662edfec3ddeaf8a0f037cd2f9a76d404a434a1c9ff68a4fdf066c2bfd4f8cf3493f58dad6e1648906d430e8226e1f23bd927af137295111586a4ce8e1f374910ce07ca6cfeae671990ec34c1944ddc4ff3cae6907b26356a4ce73409e57a0ac21c8d477d41a2320d9ddb0c085471e55a813465fef7913f94df5b277a133439ddc901ef1e43c8b39fb38e0c87abee04cf3d40c53ac3a8a9c8dffd2cf37ce092fe15a9f309ef9eeec12b4fba8555568c97180c5bd77aa3786cfab3dbb52b663a80c280e770fe729e40c40e39dcb47361632faf29ead029d507ffa35c62e8891091e887e4a568026597991a9a4ace0d31196c408a508e6d7b729b1ab62d4c9e3bb35921c5f2cbe35aac38615fad0caa30e9268d21f4a403083b6e50bd7bbe20fbb976d33979e8e96ace2724e84582b2f624c2d0c18f839e30b116c9b9efdeca97534f9d42016ca0a4a6f706b151d4ed5c1f95cb2ca1d3521736ca5f44d733ac123b4594dd57366a7cad0a605269ee80b54593660eebfa34bcdc28cee4513d8e08dcd04515de041060e0e38ed8f3c5eb2f8b92f45c51882927e7005270b6cd3f2f3dbeb007b79ce85bd04aac9dde84cb1ea69ec2471e639a6b81058c0452fbe348a29ad0f7fc6be47f83a60a318ee53e7bda86cdba7da595fcd5b6a20a3052f31acd5258e79a785ac6c24bf872537ab2bce88251f7d4fd54748c7aa78d51ff1b213b68f44d25765a7a9ec1929c9883309ec18f93d323bc76910908284372df3ce7c3fc9d1e65c4c90cd431d2d19a1d92d0a96adaa26888afe0cac6381aed9d425e869667423bfb2608f3bb4fd32793daafdc78e4d377b3c6bb483d2ef79696fed3cefd949f0a9cdbf3076e977edf4e07b0c66fe75eccbfeb587d13dd202752adb5594b11136d0242c52a2f27411b332fb9d2047f6898632535e785b21ce83b0efbed936d514b0fef42c8d3351414f4997f2308955082edd242a8b78eb673489f8d3b33e63f88c095a8096c118468c4e14dd9d700cfef9d9b794eeedd7454b32f0c34ec65dc0e466935a053b339a61e57c2480e2783bb33121396cf78fbef440db0c292856be773ec159fdc252cd2b87bb23937b4cbb7c8feb77542ad47c80ebdc161527704d1a64ab76507420507f6409017732677ee9fa9d10c779e35ba233e24c9315f801a6afe3779d56082e8eade6bcad720b7c09976a8940e616d1fb5cf8e090e4ee79f6b1e72f3b99cdbf440c7e7fa5c2f89331d951751682c033d0049b13799a96147b61aa98f920c12a2ea58d2882a0ca0970b3303ebf3d9072fd5da83097f4680d54917cc2cfe4703f1d5872e91b8c01f34ad17161d18181c57c116d4b4c7d5fc96ed5a8f5d0909e89503fde5209132c239bd7d71c0d85062b1e6ddce1e2efcded40ffe7c6cddb7c14a3fd2baaf3938c754377e503602c469f6e54d9580f815ef20939ef26e435d4780ba62a44f84d993cf71df7d2b2be07828b6012e5d0a2fb1279c48825d7f842c3cf67a98482f0cf4aa7793106e17018257fb111df2606ab0f039566c1d04e9e1a07cd016a71b29248d7eef7ab21152c281f40c09c4bf14462e2b04057a36aaf9f05054910d9ce16294060c278b2c0d0fbb31289bd4976a955e0c1a79493439c620cfe0f31c023c01f9e796e56fb7bce9bff538ef68ef7c389bcd0436bf2bc6f0aafa85a6fbfe52ce449c046ff95be5edaae0a9462c2657caac10902e84a496f75a5f71dd34ac16a2ac7245d7932a29313b42c9572031b4afc47c82a7a0f8196ba5e1a0bfc28d878541f935e6021eeaaffc593bc05e1c8a83c7437a47237b26e96e9064709e2658a8ccf2d637a9ed09d09010479dd835c452546519d8d94cb0493d0a03daf55dda1f4ec31587613af3d8df5c02bf74be0b1b4b13ad43741140b7a0bfcd591c19f415e4025cfd3b85f0d935be2da2a92c87009879848f56d74e357b0db64541898adc1f1cd28958177e6308be11c5e38491b308eebd612edd2105060bd1300f0b1f5924f7dd16e0d779f3e96ee4aa247b92566ce82f00cad03a95c48e50f3b699974cc20265a8451098e6b66a788ea53ad5f229631ef8298637ea2e62c8a3924bbf8ad84127f186a0b7c3f7a400b966de1d6e68c71bc5799f4cdc1b941541713ce24bab07706e9b7a0f49317064ba2f091e5cde69c562d45922ec858377cd791e2bcf20de59975f4b877eaa756519387412ef8627822340b3c5aed49df5683f0b07fe1fc1e6eab129bf72300ac81209f22cbe1f4d4f726528fc3e08b216b1e8bd755f42c963e346488b479cee455e5131f924b982f4bb4088dd7183a8527d3772c0568277e6bfab374f66fb8c2c035f614ab278579f3ff8dc33bb69734669f4f0794c3aabff2b88305f89001719c3a079bc0f828b63fa1bdac92a60b9758bc55d902fc54c52d1221d92cc99d08825b2cadfc567d617dfeee01a99370b0b862b86ad7a08258a9a242695e31b46fead3b0cd11d96f2ba7125b066e893e8972ccba2e00745ffac8b8d2688fcc154738e20ed757e08bf3e2f9a527aaa33c72750a881d762f8d2c9bebeca36cdcd2ec993f3c0e8d7dfc10cee3be632e1ce2c52a9c55f26bf51dbff155d69e500e19de515a9e3badc7aa26987e2ca955553e0ba9aaf91877eb7552351915fd8f887347264ce73413c92cd00876e6d21f9d7f16ee374a9dab6278fbaaea85a596d81db463aa2fbd514bbac50bffc5b708c70ff572151398089858def006afca513177c32cb17f00bb45fe7ef734cc8f7f038dd7035dd948fa011ef789f801ca40ed88e5c2eb85c6e289959cba9b870531dca4015d9bf4da6fee23a6f6fe76d53134758d0ff0acd49a658c596b967553babfeec870da84a5606056419ab48afa440477882cb985e094cef7500676bc7bc4d7b22482a17c83a37807e67834023393114bc45cc9b7e73f0c607dae344f6a4553085d26bdfa35bc11907b2839ef3ba3a95ced5b987d2bd8f867da168b49a45f09506df56529c3f55d3eb010501e213d6d5c89ae9a3bdfe55d87cc807aab43c5e7bff01fb72fa32621afc545fc2f5dbdc6f4d1a9757878960dda9b2fb526df93dfb77438535baf9f4e6a28701e9abcda097490161138de79fd6c4f04429672abdc52e2e2b888d4f5e7db3db25bbc81084ee8e2bc167d6b9393316aac9285d8e37a73b0b83a178a2e090701976e0f7d74e99e643653af9f01f46817a683c2b18bc969db2c5ef8409744257e11ef9c6de3bb308b027776449e881796e358611ca1509cd045819288dce9942563284fe84461e03580af4f78d921d984e46635abc704c1032715338f87c2650a1ff19eae9cfac2f330d78b0b0e2b3d378e843f5dc4e133ceb916c67da038f23092e8f3d87174508850043c81a4805121a9b578c9c579dfd29437b7b10e728a23b86c1d181f97d4582f5bc6bd2123317ea904605e79a08b1e6efe68e46eb4cdccf0065477edadbd09ced78e0876497503a79cc7f01218151d3a0f29afc9ef50a168193f25fb1e24782fc9ec9c9e21b7e4b3982ddb1e8864d61907b429ce0c8edb5431381cb1002ed65be8f869d6e8ce13005c25184583df107949ebb8385ad2581e554e14e2028c968cab5fb38695c21cb2de7e1b71719233e8dbbf7045bc7fa08ee422a10a2a365fbcca47751172854fc0ea2d80c4e8623dd0748abe67fdc8d0835a3b66e03c91d1f4d3eacef4131cd1a09445586d8bc232cdb57ceb6c656dd8ec187f84623c6a5f883ff65a4c9788f8a64e64b8b02499d329cc87e0f9ab66c955ace90bda103e3c9b4b1ef7be6fef385807d7636b28f4fa162a9182ceb19e5ab798400407d68ee7b6ec2941dcd58ee3573aabb4803d1bb36ff89a8466b5fa8553c6be055d6ea2c4b776ee0f0d50bbd01c145d040dbb0e43305f6d13be4ee7fde1e3f6eba2125a0e4c92804b36a8a7be917b10cbfc6974672ab69898b740113e319b190022b914f522b12865b5a4a9d79ab4c8f9f034e56e4e1580559b61d375776f5f876a59534f4a6647530377262c3314bd061c7ddaef99d354767f18731dbdd068a26a624d999180148bb2cf146e53460cc72f4a18bd30ec13811219922ec03d0228149d16c4a944fa1b7483fb50304d3520d5fe0cb0e01bc7d244e0bdeb20f537a81991591a8379456102d3304b308a58b10f9c146551cfdba6ba23790f2af6b5745e2e1c25d1a236a0ae0ce92ddef6f604e63aa548fd7d6aca79ce0620cc4b131c29d1c66bb8ab793e04b8d6a33bcc8f837e3d4036fb6f28fc829773733d3a2d7d9be1133e9ff61c8e36efcc900141416f8b2e31c90cb476eeff047498c5e5f2fe78ba73433eb9be0ee22d43b9dbf98c2c1937d74f044c61f154054612f0d9dac31815ad15373ab21f775245860ea54b7e10cf306d56ff8f155f92527b5d6b316e074b5335d7923d2a5e4e2b747ae3e8ad264973c6e37d384ce6852833c3a25aeecabce0a56890a09917d536440c3e58739aa6d1ffa069b440d7f4248a3553ef3f4a0b5dc97a2890d945c92f7dd64e76fb917ccf298f0d37ac5ecaa3b3a66cf138eea06e08383b9dcfb9d6f41aa36f4f22ff2061e9da4e8ea2051be4d5455d7b5841509a2d87f3d8b66202c7ac6f3003c441c3a5ef38408b73e96b812c5025d86a94bc79dc821966e76c72d0cb7a159e99a590dc2a683178eb40d54a8329414648451915e7b536f553c48de7ccd3709a733c946de23bd83d25c4dcb3977f9afeea9bbbfc8ec6f25b6e4210d662274edee87e2759dd74a54e706d5e5027690490ed906bdd7cffd74bc6be0751e3f66e362dd77bb27eec6f2bf56b708d5d1093e30b663a3e95780be2eef1905cc2e78c9b4b23b02a2fbae9e53bfbea4badb46cc6c3cdedf61b65e7bdb8b7fe20579ff2590cbd25fbf79dcf9e10f2b8e7ed4d3ef0e05ede1560aaa499ea7c7338f7fab2332183065d9ef54cbdb0e94b04b557a69863c016e50a2dd4690226016c15237b7e50564d007b484fc61c971fede8a2a6d91c559add28697da18e461ab7b2b7a8d6e706a822cbab5dbf200ae581fac23089fcc7c1b5aecd9ed127f72902287a20462c83ea6112651f016f22caaeb417e68dc34502ff268eb51742dd9a80ee640e1d7d27dbf2f7fdefefdd05b683149d54cb7ac99265f8d39134846039ef5169ab731b1cc134ea3175c64aca32a016c9e86cafe74bbff037ab7e0d22ae2a69569cc0fc423e8a42e1dafd37f437a24d9cc250b460d0c5626a6c085c8e41715952ffead692fd5a4d1af5fd1c4b09797ec3d0616057115ad38adafafd5f1d2d61d036eb1629d2a5f9dde2f07f6fa4a6fc9954a1fddd63abc62e95e5d5851f9011f4b019320a91158574e21441f64b8ca26813bbc95cb4177ba3d9280be6c79cc33718a26a9924c46c35a02aff58eacd5d1ea9e1c48874b15a07482d79f6ff00256a1252891c28ab90fd5b41d643dcff4886f578877d1d18e9063dd66371e9771de41baace86eaf23866192801ae5fc7d0133c78b139a0b8741164d65b50d582fe293bed710aa6bdce294c7c745aaabd1993aff4b93531a9e92127c98bd8b2ff7386645ba843552dfbc974d042e9d546a90355875bb83fcc50343d484047ca9ac99b7baacedbbaae3a07b8dd75bade68db5de3ed7a416f7a592466bbbc249ced70ecf9fe39dc0a8f4743b5cf656eec7b3df4b341525167671e05c0d1e20fcb678e8835a0c4ad079366af13d1e1c0d0cc447dba73e71f01ad7b6d319bcb4016a32b", 0x1000, 0x1}, {&(0x7f0000000240)="abb44a42ea1ac3cdb4ea0227f90149af856e10cf8ba77390e2c80f51ca64cbe613a6a6c5f816c5fbb458cb027513a00133d964675d68d8aff122c30546cfd57d996138cc596d835fd219c4be38006964135bb508a86f1b65", 0x58, 0x3ff}], 0x4008, &(0x7f0000001400)={[{@prjjquota={'prjjquota', 0x3d, 'nodev'}, 0x2c}]}) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 875.390704] jfs: Unrecognized mount option "uid=" or missing value [ 875.421068] jfs: Unrecognized mount option "uid=" or missing value 19:24:27 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90902000000000000ae3c3934392c00aa"]) 19:24:27 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x71}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:27 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="021000000a000000000000ebffffff0008001200000000000000610340fa44f468780900f002000000000000060000000000000000000000000002000020000000000000000800000000000000000000370aef2ba35934138ef82c6e26214b33671dca0a1915e3e1390bc9d1b59aacca24460b4a8769de22603b8eba08469cc1b490f8da3300305a005fb399634977e975bff2947a08d8a9cfd3408cf0707ca23d7f0796fe047ec7216d31e62b7a45d23fa4f980c9b25cc1d135f0781e265f40095dc3aa15db"], 0x50}, 0x1}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x2b7e0ec1b8e7a46, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000200)='./file0\x00', 0x6, 0x2, &(0x7f00000013c0)=[{&(0x7f00000003c0)="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", 0x1000, 0x1}, {&(0x7f0000000240)="abb44a42ea1ac3cdb4ea0227f90149af856e10cf8ba77390e2c80f51ca64cbe613a6a6c5f816c5fbb458cb027513a00133d964675d68d8aff122c30546cfd57d996138cc596d835fd219c4be38006964135bb508a86f1b65", 0x58, 0x3ff}], 0x4008, &(0x7f0000001400)={[{@prjjquota={'prjjquota', 0x3d, 'nodev'}, 0x2c}]}) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1000000000000000, &(0x7f0000000240)=ANY=[]) 19:24:27 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be9090a000000000000ae3c3934392c00aa"]) [ 875.531047] jfs: Unrecognized mount option "uid=" or missing value [ 875.563437] jfs: Unrecognized mount option "uid=" or missing value 19:24:27 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x3200}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 875.644485] jfs: Unrecognized mount option "uid=" or missing value [ 875.676769] jfs: Unrecognized mount option "uid=" or missing value 19:24:28 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:28 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="021000000a000000000000ebffffff0008001200000000000000610340fa44f468780900f002000000000000060000000000000000000000000002000020000000000000000800000000000000000000370aef2ba35934138ef82c6e26214b33671dca0a1915e3e1390bc9d1b59aacca24460b4a8769de22603b8eba08469cc1b490f8da3300305a005fb399634977e975bff2947a08d8a9cfd3408cf0707ca23d7f0796fe047ec7216d31e62b7a45d23fa4f980c9b25cc1d135f0781e265f40095dc3aa15db"], 0x50}, 0x1}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x2b7e0ec1b8e7a46, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000200)='./file0\x00', 0x6, 0x2, &(0x7f00000013c0)=[{&(0x7f00000003c0)="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", 0x1000, 0x1}, {&(0x7f0000000240)="abb44a42ea1ac3cdb4ea0227f90149af856e10cf8ba77390e2c80f51ca64cbe613a6a6c5f816c5fbb458cb027513a00133d964675d68d8aff122c30546cfd57d996138cc596d835fd219c4be38006964135bb508a86f1b65", 0x58, 0x3ff}], 0x4008, &(0x7f0000001400)={[{@prjjquota={'prjjquota', 0x3d, 'nodev'}, 0x2c}]}) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x4a9, &(0x7f0000000240)=ANY=[]) 19:24:28 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:28 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be9090000006c000000ae3c3934392c00aa"]) [ 876.545887] jfs: Unrecognized mount option "uid=" or missing value [ 876.597841] jfs: Unrecognized mount option "uid=" or missing value 19:24:28 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x3, &(0x7f0000000680), 0x0, &(0x7f00000001c0)=[{0xc}], 0xc}}], 0x2, 0x0) syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0xfffffffffffffe65) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x1, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x6}}}, &(0x7f0000000140)=0x84) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000280)={r1, 0x3, 0x0, 0x3}, &(0x7f00000002c0)=0x10) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xc0ed0000, &(0x7f0000000240)=ANY=[]) 19:24:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:28 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:28 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="021000000a000000000000ebffffff0008001200000000000000610340fa44f468780900f002000000000000060000000000000000000000000002000020000000000000000800000000000000000000370aef2ba35934138ef82c6e26214b33671dca0a1915e3e1390bc9d1b59aacca24460b4a8769de22603b8eba08469cc1b490f8da3300305a005fb399634977e975bff2947a08d8a9cfd3408cf0707ca23d7f0796fe047ec7216d31e62b7a45d23fa4f980c9b25cc1d135f0781e265f40095dc3aa15db"], 0x50}, 0x1}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x2b7e0ec1b8e7a46, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000200)='./file0\x00', 0x6, 0x2, &(0x7f00000013c0)=[{&(0x7f00000003c0)="ba27ab2fa39096db3fbe53515a53625b25a0aa38637e0d53519f662edfec3ddeaf8a0f037cd2f9a76d404a434a1c9ff68a4fdf066c2bfd4f8cf3493f58dad6e1648906d430e8226e1f23bd927af137295111586a4ce8e1f374910ce07ca6cfeae671990ec34c1944ddc4ff3cae6907b26356a4ce73409e57a0ac21c8d477d41a2320d9ddb0c085471e55a813465fef7913f94df5b277a133439ddc901ef1e43c8b39fb38e0c87abee04cf3d40c53ac3a8a9c8dffd2cf37ce092fe15a9f309ef9eeec12b4fba8555568c97180c5bd77aa3786cfab3dbb52b663a80c280e770fe729e40c40e39dcb47361632faf29ead029d507ffa35c62e8891091e887e4a568026597991a9a4ace0d31196c408a508e6d7b729b1ab62d4c9e3bb35921c5f2cbe35aac38615fad0caa30e9268d21f4a403083b6e50bd7bbe20fbb976d33979e8e96ace2724e84582b2f624c2d0c18f839e30b116c9b9efdeca97534f9d42016ca0a4a6f706b151d4ed5c1f95cb2ca1d3521736ca5f44d733ac123b4594dd57366a7cad0a605269ee80b54593660eebfa34bcdc28cee4513d8e08dcd04515de041060e0e38ed8f3c5eb2f8b92f45c51882927e7005270b6cd3f2f3dbeb007b79ce85bd04aac9dde84cb1ea69ec2471e639a6b81058c0452fbe348a29ad0f7fc6be47f83a60a318ee53e7bda86cdba7da595fcd5b6a20a3052f31acd5258e79a785ac6c24bf872537ab2bce88251f7d4fd54748c7aa78d51ff1b213b68f44d25765a7a9ec1929c9883309ec18f93d323bc76910908284372df3ce7c3fc9d1e65c4c90cd431d2d19a1d92d0a96adaa26888afe0cac6381aed9d425e869667423bfb2608f3bb4fd32793daafdc78e4d377b3c6bb483d2ef79696fed3cefd949f0a9cdbf3076e977edf4e07b0c66fe75eccbfeb587d13dd202752adb5594b11136d0242c52a2f27411b332fb9d2047f6898632535e785b21ce83b0efbed936d514b0fef42c8d3351414f4997f2308955082edd242a8b78eb673489f8d3b33e63f88c095a8096c118468c4e14dd9d700cfef9d9b794eeedd7454b32f0c34ec65dc0e466935a053b339a61e57c2480e2783bb33121396cf78fbef440db0c292856be773ec159fdc252cd2b87bb23937b4cbb7c8feb77542ad47c80ebdc161527704d1a64ab76507420507f6409017732677ee9fa9d10c779e35ba233e24c9315f801a6afe3779d56082e8eade6bcad720b7c09976a8940e616d1fb5cf8e090e4ee79f6b1e72f3b99cdbf440c7e7fa5c2f89331d951751682c033d0049b13799a96147b61aa98f920c12a2ea58d2882a0ca0970b3303ebf3d9072fd5da83097f4680d54917cc2cfe4703f1d5872e91b8c01f34ad17161d18181c57c116d4b4c7d5fc96ed5a8f5d0909e89503fde5209132c239bd7d71c0d85062b1e6ddce1e2efcded40ffe7c6cddb7c14a3fd2baaf3938c754377e503602c469f6e54d9580f815ef20939ef26e435d4780ba62a44f84d993cf71df7d2b2be07828b6012e5d0a2fb1279c48825d7f842c3cf67a98482f0cf4aa7793106e17018257fb111df2606ab0f039566c1d04e9e1a07cd016a71b29248d7eef7ab21152c281f40c09c4bf14462e2b04057a36aaf9f05054910d9ce16294060c278b2c0d0fbb31289bd4976a955e0c1a79493439c620cfe0f31c023c01f9e796e56fb7bce9bff538ef68ef7c389bcd0436bf2bc6f0aafa85a6fbfe52ce449c046ff95be5edaae0a9462c2657caac10902e84a496f75a5f71dd34ac16a2ac7245d7932a29313b42c9572031b4afc47c82a7a0f8196ba5e1a0bfc28d878541f935e6021eeaaffc593bc05e1c8a83c7437a47237b26e96e9064709e2658a8ccf2d637a9ed09d09010479dd835c452546519d8d94cb0493d0a03daf55dda1f4ec31587613af3d8df5c02bf74be0b1b4b13ad43741140b7a0bfcd591c19f415e4025cfd3b85f0d935be2da2a92c87009879848f56d74e357b0db64541898adc1f1cd28958177e6308be11c5e38491b308eebd612edd2105060bd1300f0b1f5924f7dd16e0d779f3e96ee4aa247b92566ce82f00cad03a95c48e50f3b699974cc20265a8451098e6b66a788ea53ad5f229631ef8298637ea2e62c8a3924bbf8ad84127f186a0b7c3f7a400b966de1d6e68c71bc5799f4cdc1b941541713ce24bab07706e9b7a0f49317064ba2f091e5cde69c562d45922ec858377cd791e2bcf20de59975f4b877eaa756519387412ef8627822340b3c5aed49df5683f0b07fe1fc1e6eab129bf72300ac81209f22cbe1f4d4f726528fc3e08b216b1e8bd755f42c963e346488b479cee455e5131f924b982f4bb4088dd7183a8527d3772c0568277e6bfab374f66fb8c2c035f614ab278579f3ff8dc33bb69734669f4f0794c3aabff2b88305f89001719c3a079bc0f828b63fa1bdac92a60b9758bc55d902fc54c52d1221d92cc99d08825b2cadfc567d617dfeee01a99370b0b862b86ad7a08258a9a242695e31b46fead3b0cd11d96f2ba7125b066e893e8972ccba2e00745ffac8b8d2688fcc154738e20ed757e08bf3e2f9a527aaa33c72750a881d762f8d2c9bebeca36cdcd2ec993f3c0e8d7dfc10cee3be632e1ce2c52a9c55f26bf51dbff155d69e500e19de515a9e3badc7aa26987e2ca955553e0ba9aaf91877eb7552351915fd8f887347264ce73413c92cd00876e6d21f9d7f16ee374a9dab6278fbaaea85a596d81db463aa2fbd514bbac50bffc5b708c70ff572151398089858def006afca513177c32cb17f00bb45fe7ef734cc8f7f038dd7035dd948fa011ef789f801ca40ed88e5c2eb85c6e289959cba9b870531dca4015d9bf4da6fee23a6f6fe76d53134758d0ff0acd49a658c596b967553babfeec870da84a5606056419ab48afa440477882cb985e094cef7500676bc7bc4d7b22482a17c83a37807e67834023393114bc45cc9b7e73f0c607dae344f6a4553085d26bdfa35bc11907b2839ef3ba3a95ced5b987d2bd8f867da168b49a45f09506df56529c3f55d3eb010501e213d6d5c89ae9a3bdfe55d87cc807aab43c5e7bff01fb72fa32621afc545fc2f5dbdc6f4d1a9757878960dda9b2fb526df93dfb77438535baf9f4e6a28701e9abcda097490161138de79fd6c4f04429672abdc52e2e2b888d4f5e7db3db25bbc81084ee8e2bc167d6b9393316aac9285d8e37a73b0b83a178a2e090701976e0f7d74e99e643653af9f01f46817a683c2b18bc969db2c5ef8409744257e11ef9c6de3bb308b027776449e881796e358611ca1509cd045819288dce9942563284fe84461e03580af4f78d921d984e46635abc704c1032715338f87c2650a1ff19eae9cfac2f330d78b0b0e2b3d378e843f5dc4e133ceb916c67da038f23092e8f3d87174508850043c81a4805121a9b578c9c579dfd29437b7b10e728a23b86c1d181f97d4582f5bc6bd2123317ea904605e79a08b1e6efe68e46eb4cdccf0065477edadbd09ced78e0876497503a79cc7f01218151d3a0f29afc9ef50a168193f25fb1e24782fc9ec9c9e21b7e4b3982ddb1e8864d61907b429ce0c8edb5431381cb1002ed65be8f869d6e8ce13005c25184583df107949ebb8385ad2581e554e14e2028c968cab5fb38695c21cb2de7e1b71719233e8dbbf7045bc7fa08ee422a10a2a365fbcca47751172854fc0ea2d80c4e8623dd0748abe67fdc8d0835a3b66e03c91d1f4d3eacef4131cd1a09445586d8bc232cdb57ceb6c656dd8ec187f84623c6a5f883ff65a4c9788f8a64e64b8b02499d329cc87e0f9ab66c955ace90bda103e3c9b4b1ef7be6fef385807d7636b28f4fa162a9182ceb19e5ab798400407d68ee7b6ec2941dcd58ee3573aabb4803d1bb36ff89a8466b5fa8553c6be055d6ea2c4b776ee0f0d50bbd01c145d040dbb0e43305f6d13be4ee7fde1e3f6eba2125a0e4c92804b36a8a7be917b10cbfc6974672ab69898b740113e319b190022b914f522b12865b5a4a9d79ab4c8f9f034e56e4e1580559b61d375776f5f876a59534f4a6647530377262c3314bd061c7ddaef99d354767f18731dbdd068a26a624d999180148bb2cf146e53460cc72f4a18bd30ec13811219922ec03d0228149d16c4a944fa1b7483fb50304d3520d5fe0cb0e01bc7d244e0bdeb20f537a81991591a8379456102d3304b308a58b10f9c146551cfdba6ba23790f2af6b5745e2e1c25d1a236a0ae0ce92ddef6f604e63aa548fd7d6aca79ce0620cc4b131c29d1c66bb8ab793e04b8d6a33bcc8f837e3d4036fb6f28fc829773733d3a2d7d9be1133e9ff61c8e36efcc900141416f8b2e31c90cb476eeff047498c5e5f2fe78ba73433eb9be0ee22d43b9dbf98c2c1937d74f044c61f154054612f0d9dac31815ad15373ab21f775245860ea54b7e10cf306d56ff8f155f92527b5d6b316e074b5335d7923d2a5e4e2b747ae3e8ad264973c6e37d384ce6852833c3a25aeecabce0a56890a09917d536440c3e58739aa6d1ffa069b440d7f4248a3553ef3f4a0b5dc97a2890d945c92f7dd64e76fb917ccf298f0d37ac5ecaa3b3a66cf138eea06e08383b9dcfb9d6f41aa36f4f22ff2061e9da4e8ea2051be4d5455d7b5841509a2d87f3d8b66202c7ac6f3003c441c3a5ef38408b73e96b812c5025d86a94bc79dc821966e76c72d0cb7a159e99a590dc2a683178eb40d54a8329414648451915e7b536f553c48de7ccd3709a733c946de23bd83d25c4dcb3977f9afeea9bbbfc8ec6f25b6e4210d662274edee87e2759dd74a54e706d5e5027690490ed906bdd7cffd74bc6be0751e3f66e362dd77bb27eec6f2bf56b708d5d1093e30b663a3e95780be2eef1905cc2e78c9b4b23b02a2fbae9e53bfbea4badb46cc6c3cdedf61b65e7bdb8b7fe20579ff2590cbd25fbf79dcf9e10f2b8e7ed4d3ef0e05ede1560aaa499ea7c7338f7fab2332183065d9ef54cbdb0e94b04b557a69863c016e50a2dd4690226016c15237b7e50564d007b484fc61c971fede8a2a6d91c559add28697da18e461ab7b2b7a8d6e706a822cbab5dbf200ae581fac23089fcc7c1b5aecd9ed127f72902287a20462c83ea6112651f016f22caaeb417e68dc34502ff268eb51742dd9a80ee640e1d7d27dbf2f7fdefefdd05b683149d54cb7ac99265f8d39134846039ef5169ab731b1cc134ea3175c64aca32a016c9e86cafe74bbff037ab7e0d22ae2a69569cc0fc423e8a42e1dafd37f437a24d9cc250b460d0c5626a6c085c8e41715952ffead692fd5a4d1af5fd1c4b09797ec3d0616057115ad38adafafd5f1d2d61d036eb1629d2a5f9dde2f07f6fa4a6fc9954a1fddd63abc62e95e5d5851f9011f4b019320a91158574e21441f64b8ca26813bbc95cb4177ba3d9280be6c79cc33718a26a9924c46c35a02aff58eacd5d1ea9e1c48874b15a07482d79f6ff00256a1252891c28ab90fd5b41d643dcff4886f578877d1d18e9063dd66371e9771de41baace86eaf23866192801ae5fc7d0133c78b139a0b8741164d65b50d582fe293bed710aa6bdce294c7c745aaabd1993aff4b93531a9e92127c98bd8b2ff7386645ba843552dfbc974d042e9d546a90355875bb83fcc50343d484047ca9ac99b7baacedbbaae3a07b8dd75bade68db5de3ed7a416f7a592466bbbc249ced70ecf9fe39dc0a8f4743b5cf656eec7b3df4b341525167671e05c0d1e20fcb678e8835a0c4ad079366af13d1e1c0d0cc447dba73e71f01ad7b6d319bcb4016a32b", 0x1000, 0x1}, {&(0x7f0000000240)="abb44a42ea1ac3cdb4ea0227f90149af856e10cf8ba77390e2c80f51ca64cbe613a6a6c5f816c5fbb458cb027513a00133d964675d68d8aff122c30546cfd57d996138cc596d835fd219c4be38006964135bb508a86f1b65", 0x58, 0x3ff}], 0x4008, &(0x7f0000001400)={[{@prjjquota={'prjjquota', 0x3d, 'nodev'}, 0x2c}]}) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:28 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900200000000000ae3c3934392c00aa"]) 19:24:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x8, 0x48000) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000240)={{0x87, @loopback=0x7f000001, 0x4e23, 0x3, 'sh\x00', 0x10, 0x3f, 0x1f}, {@empty, 0x4e23, 0x3, 0x84, 0x3ff, 0x6}}, 0x44) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xf000000, &(0x7f0000000240)=ANY=[]) 19:24:28 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="021000000a000000000000ebffffff0008001200000000000000610340fa44f468780900f002000000000000060000000000000000000000000002000020000000000000000800000000000000000000370aef2ba35934138ef82c6e26214b33671dca0a1915e3e1390bc9d1b59aacca24460b4a8769de22603b8eba08469cc1b490f8da3300305a005fb399634977e975bff2947a08d8a9cfd3408cf0707ca23d7f0796fe047ec7216d31e62b7a45d23fa4f980c9b25cc1d135f0781e265f40095dc3aa15db"], 0x50}, 0x1}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x2b7e0ec1b8e7a46, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000200)='./file0\x00', 0x6, 0x2, &(0x7f00000013c0)=[{&(0x7f00000003c0)="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", 0x1000, 0x1}, {&(0x7f0000000240)="abb44a42ea1ac3cdb4ea0227f90149af856e10cf8ba77390e2c80f51ca64cbe613a6a6c5f816c5fbb458cb027513a00133d964675d68d8aff122c30546cfd57d996138cc596d835fd219c4be38006964135bb508a86f1b65", 0x58, 0x3ff}], 0x4008, &(0x7f0000001400)={[{@prjjquota={'prjjquota', 0x3d, 'nodev'}, 0x2c}]}) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:28 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 876.838104] jfs: Unrecognized mount option "uid=" or missing value [ 876.873495] jfs: Unrecognized mount option "uid=" or missing value 19:24:29 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90975090000000000ae3c3934392c00aa"]) [ 877.022860] jfs: Unrecognized mount option "uid=" or missing value [ 877.040855] jfs: Unrecognized mount option "uid=" or missing value 19:24:29 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x6200, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000240)={0x7, 0x1, 0x7, 0x4, 0x7, 0x8, 0x4, 0x5, 0x100000001, 0x1}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f00000070c0), 0x8c0) read$FUSE(r1, &(0x7f0000002640), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:29 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:29 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="021000000a000000000000ebffffff0008001200000000000000610340fa44f468780900f002000000000000060000000000000000000000000002000020000000000000000800000000000000000000370aef2ba35934138ef82c6e26214b33671dca0a1915e3e1390bc9d1b59aacca24460b4a8769de22603b8eba08469cc1b490f8da3300305a005fb399634977e975bff2947a08d8a9cfd3408cf0707ca23d7f0796fe047ec7216d31e62b7a45d23fa4f980c9b25cc1d135f0781e265f40095dc3aa15db"], 0x50}, 0x1}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x2b7e0ec1b8e7a46, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x48000000, &(0x7f0000000240)=ANY=[]) 19:24:29 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000003000000ae3c3934392c00aa"]) 19:24:29 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x4, 0x400) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000100)={0x5, 0x6, 0x7bdb, 0xff, 0x7f}) mmap(&(0x7f000001e000/0x2000)=nil, 0x2000, 0x1, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000080), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:29 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97f81a0000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 877.746624] jfs: Unrecognized mount option "uid=" or missing value [ 877.785973] jfs: Unrecognized mount option "uid=" or missing value 19:24:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1c00000000000000, &(0x7f0000000240)=ANY=[]) 19:24:29 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="021000000a000000000000ebffffff0008001200000000000000610340fa44f468780900f002000000000000060000000000000000000000000002000020000000000000000800000000000000000000370aef2ba35934138ef82c6e26214b33671dca0a1915e3e1390bc9d1b59aacca24460b4a8769de22603b8eba08469cc1b490f8da3300305a005fb399634977e975bff2947a08d8a9cfd3408cf0707ca23d7f0796fe047ec7216d31e62b7a45d23fa4f980c9b25cc1d135f0781e265f40095dc3aa15db"], 0x50}, 0x1}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x2b7e0ec1b8e7a46, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:29 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000a40)=0x8000, 0x8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000006940)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f0000006700)=[{{&(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000340)=""/95, 0x5f}, {&(0x7f00000002c0)=""/55, 0x37}, {&(0x7f0000000640)=""/241, 0xf1}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f00000003c0)=""/3, 0x3}, {&(0x7f0000000800)=""/7, 0x7}, {&(0x7f0000000840)=""/185, 0xb9}, {&(0x7f0000000900)=""/145, 0x91}], 0x8, &(0x7f0000000a40), 0x0, 0x2}, 0x9}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000a80)=""/214, 0xd6}, {&(0x7f0000000b80)=""/248, 0xf8}, {&(0x7f0000000c80)=""/25, 0x19}, {&(0x7f0000000cc0)=""/163, 0xa3}], 0x4, &(0x7f0000000dc0)=""/208, 0xd0, 0x3ff}, 0x8}, {{&(0x7f0000000ec0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000003080)=[{&(0x7f0000000f40)=""/4096, 0x1000}, {&(0x7f0000001f40)=""/170, 0xaa}, {&(0x7f0000003000)=""/83, 0x53}], 0x3, &(0x7f00000030c0)=""/98, 0x62, 0xfffffffffffffffe}, 0x400}, {{&(0x7f0000003140)=@hci={0x0, 0x0}, 0x80, &(0x7f00000035c0)=[{&(0x7f00000031c0)=""/7, 0x7}, {&(0x7f0000003200)=""/114, 0x72}, {&(0x7f0000003280)=""/14, 0xe}, {&(0x7f00000032c0)=""/92, 0x5c}, {&(0x7f0000003340)=""/228, 0xe4}, {&(0x7f0000003440)=""/26, 0x1a}, {&(0x7f0000003480)=""/23, 0x17}, {&(0x7f00000034c0)=""/152, 0x98}, {&(0x7f0000003580)}], 0x9, &(0x7f0000003680)=""/14, 0xe, 0x3}, 0x7f}, {{&(0x7f00000036c0)=@in={0x0, 0x0, @local}, 0x80, &(0x7f0000003a00)=[{&(0x7f0000003740)=""/140, 0x8c}, {&(0x7f0000003800)=""/229, 0xe5}, {&(0x7f0000003900)=""/206, 0xce}], 0x3, &(0x7f0000003a40)=""/222, 0xde, 0x7}, 0x7}, {{&(0x7f0000003b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003bc0)=""/7, 0x7}, {&(0x7f0000003c00)}, {&(0x7f0000003c40)=""/15, 0xf}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x753}, 0x9}, {{&(0x7f0000004cc0)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000005dc0)=[{&(0x7f0000004d40)=""/4096, 0x1000}, {&(0x7f0000005d40)=""/102, 0x66}], 0x2, &(0x7f0000005e00)=""/212, 0xd4, 0xffff}, 0x10001}, {{&(0x7f0000005f00)=@pppoe={0x0, 0x0, {0x0, @local}}, 0x80, &(0x7f00000060c0)=[{&(0x7f0000005f80)}, {&(0x7f0000005fc0)=""/2, 0x2}, {&(0x7f0000006000)=""/129, 0x81}], 0x3, &(0x7f0000006100)=""/200, 0xc8, 0x1f}, 0x401}, {{&(0x7f0000006200)=@l2, 0x80, &(0x7f00000065c0)=[{&(0x7f0000006280)=""/86, 0x56}, {&(0x7f0000006300)=""/253, 0xfd}, {&(0x7f0000006400)=""/238, 0xee}, {&(0x7f0000006500)=""/154, 0x9a}], 0x4, &(0x7f0000006600)=""/243, 0xf3, 0x280c}, 0x2}], 0x9, 0x42, &(0x7f0000006980)={r2, r3+30000000}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000069c0)={@ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x67, r4}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000006a00)={0x7be, 0x5, 0x3, 0x4, 0x1, [{0x3, 0x2, 0xe11, 0x0, 0x0, 0x3208}]}) 19:24:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = dup3(r0, r0, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x111, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000240), r2}}, 0x18) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000000000002000000000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:30 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be909fffffdfd000000ae3c3934392c00aa"]) 19:24:30 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:30 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="021000000a000000000000ebffffff0008001200000000000000610340fa44f468780900f002000000000000060000000000000000000000000002000020000000000000000800000000000000000000370aef2ba35934138ef82c6e26214b33671dca0a1915e3e1390bc9d1b59aacca24460b4a8769de22603b8eba08469cc1b490f8da3300305a005fb399634977e975bff2947a08d8a9cfd3408cf0707ca23d7f0796fe047ec7216d31e62b7a45d23fa4f980c9b25cc1d135f0781e265f40095dc3aa15db"], 0x50}, 0x1}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x2b7e0ec1b8e7a46, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x20000000, &(0x7f0000000240)=ANY=[]) [ 878.036397] jfs: Unrecognized mount option "uid=" or missing value [ 878.066211] jfs: Unrecognized mount option "uid=" or missing value 19:24:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x5d220000, &(0x7f0000000240)=ANY=[]) 19:24:30 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:30 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="021000000a000000000000ebffffff0008001200000000000000610340fa44f468780900f002000000000000060000000000000000000000000002000020000000000000000800000000000000000000370aef2ba35934138ef82c6e26214b33671dca0a1915e3e1390bc9d1b59aacca24460b4a8769de22603b8eba08469cc1b490f8da3300305a005fb399634977e975bff2947a08d8a9cfd3408cf0707ca23d7f0796fe047ec7216d31e62b7a45d23fa4f980c9b25cc1d135f0781e265f40095dc3aa15db"], 0x50}, 0x1}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x2b7e0ec1b8e7a46, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:30 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900400000000000ae3c3934392c00aa"]) 19:24:30 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x400, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f00000000c0)=0x3) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000100)={0x6, 0x20400000000000, 0x1000, 0xfff, 0x56, 0x3, 0xdf1, 0x100000000}, &(0x7f0000000140)={0x40, 0x1, 0x1, 0x5, 0x6, 0x0, 0xfff, 0xffff}, &(0x7f0000000280)={0x0, 0x400, 0x3, 0x7fff, 0xfff, 0x2, 0xffffffffffffdd2c, 0x20000}, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300)={0x3ff}, 0x8}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer2\x00', 0x400100, 0x0) 19:24:30 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file1\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) select(0x40, &(0x7f0000000180)={0x5, 0x2, 0x5, 0x1, 0x8, 0x6000000000000000, 0x0, 0x7f}, &(0x7f0000000240)={0x8fb, 0x82, 0xa686, 0xffffffffffff16ca, 0x7, 0x1ff, 0xff, 0xf83}, &(0x7f0000000280)={0x1ff000000000000, 0x3, 0xfffffffffffffffc, 0x2, 0x8, 0x1000, 0x1, 0x3}, &(0x7f0000000340)={r1, r2/1000+10000}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 878.937763] jfs: Unrecognized mount option "uid=" or missing value [ 878.959458] jfs: Unrecognized mount option "uid=" or missing value 19:24:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file1\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000180)='./file0/file1\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f00000000c0)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303030303030300600000000000000643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:31 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="021000000a000000000000ebffffff0008001200000000000000610340fa44f468780900f002000000000000060000000000000000000000000002000020000000000000000800000000000000000000370aef2ba35934138ef82c6e26214b33671dca0a1915e3e1390bc9d1b59aacca24460b4a8769de22603b8eba08469cc1b490f8da3300305a005fb399634977e975bff2947a08d8a9cfd3408cf0707ca23d7f0796fe047ec7216d31e62b7a45d23fa4f980c9b25cc1d135f0781e265f40095dc3aa15db"], 0x50}, 0x1}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x2b7e0ec1b8e7a46, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:31 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000005000000ae3c3934392c00aa"]) 19:24:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1500, &(0x7f0000000240)=ANY=[]) [ 879.107370] jfs: Unrecognized mount option "uid=" or missing value [ 879.133217] jfs: Unrecognized mount option "uid=" or missing value 19:24:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f0000000380)=0x1c) ioctl$sock_ifreq(r1, 0x89ff, &(0x7f00000003c0)={'bridge0\x00', @ifru_flags=0x6f00}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/rt_acct\x00') ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000240)=""/189) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r3 = msgget$private(0x0, 0x40000000181) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000006c0)=""/133) write$FUSE_INIT(r0, &(0x7f0000000640)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x800000000, 0x0, 0x0, 0x0, 0x2}}, 0x55) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1a, &(0x7f0000000240)=ANY=[]) 19:24:31 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="021000000a000000000000ebffffff0008001200000000000000610340fa44f468780900f002000000000000060000000000000000000000000002000020000000000000000800000000000000000000370aef2ba35934138ef82c6e26214b33671dca0a1915e3e1390bc9d1b59aacca24460b4a8769de22603b8eba08469cc1b490f8da3300305a005fb399634977e975bff2947a08d8a9cfd3408cf0707ca23d7f0796fe047ec7216d31e62b7a45d23fa4f980c9b25cc1d135f0781e265f40095dc3aa15db"], 0x50}, 0x1}, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:31 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be909007a0000000000ae3c3934392c00aa"]) 19:24:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x29) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6100}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xdb260000, &(0x7f0000000240)=ANY=[]) 19:24:31 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") r1 = socket$key(0xf, 0x3, 0x2) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 879.279139] jfs: Unrecognized mount option "uid=" or missing value [ 879.303968] jfs: Unrecognized mount option "uid=" or missing value 19:24:32 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ce43d}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:32 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900070000000000ae3c3934392c00aa"]) 19:24:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x9000000, &(0x7f0000000240)=ANY=[]) 19:24:32 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:32 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=0x0, &(0x7f0000000240)=0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000340)={r2, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x3f, 0xfc7}, 0x90) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:32 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000000c0)={0x90e7}) syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x4, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000100)=[0xffffffffffffffff, 0x2]) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x80000, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f00000002c0)=0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f00000070c0), 0x8c0) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000240)) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 880.414597] jfs: Unrecognized mount option "uid=" or missing value 19:24:32 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff85}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:32 executing program 5: socket$inet6(0xa, 0x100000003, 0x5) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:32 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be909000a0000000000ae3c3934392c00aa"]) 19:24:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0000f2e804d481bbc0be942ce994c77a19ccf91015f65ea277571fba566294f149344f317ae611a9c8c947ed6eb02730873b6fc64293154e1027cd944913c7"]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(0xffffffffffffffff, &(0x7f00000070c0), 0x8c0) read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x1000) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x8}, 0x10) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)={0xaa}) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$FUSE_CREATE_OPEN(r3, &(0x7f0000000900)={0xa0, 0x0, 0x7, {{0x1, 0x0, 0xffffffffffffffe1, 0x91, 0x5, 0x6, {0x0, 0x9, 0x4, 0x1, 0x100, 0x6, 0x1a4, 0xc55, 0x2158, 0x2cd0b0fc, 0x8, r0, r1, 0x1ff, 0x7}}}}, 0xa0) recvmsg$kcm(r3, &(0x7f0000000580)={&(0x7f0000000340)=@hci, 0x80, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/31, 0x1f}, {&(0x7f0000000640)=""/197, 0xc5}, {&(0x7f0000003000)=""/4096, 0x1000}], 0x3, &(0x7f0000000500)=""/92, 0x5c, 0xfffffffffffff939}, 0x12001) ioctl$KVM_S390_VCPU_FAULT(r3, 0x4008ae52, &(0x7f0000000280)=0x5) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r4, 0x84, 0x74, &(0x7f0000004000)=""/4096, &(0x7f0000000440)=0x1000) r5 = creat(&(0x7f0000000800)='./file0/file1\x00', 0x12) write$eventfd(r5, &(0x7f0000000080), 0xfffffe5e) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) ioctl$TCSETAW(r5, 0x5407, &(0x7f0000000740)={0x7, 0xc, 0x8001, 0x3, 0x6, 0x8, 0x0, 0xbdc7, 0x2, 0x80000000}) munmap(&(0x7f0000077000/0x2000)=nil, 0x2000) dup2(r5, r2) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) r6 = semget$private(0x0, 0x4, 0x8) semctl$SETVAL(r6, 0x1, 0x10, &(0x7f0000000400)=0x6) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) [ 880.457795] jfs: Unrecognized mount option "uid=" or missing value 19:24:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x8000000000000000, &(0x7f0000000240)=ANY=[]) 19:24:32 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:32 executing program 5: socket$inet6(0xa, 0x100000003, 0x5) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 880.556272] jfs: Unrecognized mount option "uid=" or missing value 19:24:32 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xf5ffffff, &(0x7f0000000240)=ANY=[]) 19:24:32 executing program 5: socket$inet6(0xa, 0x100000003, 0x5) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:32 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be909001f0000000000ae3c3934392c00aa"]) [ 880.607624] jfs: Unrecognized mount option "uid=" or missing value 19:24:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xfffffffe, &(0x7f0000000240)=ANY=[]) 19:24:32 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6900}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 880.708413] jfs: Unrecognized mount option "uid=" or missing value [ 880.746857] jfs: Unrecognized mount option "uid=" or missing value 19:24:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:33 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f00000000c0)={{0xa, 0x4e24, 0x1ff, @remote={0xfe, 0x80, [], 0xbb}, 0x957a}, {0xa, 0x4e24, 0x40, @empty, 0x1}, 0xda3, [0x3, 0x1, 0x1, 0x8bdc, 0x1b0, 0x7, 0x3, 0x8001]}, 0x5c) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f00000006c0)) r1 = socket(0x9, 0xa, 0x2) accept4(0xffffffffffffffff, &(0x7f0000000240)=@xdp={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0x80, 0x800) sendmsg$can_bcm(r1, &(0x7f0000000680)={&(0x7f0000000340)={0x1d, r2}, 0x10, &(0x7f0000000640)={&(0x7f0000000380)={0x7, 0x100, 0x2d, {0x0, 0x7530}, {0x77359400}, {0x4, 0xd2, 0x65, 0x77}, 0x1, @can={{0x0, 0x7ffa, 0xfffffffffffffffd, 0x2}, 0x7, 0x1, 0x0, 0x0, "d49393e6dd7274c0"}}, 0x48}, 0x1, 0x0, 0x0, 0x810}, 0x2000c010) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xd, &(0x7f0000000240)=ANY=[]) 19:24:33 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:33 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000975000000ae3c3934392c00aa"]) 19:24:33 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x33c) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2ca8000080"]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002640)=@ipv6_newroute={0x2c, 0x18, 0x9, 0x0, 0x0, {0xa}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x2}, @RTA_ENCAP={0x8, 0x16, @typed={0x4, 0x4, @binary}}]}, 0x2c}, 0x1}, 0x0) r4 = gettid() sendmsg$unix(r0, &(0x7f0000001680)={&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000340)="ec889ecb821cb16e7ffeb4c4f0441d3656647d603c1ec777bcd6d97d73f6aee169859d5e7c3ee6eb74127a5aeda6ad71eb28dcfbbcaa8d19c01616d48b8fa248c445676ec15f184f3c9852f2b1549290b8c2157adbceb1e8afc936", 0x5b}, {&(0x7f0000000640)="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", 0x1000}], 0x2, &(0x7f0000001640)=[@cred={0x20, 0x1, 0x2, r4, r1, r2}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}], 0x40, 0x4044080}, 0x440c0) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x1, 0x0) fchmodat(r5, &(0x7f0000000240)='./file0/file1\x00', 0x20) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) connect$bt_l2cap(r5, &(0x7f00000016c0)={0x1f, 0xfffffffffffffffd, {0x0, 0x7f, 0x80, 0x2, 0x1, 0xffffffff}, 0x6, 0xffffffff}, 0xe) 19:24:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:33 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 881.897553] netlink: 'syz-executor2': attribute type 21 has an invalid length. [ 881.914870] jfs: Unrecognized mount option "uid=" or missing value [ 881.926437] netlink: 'syz-executor2': attribute type 4 has an invalid length. 19:24:34 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x3f2, &(0x7f0000000240)=ANY=[]) 19:24:34 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000006000000ae3c3934392c00aa"]) [ 881.970351] jfs: Unrecognized mount option "uid=" or missing value [ 882.009567] netlink: 'syz-executor2': attribute type 21 has an invalid length. 19:24:34 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 882.042186] netlink: 'syz-executor2': attribute type 4 has an invalid length. 19:24:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0xfffffffffffffffe, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) r1 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x4e5d307c, 0x800) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000240)={0x0, 0x5}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000002c0)={r2, 0x2}, 0x8) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000340)={0xffffffffffffffff}, 0x117, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f00000003c0)={0x4, 0x8, 0xfa00, {r3, 0x9}}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x2522, &(0x7f0000000240)=ANY=[]) 19:24:34 executing program 5: ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 882.082702] jfs: Unrecognized mount option "uid=" or missing value [ 882.108926] jfs: Unrecognized mount option "uid=" or missing value 19:24:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000380)='./file0/file2\x00', &(0x7f0000000740)) stat(&(0x7f00000007c0)='./file0/file1\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@ipv4={[], [], @rand_addr}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) mount$fuse(0x0, &(0x7f0000000340)='./file0/file1\x00', &(0x7f00000003c0)='fuse\x00', 0x2004000, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000010000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00003cfa1a2915c4f444cf9df1"]) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) r3 = socket$unix(0x1, 0x0, 0x0) recvfrom$unix(r3, &(0x7f0000001a40)=""/210, 0xd2, 0x2042, &(0x7f0000001b40)=@file={0x0, './file0\x00'}, 0x6e) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x400000, 0x0) bind$inet(r4, &(0x7f0000000240)={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) get_thread_area(&(0x7f0000000200)={0x2, 0x0, 0x1000, 0x200, 0x0, 0x34d8, 0x8001, 0x8, 0x6, 0x80000000}) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000002c0)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f00000009c0)={0x0, 0x1000, "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"}, &(0x7f0000000300)=0x1008) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000001a00)={r5, 0x8}, 0x8) 19:24:35 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:35 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900030000000000ae3c3934392c00aa"]) 19:24:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xf, &(0x7f0000000240)=ANY=[]) 19:24:35 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67727669705f69643d77ffbe61805348171cbfe0bd5ed32cbbb5f32625d118751c873ca01317131ce51c4ad4f27000000000000000d96ad4bbf12f2f8f8c6828b2bc930db1a0af2bdda9192596a8e1440f0e046f9872e892d2b0e14569c50b1140633252c42ca67f4162c4ad92139f37961c8b1b3f6421045afdcf9eda5955b0e1415ea371314a69f94a3527", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000000740), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[], 0x0) 19:24:35 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'btrfs.', '/dev/snd/seq\x00'}, &(0x7f0000000280)=""/167, 0xa7) 19:24:35 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="6a34adb6f7a86ea37b507c24b19259e43ef45f91579bc3b6f8928f8531f70ef2edcd63849b275467be32ddbfdbce392459c611cec89d2fda9e6596db9d6a3b0d47d853778035082d9cc4a5c7a634304faf74d25e9c3744a98d2829c83362875268811da2c5d3fa5111f0188a7a39d1b3d8f198dc6d61feded1ea738308a1c01ff0b7d6e1d578e7a6ed"]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x191081, 0x0) readlinkat(r1, &(0x7f00000002c0)='./file0/file1\x00', &(0x7f0000000340)=""/142, 0x8e) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0xfffffffffffffff5, 0x2, {0x7, 0x1b, 0xfffffffffffffffc, 0x80, 0xfffffffffffffffc, 0xb2, 0x800, 0xc42}}, 0x50) sendmsg$rds(r1, &(0x7f0000001d80)={&(0x7f0000000400)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x10, &(0x7f0000001940)=[{&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/101, 0x65}, {&(0x7f0000000840)=""/77, 0x4d}, {&(0x7f00000008c0)=""/107, 0x6b}, {&(0x7f0000000940)=""/4096, 0x1000}], 0x5, &(0x7f0000001c80)=[@rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000019c0)=""/159, 0x9f}, &(0x7f0000000440), 0x37}}, @rdma_args={0x48, 0x114, 0x1, {{0x9, 0x4}, {&(0x7f0000001a80)=""/212, 0xd4}, &(0x7f0000001bc0)=[{&(0x7f0000001b80)=""/2, 0x2}], 0x1, 0x1d, 0x3}}, @cswp={0x58, 0x114, 0x7, {{0x800, 0x6}, &(0x7f0000001c00)=0x1, &(0x7f0000001c40)=0xfffffffffffffff8, 0x101, 0x5, 0x3ff, 0xfffffffffffffff7, 0xa, 0xfffffffffffffc01}}], 0xd0, 0x41}, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f3570246367726f75701500000000"], 0x90) [ 883.251640] jfs: Unrecognized mount option "uid=" or missing value 19:24:35 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) mount$fuse(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x2000040, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}, 0x2c}, {@blksize={'blksize', 0x3d, 0x800}, 0x2c}, {@allow_other='allow_other', 0x2c}, {@allow_other='allow_other', 0x2c}, {@max_read={'max_read', 0x3d, 0x7}, 0x2c}, {@blksize={'blksize', 0x3d, 0x400}, 0x2c}]}}) read$FUSE(r0, &(0x7f0000002000), 0x1000) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cuse\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000740)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f00000007c0)={0x8, 0x120, 0xfa00, {0x4, {0x7, 0x95f0, "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", 0x0, 0xffffffffffffff80, 0xfffffffffffffffd, 0x6000000000000000, 0x2, 0x9, 0x5}, r4}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000380)={0x10, 0x30, 0xfa00, {&(0x7f0000000340)={0xffffffffffffffff}, 0x1, {0xa, 0x4e21, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x9}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r3, &(0x7f00000003c0)={0x11, 0x10, 0xfa00, {&(0x7f00000002c0), r5}}, 0x18) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c, {[{@default_permissions='default_permissions', 0x2c}, {@blksize={'blksize', 0x3d, 0x200}, 0x2c}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:35 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000340)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x4800000000000000, &(0x7f0000000240)=ANY=[]) 19:24:35 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 883.353947] jfs: Unrecognized mount option "uid=" or missing value 19:24:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="72d20e9829e9236d2fcedfc0d01e66ebcd81ab95816cdf1da7830711a0fc242448e6029cfe1392d1c37a97ec8dce3ed1630d17970ebe5fd63659174c81adb8f1ec770c8e17caaafda4c1bbf00200ed38db26643b9ad0d8fa6182b29b958d1198b04bb6ceee633995d8e09b54a2b9d93249e8588c56afb8a608367737650485e5670817a4ca1e18d0e8d1ecd6d8e474deb5dde6a4c98fc2ce86f1176472ccc4720b3d685e7c83e8e7d40239920055ebda785d77a79eb404fb19ab431f"]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x20}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d3100000000000000000000000000000000000000000001000000000000002c0000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570060067726f75701500000000"], 0x90) 19:24:35 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be9090000edc0000000ae3c3934392c00aa"]) 19:24:35 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 883.469295] jfs: Unrecognized mount option "uid=" or missing value 19:24:35 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:35 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:35 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000020000000ae3c3934392c00aa"]) 19:24:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x5d22000000000000, &(0x7f0000000240)=ANY=[]) 19:24:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',gboup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 883.523319] jfs: Unrecognized mount option "uid=" or missing value [ 883.591407] jfs: Unrecognized mount option "uid=" or missing value [ 883.626301] jfs: Unrecognized mount option "uid=" or missing value 19:24:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1e00000000000000, &(0x7f0000000240)=ANY=[]) 19:24:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:36 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:36 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900680000000000ae3c3934392c00aa"]) 19:24:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f00000003c0)='./file0/file1\x00', 0x46) accept4$inet(r0, &(0x7f0000000640)={0x0, 0x0, @loopback}, &(0x7f0000000680)=0x10, 0x80000) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f00000006c0)=0x401) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f00000070c0), 0x8c0) read$FUSE(r1, &(0x7f0000002000), 0x1000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000380)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x48, r2, 0x0, 0x70bd2a, 0x25dfdbfe, {0xd}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x20}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x841) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000740)={0x174, r2, 0x100, 0x70bd2b, 0x25dfdbff, {0x10}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xbc7c}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1403a30c}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x23a1}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback={0x0, 0x1}}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote={0xfe, 0x80, [], 0xbb}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback=0x7f000001}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffffffffff8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1=0xe0000001}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xc6f}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x40000}, 0x40) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:36 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400001, 0x0) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='d=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:36 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x3) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8000202, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) [ 884.687695] jfs: Unrecognized mount option "uid=" or missing value 19:24:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) accept4(0xffffffffffffffff, &(0x7f0000001a80)=@hci={0x0, 0x0}, &(0x7f0000001b00)=0x80, 0x80800) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001b40)={r2, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2=0xe0000002}, 0xc) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x4a8, &(0x7f0000000240)=ANY=[]) 19:24:36 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:36 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90909750000000000ae3c3934392c00aa"]) [ 884.742289] jfs: Unrecognized mount option "uid=" or missing value 19:24:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x23000000, &(0x7f0000000240)=ANY=[]) [ 884.835962] jfs: Unrecognized mount option "uid=" or missing value [ 884.868209] jfs: Unrecognized mount option "uid=" or missing value 19:24:36 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be9090000003f000000ae3c3934392c00aa"]) 19:24:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:37 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xda26, &(0x7f0000000240)=ANY=[]) [ 884.986369] jfs: Unrecognized mount option "uid=" or missing value 19:24:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:37 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900480000000000ae3c3934392c00aa"]) [ 885.027145] jfs: Unrecognized mount option "uid=" or missing value [ 885.122096] jfs: Unrecognized mount option "uid=" or missing value [ 885.153545] jfs: Unrecognized mount option "uid=" or missing value 19:24:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000180)={0x18, 0x1, 0x0, {0x7245}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="66643d1a4d8168689eb11adcaf4d8275229e02c17bb10798b02bbf0cc040c83e35fe7f21f9f7dff5ec42b0b82208d96a60479d97914f7b4a663caa0c069d28f1cf5aab7dc5", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:37 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x16, &(0x7f0000000240)=ANY=[]) 19:24:37 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90904000000000000ae3c3934392c00aa"]) 19:24:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:37 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @broadcast=0xffffffff}], 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) fcntl$setownex(r1, 0xf, &(0x7f0000000280)={0x0, r2}) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000002c0)="caf7e50821815b2377e818740946ec8b", 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:37 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x26a) read$FUSE(r0, &(0x7f0000002000), 0x1000) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xffffffffffffffff, 0x3}, &(0x7f0000000640)=0x90) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000680)={0xa1000000, 0x5, 0x4, 0x6, 0x8b, 0xffffffff, 0x3, 0x2, r2}, &(0x7f00000006c0)=0x20) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r3 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x27, 0x100) bind$unix(r3, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e20}, 0x6e) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xa00000000000000, &(0x7f0000000240)=ANY=[]) 19:24:37 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) fdatasync(r0) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x4}}, 0x50) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x2) write$P9_RLERRORu(r1, &(0x7f0000000240)={0xf, 0x7, 0x2, {{0x2, 'fd'}, 0x4}}, 0xf) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) r2 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000000340)=0xe8) accept$packet(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000003c0)=0x14) accept$packet(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000008c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000900)={{{@in=@rand_addr, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000a40)={@ipv4={[], [], @loopback}, 0x0}, &(0x7f0000000a80)=0x14) getpeername$packet(r1, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000bc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000c00)={'vcan0\x00', 0x0}) accept4$packet(r1, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000c80)=0x14, 0x800) getsockname$packet(r1, &(0x7f00000012c0)={0x0, 0x0, 0x0}, &(0x7f0000001300)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001340)={'nr0\x00', 0x0}) accept$packet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000013c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001740)={0x0, @multicast1}, &(0x7f0000001780)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000001b80)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000001b40)={&(0x7f00000017c0)={0x368, r2, 0x202, 0x70bd2a, 0x25dfdbfb, {0x1}, [{{0x8, 0x1, r3}, {0x7c, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}}]}}, {{0x8, 0x1, r5}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9783}}}]}}, {{0x8, 0x1, r6}, {0x7c, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0xc554}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r8}, {0xc0, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r9}}, {0x8, 0x7}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x14, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r10}, {0xb4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r11}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r12}}, {0x8, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x10001}}}]}}, {{0x8, 0x1, r13}, {0x7c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r14}}, {0x8, 0x7}}}]}}]}, 0x368}, 0x1, 0x0, 0x0, 0x40}, 0x8000) 19:24:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x46000, 0x0) dup3(r1, r0, 0x80000) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000500)=0x7, 0x4) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="8ab06281462d9e6664bd", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746def64653d3030303030303030f030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c67050000005f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="910c95", @ANYRESHEX, @ANYBLOB="2c726f6f1b0aaff7c75dd4573030303030303030303030303030303030303030302c757365725f69643d1eadc0d97b442499b4e7088b2cf4bd699a21ff3f6242b77c2e68359fb1a3816bec1720b7492056e31f26f2946d9813a4d6cef156038f2747dfb7f0e9a8e730b66548696fe05c465419c678", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="90000000000000050000000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f7570150000000039215a8742bdf68e3d8ba11f7ffecbdae83fd37dafd3ae38ef010f579b54"], 0x90) [ 885.912659] jfs: Unrecognized mount option "uid=" or missing value [ 885.936128] jfs: Unrecognized mount option "uid=" or missing value 19:24:38 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90905000000000000ae3c3934392c00aa"]) 19:24:38 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xd9260000, &(0x7f0000000240)=ANY=[]) 19:24:38 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\b\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.stat\x00', 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000640)={0x401, {{0xa, 0x4e21, 0x8001, @mcast2={0xff, 0x2, [], 0x1}, 0x4}}, 0x1, 0x4, [{{0xa, 0x4e24, 0x10000000000, @remote={0xfe, 0x80, [], 0xbb}, 0x1}}, {{0xa, 0x4e24, 0xd83, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}, {{0xa, 0x4e24, 0x4, @loopback={0x0, 0x1}, 0xdf0}}, {{0xa, 0x4e21, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x5}}]}, 0x290) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) r2 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000002c0)=""/63) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x6b3425d5, 0x10400) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f0000000240)=""/61) [ 886.045103] jfs: Unrecognized mount option "uid=" or missing value [ 886.079960] jfs: Unrecognized mount option "uid=" or missing value 19:24:38 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x0, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xab04000000000000, &(0x7f0000000240)=ANY=[]) 19:24:38 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be9098cffffff000000ae3c3934392c00aa"]) 19:24:38 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30300000008030303030303030303030303034303030302c757365725f69643d2625818d880d1ea5f12833547f4b4605396e60ab6e7a643d8b5f87", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000000640), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030303030ff30303030303030303030303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000001740)={0xf0, 0xffffffffffffffda, 0x7, [{0x6, 0xb, 0xa, 0x2da02b26, '/dev/fuse\x00'}, {0x5, 0x8c4f, 0x5, 0x10001, 'fuse\x00'}, {0x1, 0x3, 0x13, 0x80000001, "6d696d655f74797065272c5c29656d302a2cbd"}, {0x3, 0x3, 0xa, 0x1f, '/dev/fuse\x00'}, {0x4, 0x9, 0x5, 0x8, 'fuse\x00'}, {0x6, 0x4, 0x5, 0x60, 'fuse\x00'}]}, 0xf0) write$FUSE_DIRENT(r0, &(0x7f00000016c0)=ANY=[@ANYRES64=r0, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRESOCT, @ANYRES32, @ANYBLOB="e6399840dfb182e0f66c8f5a30ce695f9eee840d089b88893a2c94fcb83e0a8244adaea2dc5a7a7f874bfa5112f97b91b7629cfc397bcb0bc2904172c628557ecaa4a1a4688307d2ff6e404d069215598f03bd0408b87f5288b649e17c02e2a4832e64a3d082242884e40b001902f361dda3a2744fdcefcdbb3f924d0f62f8b33815267415c7276e8d68ed2ab5884852d93918ed15a802a424d9e7b19039db7629ec32aa9a05cb4f09df232183e590009a4f806678b494da302bc758c2b1c1f4057cd895d5c579e5ff529dfb383122", @ANYRES32=r0, @ANYRES16=r2, @ANYRES16], @ANYPTR=&(0x7f0000001640)=ANY=[@ANYRES32, @ANYRES64=r2, @ANYRESHEX=0x0, @ANYRESDEC=0x0, @ANYRESDEC=r1, @ANYRESDEC=r2, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRES16, @ANYPTR, @ANYRES32=r0, @ANYRESOCT=r0, @ANYRES16=0x0], @ANYRES16=r0], @ANYRES16=r0, @ANYRESDEC=r2, @ANYRESHEX=r1, @ANYRES16=0x0], 0x42) [ 886.200928] jfs: Unrecognized mount option "uid=" or missing value [ 886.226855] jfs: Unrecognized mount option "uid=" or missing value 19:24:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xffffff7f00000000, &(0x7f0000000240)=ANY=[]) 19:24:39 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x0, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:39 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be909f6ffffff000000ae3c3934392c00aa"]) 19:24:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d042aee5224b0458c41c8e01ac76f68a1b0ef122c2747fc256f598e07c774a3645a8b91e5dbd6970611e2c47bc8ff03cf7b4c8372", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d3030303030e6479b9fe95e538d303030303030303430302c757365725d69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:39 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2000, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000340)={0x4, 0x9f, &(0x7f0000000240)="c5fbdb29ded4d457289949d046b073ee764061156159adc733615c2373b3f04da91610bd928e144ec6d646218130edbb015a9a6426f7ea5f26fe052839f13558f5d18fb50c5181e69841928203d9ef3c734e23eac13708e8356de629e695a0e631d9a06abb06b4684057a1cc2fdb16ead1f22277d9e5520cc79040b3ebcc44b8bab00c3aeeea78eb13b69e3707e02b6515e8057e024454bd08cee5db3243ac"}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) utimensat(r1, &(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={{r2, r3/1000+30000}}, 0x100) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000010002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f7570150000000054960df7305a0a436fd8e06f8234695209d908b828b5afb514d3229ec8e47f49e5013b"], 0x90) read$FUSE(r0, &(0x7f0000000640), 0x1000) 19:24:39 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)="2f70726f632f7379732f6e65742f697076342f76732f73796e635f8a80ab01091ed8fe6400", 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x40, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x10000}, &(0x7f00000000c0)=0x8) write$vnet(r1, &(0x7f00000003c0)={0x1, {&(0x7f0000000280)=""/80, 0x50, &(0x7f0000000300)=""/177, 0x9ee7a498b006fb0a}}, 0x68) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r2}, 0xc) 19:24:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="66643d31d9b3cfd21bf8ee7db85030f92acfacbf96bb9165b1fcae25cab1bae34aa71ca932a7d0cc6e2ee6f30b640c062c73e35079a0809ec3a0ee8c1e5298b92fd4a41a6e49710b998dcc0ccb06d3eedd1ceabd45e81fad44d6ebda946f4539bcfb3b22446a713102990777b07e6a77d9e0f8775a72176b234b25351f317c2904d504b4ea21026ab512c4617536f0bacf354daa2c8d250aa80e6e3f29373e8ab6593e9e8858fa175e9c119e083db57b9fd820ba2f34056c88ed9d9332e6fd8797e14074e4a7ba376b65357945c3968a843ef14e8005c76d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r0, &(0x7f0000000180)={0x20, 0x0, 0x8, {0x4b, 0x0, 0x9, 0x7}}, 0x20) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) r1 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x4a0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000002c0)={0x100, 0x7fffffff, 0x400}) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000280)=0x5, 0x4) 19:24:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:39 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x0, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 887.380563] jfs: Unrecognized mount option "uid=" or missing value [ 887.410253] jfs: Unrecognized mount option "uid=" or missing value 19:24:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1d00, &(0x7f0000000240)=ANY=[]) 19:24:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:39 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90910000000000000ae3c3934392c00aa"]) 19:24:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:39 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xb00, &(0x7f0000000240)=ANY=[]) [ 887.502212] jfs: Unrecognized mount option "uid=" or missing value [ 887.539327] jfs: Unrecognized mount option "uid=" or missing value 19:24:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:39 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be9090000004c000000ae3c3934392c00aa"]) 19:24:39 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 887.647275] jfs: Unrecognized mount option "uid=" or missing value [ 887.686502] jfs: Unrecognized mount option "uid=" or missing value 19:24:40 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000240)={0x1, 0x0, [0x0]}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000340)) read$FUSE(r1, &(0x7f00000070c0), 0x8c0) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643daafcc20c1eaf59ad9869f40e6258cfa8a7d05753002be30a961a98e4fd4cb75d6bb0fa5af5851be37fc755547dfa34dc41026020b845b58f1dd8b53501b58085855eb1d09b4aa84d0d92b4d916b92b0c4a290e7672164e62ccb84896a512f7adfed399a5", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f00000070c0), 0xffffffffffffff54) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="48d1abacb4e64c3ed7643d", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f64a71ccbe044c244179d6c6576656d3100000000000000000000000000000000000000000001000000000000002c0000000000000000000000000009ef00000000000000001c000000000000002b73797374656dcc6370757365746367726f75702463"], 0x90) socketpair(0x1b, 0x80000, 0x800, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x1c) write$9p(r2, &(0x7f0000000480)="313c3b6117e46d6fa854bdba60d7566512427b15ce709c65b52c71e6c150961dadd6b1117b9537b806b487f79faf652c5194837735ada9cb59f8c54c099f5936202b35c8193afafa328b36e1e7a4ae26701ea88c2efe8b8bd0b69b8b27", 0x5d) 19:24:40 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000030000000ae3c3934392c00aa"]) 19:24:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xfffffff5, &(0x7f0000000240)=ANY=[]) 19:24:40 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:40 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000340)=0x78) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x6, 0x800) 19:24:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x8100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x58, r2, 0x208, 0x70bd28, 0x25dfdbff, {0xe}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x18, 0x30}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040}, 0x0) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:40 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x40000000000004) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:40 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 888.925547] jfs: Unrecognized mount option "uid=" or missing value 19:24:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1200000000000000, &(0x7f0000000240)=ANY=[]) 19:24:41 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 888.973229] jfs: Unrecognized mount option "uid=" or missing value 19:24:41 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be9090000001f000000ae3c3934392c00aa"]) 19:24:41 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xa000000, &(0x7f0000000240)=ANY=[]) 19:24:41 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 889.074541] jfs: Unrecognized mount option "uid=" or missing value [ 889.110426] jfs: Unrecognized mount option "uid=" or missing value 19:24:41 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) socket$inet_udp(0x2, 0x2, 0x0) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="ae93c250d10e140208484eb0fa514ab4f23758be5fffadf0f3f0bdc340bf9b7ba2da1f43fffcaf7e23c791bd908fde3e825eea6d69424b0248af7eccbf24d77d2b70bec0f5ca2086fe5813489e46d39ccd8fb8d5e565026d792d7ae2bea3a1231038ba", 0x63, 0x0) keyctl$read(0xb, r1, &(0x7f0000000000)=""/46, 0x2e) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:41 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:41 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000007000000ae3c3934392c00aa"]) 19:24:41 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x10000000, &(0x7f0000000240)=ANY=[]) 19:24:41 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1af897}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 889.677110] jfs: Unrecognized mount option "uid=" or missing value [ 889.704851] jfs: Unrecognized mount option "uid=" or missing value 19:24:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="9e00", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:42 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900004000000000ae3c3934392c00aa"]) [ 889.977653] jfs: Unrecognized mount option "uid=" or missing value [ 890.015068] jfs: Unrecognized mount option "uid=" or missing value 19:24:42 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9f}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x7926000000000000, &(0x7f0000000240)=ANY=[]) 19:24:42 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f76") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6bf29657705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000180)=ANY=[@ANYRESHEX=r1], 0x12) 19:24:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000100000000000b000000430066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c000000000000000000ecffffffffffffff0000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f35701500000000"], 0x90) 19:24:42 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be9094c000000000000ae3c3934392c00aa"]) 19:24:42 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000040)=ANY=[@ANYBLOB='nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYBLOB="1500000000000000"], 0x78) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2, 0x0) mq_timedreceive(r2, &(0x7f00000000c0)=""/59, 0x3b, 0xa391, &(0x7f0000000100)={0x77359400}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) shmget$private(0x0, 0x3000, 0x46, &(0x7f00001a3000/0x3000)=nil) mbind(&(0x7f00002fa000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:42 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe4}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 890.507436] jfs: Unrecognized mount option "uid=" or missing value [ 890.543568] jfs: Unrecognized mount option "uid=" or missing value 19:24:42 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000000640), 0x43c) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0xffffffffffffffff, 0x1, {0x7, 0x1b}}, 0xffffffffffffff84) 19:24:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x0, 0x10000) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000240)={0x1000, 0x100000, 0x6, 0x10001, 0x3ff}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000280)=0xffffffff) 19:24:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xfffffff6, &(0x7f0000000240)=ANY=[]) 19:24:42 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f76") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:42 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90907000000000000ae3c3934392c00aa"]) 19:24:42 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:42 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f76") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x4ab, &(0x7f0000000240)=ANY=[]) 19:24:42 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 890.649265] jfs: Unrecognized mount option "uid=" or missing value [ 890.682948] jfs: Unrecognized mount option "uid=" or missing value 19:24:42 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be9090000000a000000ae3c3934392c00aa"]) 19:24:42 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f7620") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x3, &(0x7f0000000240)=ANY=[]) [ 890.759817] jfs: Unrecognized mount option "uid=" or missing value [ 890.786529] jfs: Unrecognized mount option "uid=" or missing value 19:24:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:43 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000080)={0x2, 0x0, [{0x80000007, 0x6, 0x5, 0x8, 0x3, 0x5, 0x1}, {0x80000019, 0x1, 0x2, 0x8, 0x2, 0x40, 0x1}]}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) restart_syscall() 19:24:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:43 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be9097fffffff000000ae3c3934392c00aa"]) 19:24:43 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f7620") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x900000000000000, &(0x7f0000000240)=ANY=[]) 19:24:43 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x7, 0x12000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000002c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000640), r1}}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r2, &(0x7f00000070c0), 0x8c0) read$FUSE(r2, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:43 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000240), &(0x7f0000000280)=0x4) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:43 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000001000000ae3c3934392c00aa"]) 19:24:44 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f7620") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1c000000, &(0x7f0000000240)=ANY=[]) [ 891.904310] jfs: Unrecognized mount option "uid=" or missing value [ 891.928572] jfs: Unrecognized mount option "uid=" or missing value 19:24:44 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3200}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 891.991194] jfs: Unrecognized mount option "uid=" or missing value [ 892.024366] jfs: Unrecognized mount option "uid=" or missing value 19:24:44 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x0, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:44 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = gettid() ptrace$setregset(0x4205, r0, 0x4, &(0x7f0000000180)={&(0x7f0000003000)="706ccb96e6cd060224a293f8a098ae45dec202cfad5edfbf2c098b9d3eac8dc1ceac295a5c9866f4235a414ae57f03ae18204e568dd66d02f06dac7915ec471e7476c157ff816423a90a5e6262d6a58a30623205de6aa0d91fa92ecc464b08fcf2d5ae707618132ff968e81f3aa4430cb9c7efe5a47d10eaf3398d3f149e1e5084cbad49448aee8242643c6ca76d8d0558817b716718a344a63fd77c4e61729923f8776afaf3428e94a8d8cbd22e77ac9c254c7a87eb1bca4461590fabfe5c90e8fb828287f5e9688885374208d31a1a133b284c781eaad2bcc09e8f5ee1dc0f3638e2af5fc9a5965601dcacc2dcad6d4321af45e67ffc103af6ec9489d70784b45175996c659b7f0d2a4d5eedc88f8bcb0dd945c3bf16879183aa9c9ba40e8536d83f2e652cd989bbee16aa4c9859262bc3ba8cb32c410dc57aad4275c98999c8b1054ca24434d8b2eac7a1ff30d0c6e5caca3f52345da525092b16a81765c362e69733ba5ff02537d17ac917ee99158ea6aec429a1245e5807df5a3688070fc4015d95f89b2a0ebe8cdef751c9c08b38d31206f7b97ee50e83284a2cb1540a36227f5073eb30aae19713c2c52b17aca02b027e25791030b0dd4e7fd71aea77e74606e6e2bd8e8ba56a8a83587fa236a72ed7dc74586d1c26f81546e683e59c573d6b76978267b86efdace81d8a952d32e378761998f83c2ba5bd3bb3d1141d8d4cc2d91019a6b19499916e5ce207fc52aee1cbd46fc1cf21ccbbebcc5f1071bc5239ed513c46b5faea1a733eb0df14dcae56212f4c5c6a46bf24c3582e50aa1fd51e13e03c7e637282b88380564caca0516d6e38b7b3b60946f84b6e46e44132b061b10c59368247b902ccaf575d438565b544929a1e1c07c36eb876a5b068c1b8010a5d909647b89a51c5d939371f2f1358eb6b659e1a7c6a06f3e499e73502fa2a11885bdd27f06de58b20d23c856c68275eba13c44f541064590ecd2709824f9b789638a8099998fc88241a27a33fd72caa63f3a781c432a99e2177cf260155781c6763dbb0806364bcb473883e1dd2afd38f3ac70ef8457afb4a8f24b826aa4d73695b268ce504718f6a2b7eb043d9c649c52be4eb12eea93d6db973eff7d43168c0bed84a55580ec4bfe77a23ade59fb20bfc0f0275997a78541bbf164dbf5eb6ead4e2b26b236be69f069b93cbcf1a0492dd4db9595f16425b88da00fe15ebd9d4d436c0e157a5e513fdd2af4e0bf6247122e0c706f2559e70bedc931cc4931b716c23da0a456dbb51cfcbdb2b7c44b4369f9d5cc266dcc78e63d300d1345ffa2fa03e5105430b0524b55fcd00cc397d45e60103311b848ea386959f6b039be2bdaa39fc20cfd97b48a7e3b6b03014c51abb96011079f333112c29eba59c6c24468e02660ea32afa67e20208f9135b70d5e548ea33a9ad916e087ebe609c2322bebfe5a9a50b073f26613cc4e4282872ed798cd769338349aa54a265f749c0a90654b78a559c7101bc10ef1a1eceb0a5c12edaff426b9ff547a483d161185b363573b57d0022829703ea48f2f9c536774ee2110e58285e1eb8b32329df8da92a1e398ee152ebce722562842dafdfe1c04996a4588d9d427145246f8e0288f94761b7d7dbb22065944e50d3b94272e6c268cdd66a992f09c6e9a17aebb0498f25f1b50210de7bea5d1ddb1073523ea398b1e3574897fd8e794c08f6927e627e45d67c6849bc34e734e500ca1a0421482d7cdcc668bf8f884f21f810a56eb13b7155b0034f9b623ecd6d484c59fefd88d88ae4a87ed014960f934f1805032425e4ccb20d39571934ce63aa8eea2788fadd35830f3ab90a65160c4e6abe137fa0bfab9583266f66bca864d1f7e23c23f4239daed67bbcfe3b93788c36f16f96ea17089cdf5b62a7275369d0e3a1a310ebeb71fc81adc27a1dcc2627a26f9d47399fd3756ff713c9b7c94a36646702a6d76f560224a1d0fb283b2c98527b01e147a27e22e0fab09c610159bf481c73a23b054370b94d752c99baaf0e662079a029d0974b80418d0515a8cc853545bbca4d21023e6e5c6ff4be45e5f8db0e893e18776ce8a4389f3de3a2771eb8459e7487ef68b6436f3b12d357f2c293e6df973cba9aa0b6d1ae2c4ad91fedd43b21b2667211f30dc5b6782acd3040491d8e5ef8b878c836aec2dc1abbc4f31c19d23ca16bcaceb53f54dca8d755f949f9eec26ab8886e802f099386adbef0041aef2845bb7a4296939f629acdd48ebc9d7fa8483ab19f14e51f46fbec5b7b943005cb07bffd518712051038965be78f443ec732aaaa56a527b9cab9442d63ec8697c6b92619604cd92a9613611dec9b5cb1c24fddc40e8d793d41fce44b1bb27049b28708d0582123654f91a9a6dd90a935cfd87078f8eeba6ff7c39ca4f80160e5af1877b3a85ad86aec23cd5cf0ae14d365f56c5b9020c1473d67e4a869258bed6afe610d104131d6e2ae28c7e7adbbce98bce8a73f92f68fa1a621a8c57bd659c559a487700a5000b8f3337b99d88485b1d757271303eb41a0d647a840b49b5b31f6aa9bcf10cdab515566c4ba869a7b508278e7331772743c108dd720134e1b37f0e7944fd73fbe91e3a7a6ce9572cc2a999b6c7d9132f6de2f071620e7bb9b0781d21f5a1ee4f9b6f68df18e8097552aafd3710b8ade2c39df9c41e9d1b6cc39a4672eb9915e311ee0c69298210006388564bb9d86bb3fe63f773314cfd780a5e6ec8c9a8a497879d57570820d220733ca8fa5b0b484ca8da3fa79897e34b921ba496df9a6b1348dc3eac447679ea71e4febed239f6da221b56d03c157b1bbaad44c6e7f32f0bc6f79937cfae5276c340c7c84ee0af1cd38e308e70f03215d099dff59608d0723285c56300ee6f5768396f1f008b298551661bfb9b0df944fd3d3da96966f72e000e6bb40844e3dd973a962923f08b00a8ff3cd857c00250e0340ea2f2aa25306000000506b06f3e558f18a874b21866c086a02947a0ab724329caa8f794348aa20ab60475f3e761a93bffa9b5508e0c01371ba800da78c6d9e9857199c6b88097752d4f7957aa1274adfbad41134958be3c07837f12dd6aee99af1b8cc9eb696b210284cf3ffa65230261ed9b41405f0b24e80c8e0988ca07fa930711b4af005b312ed0ef2c8e12cc2b9940323fee108cdbcfbebcc65a012205f7beed1f14db0cefe656045694b39fcca04b583d35a9f1e09740b88985afbf96f32b954c5af2f6b2ed9f33dddd5a51170415ee18ae578b839f1357a16f8481bfcfee7c5004e316fcca48efa49994ae01c8579e4bdb068c5b3f9443f2e6bb758b7b048e48f2566103ca8d7d5b773d371df92b9b8bab43238cebdcaebe72ac12132f42c683cc9cc4160b83ffd79fb929b223e5f3ce69b6dff8f68fc89c4be926484e9806853a0fbfa99a7103d5bcaab23b431167a357507a822a2566f7dadb999be1ccb62e954a9d9fff8691e867cadeda82cd460736d4c087e3bc2e85f7d388527044de1ca35edab4d55019bfff3aa85795f27fe0dd9709d093d9ce264d36c0beff3739f65e8b3be9af6a053fa1f3171527e5cb563896fb0d537eac50006d2f53cb1432cb7e729769eae5bf81433e44571e8072ec547bc517261a383e38d8929dcfde4595b1464ac715aab7fe70f9ff95089c2d18948b6d016ebf37ae76d39b7833e3be7e77f0819805dce90aeae9da7152729dc608a0a8d7c70b55359a57ec53f1776c29fcab85495d85aca4548b7c8445b5082994bafc1b8e34e30ed81ad2af0389f1ff5967b014e633bd6205b2e044585cf3ca9d8ef39d40d5173d09bd35c2e4325e4ffb2752cb625e3409ea8500c1e05b0ceb2545b9cbf57e9f4a5d19d345ab197d7f5ee77032db1d76d77d8c0802f47afae282a7363c6e115fb3655fb8b468dd0e27f1b80c27100d317848b1e4bc6c304a835f0cc7437d1e7cd2aa808cc630b4bfb6cf93c7fd9212aea6b5337f81316655832a79a78f6668ef484b5b38d76e304521ecbfbcf3e81546b65105043bedf21e33a63e121a85d261120fa30ff753f5bb31f3a16b53577305dc6216904bb38c20e41879d118e8be666ebaaa70ddace7bee8b90f5396770ae9329ffb7ee079df900a71882f145cb5271c38e63b4c72b2051d1cbba7b6546de98ca3762c9b0691c5dcf5e5b2efb92a36942d7b3e5b58d695f620fe82be2abe308e7a40cb2eee8fbe09932ea44e98111ca6a60c983014a6eed977e96bc55fe5463ef376cc072baed7d7362ed076c2a3b9c2b093d4569b0b0034e24250d0bd71e70c6e278b0bc5c07055786c3a365c87050c53d24dd679226edfddfcacb6ca1ef6d4ad896b1f9376bbe68b802bbbb9b0a8967a3d85efd61f7308d1f53e8cdf8028ee72f3a2cec9de1122b8f68040cdb64b83fd11c4037327f86ccee227c1748b12130526b837dd1f4be3d8eebebec203c31639816a6b5fe6579f66bfd3bc0e983fb9acff019f6e1fd413648e1689a0bf49121b32993ebecf754140cc5f44cf04b3a806287b43e89fdaa9a889cd16659c1c60603eee507ec5004dcd878dc8cc9235117df7fc80cde69cae96d9d659c97ff3dad656a4bc964aa9baa51867f1c444c571222280ede52cd073946404ea0a42e42e49c625df812d9e313ee643b6aa7015bf75a0e82ca39ec59dc3e5ef91b5c4bee0b993ea6f3e24107b8cdb37ac948080ff8154a43e21860d842597c89225595953fe80cf162900e60acdfbc306c92088162282408a6ac0f205a018319c9e2f438e3e3ba80babd80612dac52da05dff3e8435d1ce2033bdab57698625a4dfe16dbca391ece8ec8cd60b8790ec40d160aa8849a912abc1a56982091e3f4a24fdd08b04d5d66fcfa331c0d321820e9ef7759a171f6e7730dd032b8f62d6d5173026b35b161fdf3993d1ce4b03dd24896b687e86f07a91ec9fa928b7ae9066772300ffbbfec599788cdf55adea605d64a2a293c655371e9c26452b42c43cb4b6fb50fe576d6f039ffa39ed3f3c2a6957f3df879466512c6156fa9416f1c5fce0d114333aa40c30f33984f69c46940a5fe643293184b2c8fefc2da39a2129dfcdb13736fc1994b8e5106f757d815d28777b884ccaca87fab500e82c399e7285aa72e348b9f6d8db856b05e447f0e8ef0e853ba1a5c9377ddc1c3d7e7f14fb7a2752fb826683a84742929d8944063cffb3d6c61b360ea1806f9873518ba34c96017a0724c5df88e8cb44be4b77479b1eda4ddc538ea7a4a04de0c5fab763624fc4da7b62abeb12d1af3939c20db7244b6039432bda135dfcfe7577aabd09c29f285c71a1ffe16bda88343f1fe89b6aaf0eb6ecadeecd9e23b94ca043d3c474110cadc4bdc65f93f5ee016795e79218fbc96aa36726d2a147a36aa3e266fc528ff564543fc682c6dfe17194c82b94ba928f25f2922b2734ca279fd81bc062a06d7a53b1298fd631490398b6d2bc0222ee24833269598cf779d5b593f3e9727b576b6ba9d212e09a1918533227027d552cf5b03268f992238c6a5b08c9da27929ea3cd65e53580387591ec97ba59b6b1900ab8527ce70ac1d9dd5026c3111ca862590d2ac4ac0524da9155a3315d4eaa05c6999029a70669f3a9bd4a5e53a8d4294e1ddc0a8f26b340784403a0bfe503c04ef36eb1447a1b569f4a90a348335c043cdde5e6cdc70c3a89c4710f3b994aa40fd2d4cb5b029d2d7ff1c6382e27d59f9cef41e183b53d6dd6eb1d736555d303087237ebdd34d6c4c2f12cf708be77302bf01dfe8d36a1dadb7538fef64410dbfb6dd2db304114a37f9aaa5c66bc0b31b", 0x100b}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f00000070c0), 0x8c0) read$FUSE(r1, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=000000000000000000000ser_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:44 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900600000000000ae3c3934392c00aa"]) [ 892.813675] jfs: Unrecognized mount option "uid=" or missing value [ 892.855547] jfs: Unrecognized mount option "uid=" or missing value 19:24:45 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x0, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1810}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x7300, &(0x7f0000000240)=ANY=[]) 19:24:45 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900060000000000ae3c3934392c00aa"]) 19:24:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000040000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:45 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) finit_module(r0, &(0x7f0000000180)='lo!\x00', 0x3) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:45 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/28, 0xe) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x80000, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000005c0)={0x3, 0x200, 0x5, 0x400, 0x0}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000640)={r3, @in6={{0xa, 0x4e24, 0x28000000000, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc2db}}, 0x2}, &(0x7f0000000700)=0x90) setsockopt$llc_int(r2, 0x10c, 0xf, &(0x7f0000000040), 0x4) get_mempolicy(&(0x7f0000000100), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x3) write$binfmt_aout(r2, &(0x7f00000002c0)={{0x10b, 0x4, 0x9, 0x76, 0x241, 0xa75, 0x110, 0x3}, "357dff42bfba2c36fde9750529aaadc06a114d3871dc619cd6d2da0a858d8bbd41876efd3b76480c802c18220c5281b60fb6962c496740c7ce0c908ab36fc42628759071fdbf74b83af227fff2442483758330e9ac0c8a4ce0a5e4d6ff20726d618062975f52a4f03a4cf1348c2c0deab9ad097784c57f0c217b686c49dd2c06cdc42a9145961e94d4b6bd6510296de4a3ee468531fbd39c3900ff698fb32e100b17cb2942878774f6508f6ca3f613435e4dca3bcc08e84aec946df0f41438d3d737f19678d8a9d85695d622", [[], []]}, 0x2ec) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r4, 0x8919, &(0x7f00000000c0)={'veth1_to_team\x00', {0x2, 0x4e23, @rand_addr=0x2}}) setsockopt$RDS_RECVERR(r4, 0x114, 0x5, &(0x7f0000000080), 0xffffffffffffff8d) 19:24:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7100}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x74, &(0x7f0000000240)=ANY=[]) [ 893.367971] jfs: Unrecognized mount option "uid=" or missing value [ 893.404571] jfs: Unrecognized mount option "uid=" or missing value 19:24:45 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be909004c0000000000ae3c3934392c00aa"]) 19:24:45 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x0, [0x0, 0x0, 0x7d9, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x225d, &(0x7f0000000240)=ANY=[]) [ 893.498691] jfs: Unrecognized mount option "uid=" or missing value [ 893.534455] jfs: Unrecognized mount option "uid=" or missing value 19:24:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3de41c00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x6707, 0x40) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000240)={{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, {0x7, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x4, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}, 'gretap0\x00'}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:46 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181, [0x0, 0x0, 0x0, 0x8]}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:46 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900050000000000ae3c3934392c00aa"]) 19:24:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xe000000, &(0x7f0000000240)=ANY=[]) 19:24:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:46 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20012910}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x1f0}, 0x1, 0x0, 0x0, 0x40000}, 0x2000c004) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) [ 894.009894] jfs: Unrecognized mount option "uid=" or missing value [ 894.041083] jfs: Unrecognized mount option "uid=" or missing value 19:24:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="0070f8ffffffc9643d00", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000821022fd00000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x68000000, &(0x7f0000000240)=ANY=[]) 19:24:46 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:46 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90930000000000000ae3c3934392c00aa"]) 19:24:46 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x20000, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000240)) 19:24:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xf203000000000000, &(0x7f0000000240)=ANY=[]) 19:24:46 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 894.495865] jfs: Unrecognized mount option "uid=" or missing value 19:24:46 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000003000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 894.554612] jfs: Unrecognized mount option "uid=" or missing value 19:24:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18100000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:47 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000048000000ae3c3934392c00aa"]) 19:24:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1400, &(0x7f0000000240)=ANY=[]) 19:24:47 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x0, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="31fdaf2f92bf57f476bd2fd260ca2783f4c1e17079aaad3eb58622e3d4d7fc936afdd6932c09928557b4eace5d4d6c7a597ed83d4e3c6f016760e0cb33aae2cf9e7697f1bf801db339050532fe5f8b8d3493"]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 895.170794] jfs: Unrecognized mount option "uid=" or missing value [ 895.219882] jfs: Unrecognized mount option "uid=" or missing value 19:24:47 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be909c0ed0000000000ae3c3934392c00aa"]) 19:24:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:47 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x0, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x7a00, &(0x7f0000000240)=ANY=[]) 19:24:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x200, 0x801) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000240)={0x0, 0x8001}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000002c0)={r2, 0xffffffff00000000}, 0xc) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:47 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = dup3(r0, r0, 0x80000) r2 = getpgrp(0xffffffffffffffff) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000100)={[], 0x80000001, 0x4, 0x80, 0x9, 0x72, r2}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x100, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x10, r0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 895.510447] jfs: Unrecognized mount option "uid=" or missing value [ 895.556508] jfs: Unrecognized mount option "uid=" or missing value 19:24:47 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d006e6f646576656d31000000000000000000000000a1000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b737973746580006370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:47 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x0, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x600, &(0x7f0000000240)=ANY=[]) 19:24:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x80000) r2 = semget$private(0x0, 0x5, 0x20) semctl$IPC_INFO(r2, 0x1, 0x3, &(0x7f0000000340)=""/83) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000240)={@rand_addr, @broadcast}, &(0x7f0000000280)=0xc) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7900000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:47 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be909ffffff8c000000ae3c3934392c00aa"]) 19:24:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x2225, &(0x7f0000000240)=ANY=[]) 19:24:47 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:47 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040), 0x0) 19:24:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1810000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x16000000, &(0x7f0000000240)=ANY=[]) 19:24:47 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000068000000ae3c3934392c00aa"]) [ 895.766902] jfs: Unrecognized mount option "uid=" or missing value [ 895.795616] jfs: Unrecognized mount option "uid=" or missing value 19:24:47 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040), 0x0) [ 895.886825] jfs: Unrecognized mount option "uid=" or missing value [ 895.917444] jfs: Unrecognized mount option "uid=" or missing value 19:24:48 executing program 1: r0 = open$dir(&(0x7f0000000180)='./file0/file1\x00', 0x240000, 0xd) mkdirat(r0, &(0x7f0000000240)='./file0/file0\x00', 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000004000), 0x1000) read$FUSE(r1, &(0x7f0000003000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3200000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:48 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000013b9f8179290888b3070000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc8570757365746367726f7570246367726f75701500000000"], 0x90) 19:24:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x3f000000, &(0x7f0000000240)=ANY=[]) 19:24:48 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040), 0x0) 19:24:48 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be909003f0000000000ae3c3934392c00aa"]) [ 896.821038] jfs: Unrecognized mount option "uid=" or missing value [ 896.835712] jfs: Unrecognized mount option "uid=" or missing value 19:24:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8000, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000340)=&(0x7f00000002c0)) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000240)={0x7b, 0x0, [0x2, 0x10000, 0x2, 0x100]}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:48 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc8316d345f8f762070") r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r3, 0x0) accept$inet6(r3, &(0x7f0000000b00), &(0x7f0000000b40)=0x1c) r4 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r4, 0x1000000000016) connect(r2, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x40000000000004) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:48 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be909000000edc00000ae3c3934392c00aa"]) 19:24:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xf203, &(0x7f0000000240)=ANY=[]) 19:24:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:49 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000009750000ae3c3934392c00aa"]) 19:24:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x12000000, &(0x7f0000000240)=ANY=[]) [ 896.959469] jfs: Unrecognized mount option "uid=" or missing value [ 896.990518] jfs: Unrecognized mount option "uid=" or missing value 19:24:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1300, &(0x7f0000000240)=ANY=[]) [ 897.063235] jfs: Unrecognized mount option "uid=" or missing value [ 897.096114] jfs: Unrecognized mount option "uid=" or missing value 19:24:50 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f757015000000001f44055fed162b15235e910c059137e903614550d71af3a8ec6d8ed473ab7d1dd42bcfc03f3892388aaa3e1658fcb6d4af6a6a469ec77b04a1052578fb4239d609581a7f37ee8cbb652074ce163df512a01b2932010bc5e93d677b4077fe1622"], 0x90) 19:24:50 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:50 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000020000ae3c3934392c00aa"]) 19:24:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1c00, &(0x7f0000000240)=ANY=[]) [ 897.989126] jfs: Unrecognized mount option "uid=" or missing value 19:24:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) socketpair(0xd, 0x4, 0x6, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$RTC_PIE_OFF(r1, 0x7006) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 898.031079] jfs: Unrecognized mount option "uid=" or missing value 19:24:50 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000010000ae3c3934392c00aa"]) 19:24:50 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97f81a00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x4000000000000000, &(0x7f0000000240)=ANY=[]) 19:24:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000340)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c, {[{@default_permissions='default_permissions', 0x2c}, {@allow_other='allow_other', 0x2c}, {@max_read={'max_read', 0x3d, 0x1}, 0x2c}, {@allow_other='allow_other', 0x2c}, {@allow_other='allow_other', 0x2c}, {@blksize={'blksize', 0x3d, 0x600}, 0x2c}, {@max_read={'max_read', 0x3d, 0x6}, 0x2c}, {@allow_other='allow_other', 0x2c}, {@blksize={'blksize', 0x3d, 0x1800}, 0x2c}]}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) r1 = socket$inet6(0xa, 0x3, 0x101) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) 19:24:50 executing program 5 (fault-call:5 fault-nth:0): r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:50 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000080)=""/52) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:50 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x200000000000000, &(0x7f0000000240)=ANY=[]) [ 898.608564] jfs: Unrecognized mount option "uid=" or missing value [ 898.641926] jfs: Unrecognized mount option "uid=" or missing value 19:24:50 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900004800000000ae3c3934392c00aa"]) 19:24:50 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:50 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3de41c0000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 898.753309] jfs: Unrecognized mount option "uid=" or missing value [ 898.776958] jfs: Unrecognized mount option "uid=" or missing value 19:24:51 executing program 6: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x220080, 0x0) mkdirat(r0, &(0x7f00000001c0)='./file0/file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r1, &(0x7f0000003000), 0x5d) read$FUSE(r1, &(0x7f0000002000), 0x1000) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000340)=ANY=[@ANYBLOB="06000000010100000000000000000000060000000000000004000000000000000400000000000000a021079a7f000000000000000003d039a1918cd5d52affffff00000000000400000000000000100000180000000000005a010000000000000400000000000000"]) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x20000, &(0x7f0000000240)=ANY=[]) 19:24:51 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be909006c0000000000ae3c3934392c00aa"]) 19:24:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 899.158394] jfs: Unrecognized mount option "uid=" or missing value 19:24:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) r1 = syz_open_dev$sndctrl(&(0x7f0000000240)='/dev/snd/controlC#\x00', 0x2, 0x101000) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f00000002c0)={0xa, 0x7, 0xfff, 0x1, 'syz1\x00', 0xe3e8}) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x4756}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x0, 0x3f, 0x8}}, 0x30) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:51 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x3000000, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xa7040000, &(0x7f0000000240)=ANY=[]) [ 899.200319] jfs: Unrecognized mount option "uid=" or missing value 19:24:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="1f40"]) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:51 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) getgroups(0x2, &(0x7f0000000180)=[0xffffffffffffffff, 0xee01]) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d, r1}, 0x2c}) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000000640), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="9000000000000000020000000000000001000000004500000000000000000000ff9c0bebc39a3f24656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:51 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900030000000000ae3c3934392c00aa"]) 19:24:51 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0xffffff93, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x7, &(0x7f0000000240)=ANY=[]) 19:24:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) fsync(r0) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) fremovexattr(r0, &(0x7f0000000180)=@known='com.apple.FinderInfo\x00') 19:24:52 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000001380)={'mangle\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x181800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x10001}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000002c0)=0x2, 0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000140)={r3, 0x3, "f9850c"}, &(0x7f0000000280)=0xb) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000001480)=0x2, 0x4) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x1000, "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"}, &(0x7f0000001340)=0x1008) getsockopt$inet_udp_int(r1, 0x11, 0x0, &(0x7f0000001400), &(0x7f0000001440)=0x4) openat$ppp(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ppp\x00', 0x1, 0x0) 19:24:52 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 899.996450] jfs: Unrecognized mount option "uid=" or missing value 19:24:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xedc000000000, &(0x7f0000000240)=ANY=[]) 19:24:52 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0xffffff81, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:52 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 900.055559] jfs: Unrecognized mount option "uid=" or missing value 19:24:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="d0a13d26e42ca7b41645999183e8d40c1c57a3b4cfe12f946d9ebbdd66208cc9bbef277b169de2606cdd063d7c8660c1d3bf509d68834bde24ad6baed760a503bc64918817", @ANYRESHEX, @ANYBLOB="30301186a9c610aa4161c550cc26d5303030303030303030303030303000000000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:52 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900300000000000ae3c3934392c00aa"]) 19:24:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xa9040000, &(0x7f0000000240)=ANY=[]) 19:24:52 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7300}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:52 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0xfeffffff00000000, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:52 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000280)={'veth0_to_team\x00', {0x2, 0x4e23, @rand_addr=0x7b}}) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr\x00') setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0xb98, 0x1, 0x100000001, 0x9, 0x5}, 0xc) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x1800, &(0x7f0000000240)=ANY=[]) [ 900.462387] jfs: Unrecognized mount option "uid=" or missing value 19:24:52 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x300000000000000, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:52 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:52 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900fdfdffff0000ae3c3934392c00aa"]) [ 900.523567] jfs: Unrecognized mount option "uid=" or missing value [ 900.621786] jfs: Unrecognized mount option "uid=" or missing value [ 900.646065] jfs: Unrecognized mount option "uid=" or missing value 19:24:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:53 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x80045300, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000180), 0xfffffffffffffffc, &(0x7f00005be000/0x2000)=nil, 0x2) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000280)=""/4096) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 19:24:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x7400, &(0x7f0000000240)=ANY=[]) 19:24:53 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x5000000, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:53 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000300000ae3c3934392c00aa"]) 19:24:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffd}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="900000000e0000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d310000000000000000000000000000000000000000007229e95d000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) ppoll(&(0x7f0000000180), 0x0, &(0x7f0000000240)={0x77359400}, &(0x7f0000000280)={0x3}, 0x8) [ 901.454324] jfs: Unrecognized mount option "uid=" or missing value [ 901.485784] jfs: Unrecognized mount option "uid=" or missing value 19:24:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8}, 0x2c}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d00}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:53 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x93ffffff, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xf0ffffff00000000, &(0x7f0000000240)=ANY=[]) 19:24:53 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900000000070000ae3c3934392c00aa"]) [ 901.653274] jfs: Unrecognized mount option "uid=" or missing value 19:24:53 executing program 6: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f00000070c0), 0x8c0) read$FUSE(r0, &(0x7f0000002000), 0x1000) mount$fuse(0x0, &(0x7f0000000000)='./file0/file1\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d}, 0x2c, {'rootmode', 0x3d}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x2, 0x400000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000240)={0xbe1, 0x9, 0x8}) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 19:24:53 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x81ffffff00000000, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 19:24:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0xa704000000000000, &(0x7f0000000240)=ANY=[]) [ 901.697681] jfs: Unrecognized mount option "uid=" or missing value 19:24:53 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be90900fffffdfd0000ae3c3934392c00aa"]) 19:24:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 901.803515] jfs: Unrecognized mount option "uid=" or missing value [ 901.840447] jfs: Unrecognized mount option "uid=" or missing value 19:24:54 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='errors=remount-ro,errors=remount-ro,quota,uid=', @ANYBLOB="2c696f636861727365743d6d43ff0c6be909000000000a0000ae3c3934392c00aa"]) 19:24:54 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x5) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d00108f762070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x181}, 0x5c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x801, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'gre0\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) write$sndseq(r1, &(0x7f0000000040)=[{0x8000000000000000, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 19:24:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000003, 0x10000000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='errors=continue', 0xfffffffffffffffe) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x4000000000000, &(0x7f0000000240)=ANY=[]) 19:24:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x44}, 0xffffffffffffffc2) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) [ 902.960989] jfs: Unrecognized mount option "uid=" or missing value [ 902.997108] jfs: Unrecognized mount option "uid=" or missing value [ 1147.872303] INFO: task syz-executor1:28982 blocked for more than 140 seconds. [ 1147.879731] Not tainted 4.18.0-rc5-next-20180717+ #9 [ 1147.885515] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1147.893500] syz-executor1 D24168 28982 7750 0x00000004 [ 1147.899160] Call Trace: [ 1147.901779] __schedule+0x87c/0x1ea0 [ 1147.905520] ? user_path_at_empty+0x40/0x50 [ 1147.909864] ? do_mount+0x180/0x1fb0 [ 1147.913600] ? __sched_text_start+0x8/0x8 [ 1147.917774] ? lock_downgrade+0x8f0/0x8f0 [ 1147.921967] ? lock_acquire+0x1e4/0x540 [ 1147.925982] ? fs_reclaim_acquire+0x20/0x20 [ 1147.930335] ? lock_downgrade+0x8f0/0x8f0 [ 1147.934515] ? trace_hardirqs_on+0x10/0x10 [ 1147.938782] ? lock_release+0xa30/0xa30 [ 1147.942802] ? check_same_owner+0x340/0x340 [ 1147.947186] ? kasan_unpoison_shadow+0x35/0x50 [ 1147.952031] schedule+0xfb/0x450 [ 1147.955422] ? __mutex_lock+0xbf0/0x1680 [ 1147.959531] ? __schedule+0x1ea0/0x1ea0 [ 1147.963532] ? kasan_check_read+0x11/0x20 [ 1147.967805] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1147.972240] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1147.976870] ? __ww_mutex_add_waiter.part.15+0x120/0x120 [ 1147.982345] ? mutex_destroy+0x200/0x200 [ 1147.986448] ? do_raw_spin_lock+0xc1/0x200 [ 1147.990712] schedule_preempt_disabled+0x10/0x20 [ 1147.995595] __mutex_lock+0xbf5/0x1680 [ 1147.999527] ? lock_acquire+0x1e4/0x540 [ 1148.003562] ? d_alloc+0x28b/0x380 [ 1148.007135] ? fuse_lock_inode+0xaf/0xe0 [ 1148.011230] ? mutex_trylock+0x2b0/0x2b0 [ 1148.015325] ? d_alloc_parallel+0x8ea/0x1ea0 [ 1148.019767] ? lock_downgrade+0x8f0/0x8f0 [ 1148.023968] ? d_alloc+0x290/0x380 [ 1148.027541] ? trace_hardirqs_on_caller+0x561/0x5c0 [ 1148.032591] ? __d_alloc+0xd50/0xd50 [ 1148.036433] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1148.042020] ? lock_downgrade+0x8f0/0x8f0 [ 1148.046274] ? d_alloc_cursor+0xe0/0xe0 [ 1148.050280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1148.055853] ? __follow_mount_rcu.isra.36.part.37+0x175/0x890 [ 1148.061774] mutex_lock_nested+0x16/0x20 [ 1148.065862] ? mutex_lock_nested+0x16/0x20 [ 1148.070142] fuse_lock_inode+0xaf/0xe0 [ 1148.074066] fuse_lookup+0x8f/0x4c0 [ 1148.077733] ? fuse_lookup_name+0x830/0x830 [ 1148.082109] ? lock_acquire+0x1e4/0x540 [ 1148.086119] ? __lockdep_init_map+0x105/0x590 [ 1148.090645] ? __lockdep_init_map+0x105/0x590 [ 1148.095177] ? lockdep_init_map+0x9/0x10 [ 1148.099290] ? __init_waitqueue_head+0x9e/0x150 [ 1148.103989] ? init_wait_entry+0x1c0/0x1c0 [ 1148.108264] __lookup_slow+0x2b5/0x540 [ 1148.112180] ? vfs_unlink+0x510/0x510 [ 1148.116018] ? down_read+0xb5/0x1d0 [ 1148.119691] ? lookup_slow+0x49/0x80 [ 1148.123436] ? __down_interruptible+0x700/0x700 [ 1148.128128] ? lookup_fast+0x470/0x12a0 [ 1148.132159] ? __follow_mount_rcu.isra.36.part.37+0x890/0x890 [ 1148.138086] lookup_slow+0x57/0x80 [ 1148.141665] walk_component+0x94a/0x2630 [ 1148.145790] ? inode_permission+0xb2/0x560 [ 1148.150098] ? path_init+0x2340/0x2340 [ 1148.154055] ? walk_component+0x2630/0x2630 [ 1148.158592] ? save_stack+0xa9/0xd0 [ 1148.162250] ? save_stack+0x43/0xd0 [ 1148.165920] ? kmem_cache_alloc+0x12e/0x760 [ 1148.170281] ? getname_flags+0xd0/0x5a0 [ 1148.174282] ? user_path_at_empty+0x2d/0x50 [ 1148.178632] ? do_mount+0x180/0x1fb0 [ 1148.182383] path_lookupat.isra.45+0x202/0xbf0 [ 1148.187055] ? path_parentat.isra.43+0x160/0x160 [ 1148.191835] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1148.197109] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1148.202182] ? __check_object_size+0xa3/0x5d7 [ 1148.206716] ? usercopy_warn+0x120/0x120 [ 1148.210822] ? kasan_check_read+0x11/0x20 [ 1148.215005] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1148.219448] filename_lookup+0x264/0x510 [ 1148.223542] ? filename_parentat.isra.58+0x570/0x570 [ 1148.228670] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1148.234241] ? mpi_free.cold.1+0x19/0x19 [ 1148.238326] ? kasan_check_read+0x11/0x20 [ 1148.242519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1148.248096] ? getname_flags+0x26e/0x5a0 [ 1148.252196] user_path_at_empty+0x40/0x50 [ 1148.256365] do_mount+0x180/0x1fb0 [ 1148.259940] ? check_same_owner+0x340/0x340 [ 1148.264288] ? copy_mount_string+0x40/0x40 [ 1148.268572] ? retint_kernel+0x10/0x10 [ 1148.272506] ? copy_mount_options+0x213/0x380 [ 1148.277042] ? write_comp_data+0x22/0x70 [ 1148.281132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1148.286698] ? copy_mount_options+0x285/0x380 [ 1148.291239] ksys_mount+0x12d/0x140 [ 1148.294914] __x64_sys_mount+0xbe/0x150 [ 1148.298991] do_syscall_64+0x1b9/0x820 [ 1148.302903] ? finish_task_switch+0x1d3/0x870 [ 1148.307708] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1148.312668] ? syscall_return_slowpath+0x31d/0x5e0 [ 1148.317644] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1148.322697] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1148.327575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1148.332790] RIP: 0033:0x455ab9 [ 1148.335989] Code: e0 1f 48 89 04 24 e8 b6 6f fd ff e8 81 6a fd ff e8 5c 68 fd ff 48 8d 05 23 cd 48 00 48 89 04 24 48 c7 44 24 08 1d 00 00 00 e8 <13> 5e fd ff 0f 0b e8 8c 44 00 00 e9 07 f0 ff ff cc cc cc cc cc cc [ 1148.355408] RSP: 002b:00007fe80cf8bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1148.363141] RAX: ffffffffffffffda RBX: 00007fe80cf8c6d4 RCX: 0000000000455ab9 [ 1148.370433] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 1148.377802] RBP: 000000000072bff0 R08: 00000000200005c0 R09: 0000000000000000 [ 1148.385110] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 1148.392415] R13: 00000000004c025d R14: 00000000004cfef8 R15: 0000000000000002 [ 1148.399728] INFO: lockdep is turned off. [ 1148.403804] NMI backtrace for cpu 0 [ 1148.407462] CPU: 0 PID: 902 Comm: khungtaskd Not tainted 4.18.0-rc5-next-20180717+ #9 [ 1148.415446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1148.424795] Call Trace: [ 1148.427391] dump_stack+0x1c9/0x2b4 [ 1148.431021] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1148.436233] ? vprintk_default+0x28/0x30 [ 1148.440296] ? lapic_can_unplug_cpu.cold.28+0x3f/0x3f [ 1148.445573] nmi_cpu_backtrace.cold.3+0x48/0x88 [ 1148.450246] ? lapic_can_unplug_cpu.cold.28+0x3f/0x3f [ 1148.455491] nmi_trigger_cpumask_backtrace+0x151/0x192 [ 1148.460791] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1148.465985] watchdog+0xb39/0x10b0 [ 1148.470231] ? reset_hung_task_detector+0xd0/0xd0 [ 1148.475084] ? kasan_check_read+0x11/0x20 [ 1148.479233] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1148.483754] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 1148.488861] ? __kthread_parkme+0x58/0x1b0 [ 1148.493101] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1148.498132] ? trace_hardirqs_on+0xd/0x10 [ 1148.502283] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1148.507816] ? __kthread_parkme+0x106/0x1b0 [ 1148.512150] kthread+0x345/0x410 [ 1148.515518] ? reset_hung_task_detector+0xd0/0xd0 [ 1148.520356] ? kthread_bind+0x40/0x40 [ 1148.524163] ret_from_fork+0x3a/0x50 [ 1148.527915] Sending NMI from CPU 0 to CPUs 1: [ 1148.533168] NMI backtrace for cpu 1 [ 1148.533174] CPU: 1 PID: 2422 Comm: udevd Not tainted 4.18.0-rc5-next-20180717+ #9 [ 1148.533179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1148.533182] RIP: 0010:ep_scan_ready_list+0xf2/0xf50 [ 1148.533184] Code: c7 40 34 00 f2 f2 f2 c7 40 38 f2 f2 f2 f2 c7 40 3c 00 f2 f2 f2 c7 40 40 f2 f2 f2 f2 c7 40 44 00 f2 f2 f2 c7 40 48 f2 f2 f2 f2 40 4c 00 f2 f2 f2 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 [ 1148.533290] RSP: 0018:ffff8801ca0ff668 EFLAGS: 00000282 [ 1148.533297] RAX: ffffed003941fed9 RBX: ffff8801ca0ff968 RCX: 0000000000000000 [ 1148.533301] RDX: ffff8801ca0ffb28 RSI: ffffffff81dc6ac0 RDI: ffff8801c9c3aa00 [ 1148.533305] RBP: ffff8801ca0ff990 R08: 0000000000000000 R09: ffffed0039387540 [ 1148.533309] R10: ffffed0039387540 R11: ffff8801c9c3aa03 R12: ffffffff81dc6ac0 [ 1148.533313] R13: ffff8801c9c3aa00 R14: ffff8801ca0ffb28 R15: dffffc0000000000 [ 1148.533318] FS: 00007f65e03637a0(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 1148.533322] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1148.533326] CR2: ffffffffff600400 CR3: 00000001ca7a1000 CR4: 00000000001406e0 [ 1148.533330] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1148.533334] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1148.533337] Call Trace: [ 1148.533339] ? lock_downgrade+0x8f0/0x8f0 [ 1148.533342] ? ep_poll_callback+0x10f0/0x10f0 [ 1148.533346] ? pvclock_read_flags+0x160/0x160 [ 1148.533348] ? kvm_clock_read+0x25/0x30 [ 1148.533352] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1148.533355] ? ktime_get_ts64+0x3a5/0x530 [ 1148.533358] ? do_gettimeofday+0x180/0x180 [ 1148.533361] ? run_rebalance_domains+0x4c0/0x4c0 [ 1148.533364] ? retint_kernel+0x10/0x10 [ 1148.533366] ? lock_acquire+0x1e4/0x540 [ 1148.533369] ? ep_poll+0x364/0x1210 [ 1148.533372] ? lock_downgrade+0x8f0/0x8f0 [ 1148.533375] ? kasan_check_read+0x11/0x20 [ 1148.533378] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1148.533381] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 1148.533384] ? kasan_check_write+0x14/0x20 [ 1148.533387] ? do_raw_spin_lock+0xc1/0x200 [ 1148.533389] ep_poll+0x3ef/0x1210 [ 1148.533392] ? preempt_notifier_register+0x200/0x200 [ 1148.533395] ? do_epoll_create+0x5c0/0x5c0 [ 1148.533398] ? __schedule+0x884/0x1ea0 [ 1148.533401] ? lock_repin_lock+0x430/0x430 [ 1148.533404] ? __sched_text_start+0x8/0x8 [ 1148.533406] ? __schedule+0x884/0x1ea0 [ 1148.533409] ? _raw_spin_unlock+0x22/0x30 [ 1148.533413] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1148.533415] ? retint_kernel+0x10/0x10 [ 1148.533424] ? exit_to_usermode_loop+0xcd/0x380 [ 1148.533427] ? exit_to_usermode_loop+0x22a/0x380 [ 1148.533431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1148.533434] ? __fget_light+0x2f7/0x440 [ 1148.533436] ? fget_raw+0x20/0x20 [ 1148.533440] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1148.533442] do_epoll_wait+0x1b0/0x200 [ 1148.533445] __x64_sys_epoll_wait+0x97/0xf0 [ 1148.533448] do_syscall_64+0x1b9/0x820 [ 1148.533451] ? syscall_slow_exit_work+0x500/0x500 [ 1148.533454] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1148.533458] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1148.533461] ? perf_trace_sys_enter+0xb10/0xb10 [ 1148.533464] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1148.533467] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1148.533470] RIP: 0033:0x7f65dfa77943 [ 1148.533471] Code: 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 83 3d b5 dc 2a 00 00 75 13 49 89 ca b8 e8 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 34 c3 48 83 ec 08 e8 3b c4 00 00 48 89 04 24 [ 1148.533575] RSP: 002b:00007ffd3f697938 EFLAGS: 00000246 ORIG_RAX: 00000000000000e8 [ 1148.533582] RAX: ffffffffffffffda RBX: 0000000000000bb8 RCX: 00007f65dfa77943 [ 1148.533586] RDX: 0000000000000008 RSI: 00007ffd3f697a30 RDI: 000000000000000a [ 1148.533591] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000001 [ 1148.533595] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000003 [ 1148.533599] R13: 0000000000000000 R14: 0000000000ddf600 R15: 0000000000dce250 [ 1148.533611] Kernel panic - not syncing: hung_task: blocked tasks [ 1148.915778] CPU: 0 PID: 902 Comm: khungtaskd Not tainted 4.18.0-rc5-next-20180717+ #9 [ 1148.923744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1148.933295] Call Trace: [ 1148.935992] dump_stack+0x1c9/0x2b4 [ 1148.939620] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1148.944937] ? printk_safe_log_store+0x2f0/0x2f0 [ 1148.949723] panic+0x238/0x4e7 [ 1148.952954] ? add_taint.cold.5+0x16/0x16 [ 1148.957118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1148.962672] ? nmi_trigger_cpumask_backtrace+0x13a/0x192 [ 1148.968214] ? printk_safe_flush+0xd7/0x130 [ 1148.972546] watchdog+0xb4a/0x10b0 [ 1148.976112] ? reset_hung_task_detector+0xd0/0xd0 [ 1148.980978] ? kasan_check_read+0x11/0x20 [ 1148.985130] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1148.989568] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 1148.994676] ? __kthread_parkme+0x58/0x1b0 [ 1148.998927] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1149.003949] ? trace_hardirqs_on+0xd/0x10 [ 1149.008195] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1149.013739] ? __kthread_parkme+0x106/0x1b0 [ 1149.018345] kthread+0x345/0x410 [ 1149.021722] ? reset_hung_task_detector+0xd0/0xd0 [ 1149.026568] ? kthread_bind+0x40/0x40 [ 1149.030377] ret_from_fork+0x3a/0x50 [ 1149.034747] Dumping ftrace buffer: [ 1149.038286] (ftrace buffer empty) [ 1149.041993] Kernel Offset: disabled [ 1149.045607] Rebooting in 86400 seconds..