c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:18 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0xffffffffffffff6b, 0x0, 0x0, 0x2}}, 0x68) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x40010, r0, 0x0) keyctl$session_to_parent(0x12) bind$rxrpc(r0, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e22, 0x4, @empty, 0x2}}, 0x24) 11:23:18 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/dlm-monitor\x00', 0x201, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000016c0)={0x11, 0x0, 0x0}, &(0x7f0000001700)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001740)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@multicast2}}, &(0x7f0000001840)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001880)={{{@in6=@empty, @in6=@mcast2, 0x4e22, 0xeb7, 0x4e22, 0x7ff, 0xa, 0x80, 0x80, 0xbf, r2, r3}, {0x7e3, 0x5f, 0x9, 0x20, 0x80000001, 0xd4e4, 0x1641, 0x8000}, {0x7a, 0x8001, 0x3, 0x4}, 0x4, 0x6e6bbe, 0x0, 0x1, 0x3}, {{@in=@multicast2, 0x4d4, 0x7e}, 0xa, @in=@empty, 0x3502, 0x4, 0x2, 0xba7, 0x6, 0x6, 0x37b3}}, 0xe8) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000001980)={0x6, 0x100, 0x1, 0x0, 0x0, [{r0, 0x0, 0x20}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000014c0)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000140)=0xe8) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x6, &(0x7f0000001400)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="e454f4a8efc8224da8750eec685e3766f73b02d70b249ce18e43888732", 0x1d, 0x7}, {&(0x7f0000000200)="b6d47d4f7c985398343297ca8280fe459d5c83e0ac212f641f45e4b3c3f365dce3c6819a692e27390e87189acc975cb13cad3e85fc15a3d7ed6cba35d0bda914cc312db11505227b293961b38344d546a0b756029c2694d7b1df89ba76253e", 0x5f, 0x2d79ad8b}, {&(0x7f0000000280)="d34c5c530c47f71b077f7a91a3c289c553aaf1f7bc43c5d0f3239e09f325e7ec1a1f594646f335674087a5de1f921a3d97eeef90490f1abbd55063e6bf93209e9fc3dfa4e0530e9da387b2a3c54b2cb92c5ba886136967d0dd2f64a8466e413010540eb27d7cf4e610935a11662ee6f1974373b8bfb04a7be88a707765d70864557b", 0x82, 0x4b0b}, {&(0x7f0000000340)="b018f8b9bb22b707d609b3b350cb2c6ace0b527518a5fb98d6236a5cf0b9ff61cdb3ca8233a3e799fb4d55960d93694df8aa6030093cc2631d1069085cf9e1eb65d2c1dfdb66b920c821ba2476ea16640fb14a82b392e7ef7b420782956af7f57f1e65415b6b5bd5b6badf915fb09bff8c1c915ea2133cdd602789a9e196d5c344d3c123043429ea1645f0be394cefea3a3556efe6f99354beb572549dce85e5651a76", 0xa3, 0x8}, {&(0x7f0000000400)="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", 0x1000, 0x7}], 0x10004, &(0x7f00000015c0)={[{@nodots='nodots'}, {@fat=@dos1xfloppy='dos1xfloppy'}, {@dots='dots'}, {@nodots='nodots'}], [{@uid_lt={'uid<', r4}}, {@dont_measure='dont_measure'}, {@obj_user={'obj_user', 0x3d, '/dev/vhost-net\x00'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@dont_measure='dont_measure'}, {@dont_appraise='dont_appraise'}, {@obj_role={'obj_role', 0x3d, '#%*securityeth1!proc//)]lo,:'}}, {@smackfsroot={'smackfsroot', 0x3d, '+vboxnet0:cgroup}{GPL'}}]}) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000001a00)) 11:23:18 executing program 1: ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f00000001c0)={0xa, {0x8, 0x8, 0x9, 0x613f082}}) 11:23:18 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x3}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000008c0)={0x5, 0x200, 0x1, 0x5303, r2}, 0x10) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101002, 0x0) accept4$ax25(r3, &(0x7f0000000740)={{}, [@netrom, @netrom, @remote, @rose, @rose, @rose, @rose, @default]}, &(0x7f00000001c0)=0x48, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$VIDIOC_G_PARM(r5, 0xc0cc5615, &(0x7f00000007c0)={0xb, @capture={0x1000, 0x1, {0x27, 0x1}, 0xb0dd, 0x1}}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000900)={r2, 0x7ff}, 0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r4, 0xc4c85513, &(0x7f0000000240)={{0xa, 0x2, 0x8, 0x88d9, 'syz1\x00', 0x4}, 0x0, [0x1d, 0x2, 0xb686, 0x6d, 0x3ff, 0x3, 0x9, 0x5, 0xed7a9aa, 0xfff, 0x1f, 0xff, 0x4, 0x3685, 0x7, 0x5, 0xf95, 0x1, 0x2, 0x1, 0x6, 0x2, 0x48d, 0xffffffffffffff81, 0x6ba8, 0x3, 0x2, 0x20, 0x9, 0x80000000, 0x6, 0x7, 0x9, 0x80000000, 0x0, 0x2, 0x400, 0x2, 0x7f, 0xffffffffffffffe0, 0x3c, 0x4, 0x2, 0xac, 0xfffffffffffffffd, 0x8, 0x6, 0x7b5d, 0x1, 0x5, 0x80000000, 0x10000, 0x6, 0x8001, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xb751, 0xe70, 0x80000000, 0x2, 0xcd, 0x2, 0x9, 0x80000001, 0x2, 0x2, 0x5, 0x28f, 0x3ff, 0x8, 0x59a, 0x100000001, 0xcde9a3d, 0x8, 0x401, 0x9, 0x7fff, 0x5, 0x684, 0x400, 0x9, 0x7fff, 0x0, 0x4, 0x20, 0x3, 0xa7, 0x3, 0xffff, 0x61cc, 0x81, 0x480, 0x0, 0x1, 0x5, 0xfff, 0x9, 0x10f, 0xff, 0x7ff, 0x0, 0x2abd, 0x400, 0xe08, 0x2, 0x5, 0xcac, 0x0, 0xf, 0x401, 0xfffffffffffff027, 0x2, 0x7, 0x3, 0xfffffffffffffff8, 0x8000, 0x7, 0x3, 0x6, 0x7f, 0x40000, 0x7, 0x5, 0x101, 0x3ff], {r6, r7+10000000}}) 11:23:18 executing program 1: ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f00000001c0)={0xa, {0x8, 0x8, 0x9, 0x613f082}}) 11:23:18 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xe1a6, 0x220000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)={0x5, 0x1, @stop_pts=0x23d02dfb}) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) 11:23:18 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x8000, 0x800) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x40, 0x1e811945a2db6f21) sendmsg$nl_xfrm(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="480000001c00000128bd7000fddbdf253348001900330000002c00130000000006000000000000000000000000fe8000000000000000000000000000aa0000000002000000000000"], 0x48}, 0x1, 0x0, 0x0, 0x8840}, 0x80) write$vnet(r0, &(0x7f0000000040)={0x1, {0x0, 0x26a, 0x0, 0xfffffffffffffffc, 0x800000000000002}}, 0x68) [ 987.699012][T20046] FAT-fs (loop0): Unrecognized mount option "uid<00000000000000000000" or missing value 11:23:18 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x180, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1, 0x8001}}, 0x10) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x13) fcntl$setsig(r2, 0xa, 0x8001) ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0x4) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000200)) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) close(r3) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x200002, 0x0) 11:23:18 executing program 1: ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f00000001c0)={0xa, {0x8, 0x8, 0x9, 0x613f082}}) 11:23:18 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000000)={0x9f0003, 0x5, 0xfffffffffffffffe, [], 0x0}) [ 987.784452][T20251] JFS: Cannot determine volume size [ 987.789665][T20251] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:18 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0xa, {0x8, 0x8, 0x9, 0x613f082}}) [ 987.891291][T20251] JFS: Cannot determine volume size [ 987.916419][T20251] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:19 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643578f419ba40d862cdba643573756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:19 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:19 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) 11:23:19 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)={0x6, 0x401}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0003, 0x5, 0x20000000000000, [], 0x0}) 11:23:19 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0xa, {0x8, 0x8, 0x9, 0x613f082}}) 11:23:19 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) close(r0) 11:23:19 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x8000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d00)=@broute={'broute\x00', 0x20, 0x1, 0xac8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000140), &(0x7f0000000200)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xcd6cc9be320b1152, 0x1, [{{{0x0, 0x4, 0x88bd, 'nr0\x00', 'vcan0\x00', 'rose0\x00', 'bond_slave_0\x00', @broadcast, [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], @local, [0x0, 0xff, 0xff], 0x960, 0xa08, 0xa38, [@stp={'stp\x00', 0x48, {{0x4, {0x7, 0x4, 0x20, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0x0, 0x0, 0xff], 0x8, 0xffff, 0x4, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x4e20, 0x4e20, 0x6, 0x4, 0xe0000000, 0x5, 0x9, 0x80, 0x2, 0x9}, 0x20, 0x80}}}, @among={'among\x00', 0x858, {{0x7, 0x10000, 0x3, {[0x1ff, 0x9, 0x2, 0x5, 0x1ff, 0x4, 0x579f, 0x4, 0x44, 0x2e, 0xfffffffffffffffa, 0x6, 0xf333, 0x1f, 0x14, 0x36f, 0xfffffffffffff857, 0x88e, 0xffff, 0xff, 0x5, 0x200, 0x2, 0x8000, 0x9, 0x0, 0x80000001, 0x8, 0x100000000, 0xd2, 0xffffffffffff10d9, 0xd0db, 0x60, 0x12400000000, 0x6, 0xc53, 0x7f, 0x72ac, 0x17, 0xffffffffffff2e2b, 0x1, 0x65, 0x3, 0x8, 0x1000, 0x800, 0x4, 0x6, 0x4, 0x10001, 0x1, 0x7ff, 0x3, 0x9, 0x40, 0x7, 0x1, 0x40, 0xb1, 0x9, 0x8, 0x10000, 0x0, 0x3, 0x9, 0x5, 0x1, 0x18000, 0x6, 0x6, 0xc6a, 0x4, 0xd9c1, 0x5, 0x2, 0x8, 0x20000000000000, 0x5, 0x5, 0x7, 0x0, 0x3, 0x0, 0x2, 0x1, 0x100000000, 0x1341dea4, 0x81, 0x9, 0x20, 0x401, 0x10001, 0x9, 0x0, 0x7, 0x2, 0xff, 0x8, 0x800, 0x5, 0x8, 0x3ff, 0x8, 0x922d, 0x7f, 0x400, 0x3, 0x1, 0x80000000, 0x8, 0x333, 0x400, 0x5, 0x0, 0x20, 0x0, 0xfc, 0x6, 0xfffffffffffff801, 0x8, 0x100, 0x6, 0x4, 0x5, 0x2, 0x8, 0x7, 0x2, 0x5, 0x100000001, 0x100000000, 0x6, 0x3, 0x7, 0xffffffffffffff80, 0x80000001, 0xffffffff, 0x0, 0x6, 0xffffffffffff3537, 0x4, 0xfffffffffffffffd, 0x9, 0x7ff, 0x0, 0x7f, 0x6, 0x14, 0x2, 0x4, 0x5, 0x2, 0x1, 0x0, 0x1, 0xfffffffeffffffff, 0x1, 0x1, 0xfffffffffffffff9, 0x7, 0xfffffffffffffedf, 0x1, 0x92e, 0x9, 0xffffffffffff325d, 0x13aa, 0x9f2, 0x100000000, 0x3, 0x4, 0x6, 0x6, 0x7, 0x7fff, 0x0, 0x4, 0x800, 0xeae, 0x7fffffff, 0x80000001, 0x1, 0x200, 0x5, 0xfff, 0x0, 0x80, 0xb0d, 0x4, 0x2, 0x1, 0xed, 0xf6f7, 0x7, 0x6, 0x5, 0x6, 0x1, 0x3ff, 0x4, 0x80000001, 0x7, 0x1, 0x3f, 0x800, 0x5, 0x5, 0x8, 0x5, 0x3, 0x4, 0x20, 0x7ff, 0x7fffffff, 0xfff, 0x6f, 0x9, 0x3, 0x100, 0x200, 0x3f, 0x8fd0, 0x9, 0x64, 0x81, 0x100000, 0x101, 0x10b, 0xa1, 0x3, 0xfffffffffffffff9, 0x7f, 0x1f, 0x5, 0x100000000, 0x9, 0x3, 0x5, 0x3, 0x6, 0x3a7, 0x10000, 0x7, 0xffffffff, 0x7, 0x27c, 0x200, 0xffffffff, 0x10000, 0x1, 0x6, 0x4, 0x1, 0x4, 0x7, 0x1, 0x9, 0x7ff], 0x3, [{[0x80000000, 0xfffffffffffffff8], @initdev={0xac, 0x1e, 0x1, 0x0}}, {[0x3, 0x2], @dev={0xac, 0x14, 0x14, 0xe}}, {[0xfff, 0x8], @empty}]}, {[0x4, 0x200, 0x0, 0x8df8, 0xa16a, 0x1ff, 0xf8, 0x20, 0x7d5, 0x1e, 0x7, 0x2, 0x80, 0xed, 0x1, 0x8001, 0x8001, 0x1, 0x6, 0x1, 0xf22, 0x4, 0x10000, 0x6, 0x3, 0x8001, 0x8000, 0x27c, 0x9, 0xe, 0xc18e, 0x9, 0x3e160, 0xfffffffffffffe01, 0x0, 0x100000000, 0x9, 0xfffffffffffffffa, 0x1592, 0x35, 0xa6e6, 0x9ac, 0x6, 0x9, 0x1, 0x1ff, 0xbe0, 0x4, 0x0, 0x6, 0x5, 0xffffffff, 0xafd, 0x8, 0x80, 0x9, 0x9, 0x2, 0x1, 0x3, 0x4, 0x1, 0x7ff, 0x63cf5014, 0x8, 0x6fcb, 0x2f1a, 0x1, 0x8c21, 0x6, 0x9, 0x4, 0x2, 0x8, 0xa8, 0x4, 0x3, 0x9, 0x9, 0x2, 0xde, 0x40, 0x100000001, 0x5, 0x3, 0x9, 0x1, 0x5, 0x319, 0x100000000, 0x7fff, 0x2, 0x50, 0x3, 0x9e, 0x1, 0x1, 0x6, 0x5, 0x0, 0x8000, 0x2, 0x200, 0x4, 0x3, 0x6, 0x1000, 0x8001, 0x4, 0x515, 0x8000, 0x3ff, 0x9, 0x40, 0x9, 0x10000, 0x3, 0x10001, 0x4, 0x6, 0x3, 0x7fffffff, 0x9, 0xf05, 0x5, 0x3, 0x0, 0x0, 0x401, 0x400, 0xfffffffffffffffe, 0x4, 0x8000, 0x9, 0x1f, 0x9, 0x7bf41928, 0x8001, 0x3ff, 0x9, 0x9, 0x8001, 0x3, 0x1, 0x5, 0x1, 0x46, 0x1, 0x3, 0x6, 0x5, 0x9f3, 0x9, 0x0, 0xffffffffffffff00, 0x0, 0x5, 0x7fffffff, 0x0, 0x9, 0xffff, 0x2, 0x0, 0x7, 0x6, 0x100000000, 0x1, 0x40, 0x4, 0xffffffffffffffff, 0x3, 0x7, 0x40, 0x3, 0x2, 0x2, 0x20, 0x0, 0x1730, 0x7, 0x4, 0xff, 0x2, 0x2, 0x1, 0x3ff, 0x1, 0x8, 0x8000, 0x3, 0x7f0, 0x81, 0xffffffff, 0x6, 0x40, 0x5, 0x6, 0x80000000, 0x7fff, 0x40, 0x2, 0x100000000, 0x400, 0x6, 0xa471, 0x6, 0x0, 0xff, 0x0, 0x1, 0x1000, 0x9, 0x81, 0x9, 0x2, 0x5bde, 0xd679, 0x476d, 0x8, 0x5, 0x1, 0x3ff, 0x2, 0x8, 0x2, 0x32, 0x2, 0x8001, 0xdcb, 0x1, 0x2, 0x400, 0x8, 0x9, 0x82e8, 0xb601, 0x100000000, 0x2, 0x8, 0x2, 0xfffffffffffffffe, 0x8000, 0x6, 0x4, 0xffffffffffffffad, 0x4, 0x6, 0x1c1, 0xfffffffffffffffd, 0xa2a, 0x7, 0x64, 0x10001, 0x6, 0x0, 0x80000000, 0x8], 0x2, [{[0xffffffff, 0x42a3], @multicast1}, {[0x5, 0x2a1a], @dev={0xac, 0x14, 0x14, 0x16}}]}}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0xff, 0x2, 0x2, 0x0, 0x0, "f2919f7844de34d7e2f6ab41d9c4cff50de30811a808dc708f841658e4d94cc4d712cf8c652a6be84679aad01e91cd8ef57916796e2e5b5087833014bddd566f"}}}, @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffc}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0xfffffffffffff801}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0xb40) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r1, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:19 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000040)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:19 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0xa, {0x8, 0x8, 0x9, 0x613f082}}) [ 988.130970][T20502] JFS: Cannot determine volume size 11:23:19 executing program 1: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f00000001c0)={0xa, {0x8, 0x8, 0x9, 0x613f082}}) [ 988.182830][T20502] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:19 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1e, 0x80) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000200)) 11:23:19 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) close(r0) [ 988.274332][T20502] JFS: Cannot determine volume size [ 988.299354][T20502] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:19 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f439ba40d862cdba643573756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:19 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) r1 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000000c0)={0xd6}, 0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20000, 0x0) 11:23:19 executing program 1: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f00000001c0)={0xa, {0x8, 0x8, 0x9, 0x613f082}}) [ 988.479042][T20823] JFS: Cannot determine volume size [ 988.484531][T20823] jfs: Unrecognized mount option "obj_role=" or missing value [ 988.539829][T20823] JFS: Cannot determine volume size [ 988.545246][T20823] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:20 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000000)={0xbb0000, 0xfffffffffffff3c6, 0xffffffffffffffff, [], 0x0}) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x40000000, 0x4040) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x78) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000000c0)=0x5, 0x4) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) 11:23:20 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:20 executing program 1: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f00000001c0)={0xa, {0x8, 0x8, 0x9, 0x613f082}}) 11:23:20 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f00000000c0)={0x1, 0x1}) close(r1) recvmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@x25={0x9, @remote}, 0x80, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/172, 0xac}, {&(0x7f0000000140)=""/3, 0x3}], 0x2}, 0x100) 11:23:20 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000040)={0x1, {0x0, 0x0, 0x0}}, 0x16a) 11:23:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f453ba40d862cdba643573756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) [ 989.081066][T20846] JFS: Cannot determine volume size 11:23:20 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, 0x0) 11:23:20 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x7, 0x0, [], 0x0}) 11:23:20 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xb8, 0x0, {"1134278ed6ea66a17b9652e9c1d2595fd0ea8a28593ceac1bffad401e5198261001d08f53a08a74e092828b0fa617ed4722e0fcf0ee248c0222468de69f6bc0db832c6667bc3f67877abb81ea0d6403fde74d5ce40289bfe1c83c4b0dab765b3cc9943248ea802fbf5141e7dfba80e7880920aeedfe00e957ca3a2d8784e689d05177b7639b21eb13b382af417f24ef96274d968645cf023c262a10033"}}, {0x0, "d49c69b16d1c755cc17c4c6cfda1a74db25b351e0a5e670a4555a28511ac30ac5ec7d2d44121c188f38ba6d012f473e3ca8ed78695089343bf46501c17d7e9d6247695f60499a8fe20adc6b49f333183791e13e92791b20fd440969f973dfe85316ae2623eff0cfab52088329e4573feb6b5e9ad0d440a3006d24e626e8c4b05580f759879109dedd7e11fa69a54db1aad36bab6"}}, &(0x7f0000000600)=""/131, 0x14e, 0x83, 0x1}, 0x20) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000080)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000000200)=0xe8) getresgid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) write$FUSE_ENTRY(r1, &(0x7f00000003c0)={0x90, 0xfffffffffffffffe, 0x3, {0x4, 0x2, 0x1, 0x2, 0x3, 0x3, {0x6, 0x9, 0x5, 0x7, 0x1, 0x8, 0xf727, 0x8, 0xffffffff00000000, 0x0, 0xeb30, r2, r3, 0xeca, 0x4}}}, 0x90) write$FUSE_ENTRY(r1, &(0x7f0000000300)={0x90, 0x0, 0x2, {0x6, 0x0, 0x9, 0x7, 0x2, 0x100000001, {0x4, 0xfffffffffffff5f7, 0x8, 0x8, 0x8, 0x2, 0x7, 0x0, 0x4, 0x7, 0x0, r2, r3, 0x6, 0x81}}}, 0x90) socket$kcm(0x29, 0x5, 0x0) 11:23:20 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x2, 0x2180) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000200)={0x0, 0x10001, 0x5, [], &(0x7f0000000140)=0x1f}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000002c0)='c\xbf%6\x12\x00@\x00\x00Nv\x1a\xe1R\v\xf1\x8d\xcfgX\xb0\xb7\x8f\b\xed\xc6\x15\xc2\x12\xc3\xc2\x1eMl\x1a.aG\'\xa4F\xdd\xff\x1fO\xc3\xfcw\x86L\xd2\xfe\x8f\xd4\xabv\xa7\x1fqX`\x81\x9f\xfe\xdb\xaf%\xd8\xb0XwJ\xca\xd4\x8b\xa8\xfc\xab,\xcagj\xcf\xa1\xc3<\x02\x9aA(j\x1d\xc5\xec?\xed\x95\xae\x86\x86\xcf\xfc\x95\xd8\xef\xb0aTX<\xd4\xb3@\xc1\xd1_:;\xac\x17 \xc3\xa3\x90\x8f\xb7\xd94\x01\xf9\xf8\xc63\xa9j\xff\v\xaa') ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000080)=""/65) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r3, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x80000001, 0x400000) [ 989.106843][T20846] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:20 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, 0x0) 11:23:20 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) recvfrom$ax25(r0, &(0x7f0000000040)=""/72, 0x48, 0x20, &(0x7f00000000c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x8}, [@bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) [ 989.234704][T20846] JFS: Cannot determine volume size [ 989.240203][T20846] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:20 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x100000000, 0x7c, 0xfffffffffffffffd, 0x7fff}) recvmmsg(0xffffffffffffffff, &(0x7f0000001f40)=[{{&(0x7f0000000080)=@un=@abs, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/211, 0xd3}, {&(0x7f0000000100)=""/108, 0x6c}, {&(0x7f0000000300)=""/45, 0x2d}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/10, 0xa}, {&(0x7f0000000400)=""/227, 0xe3}, {&(0x7f0000000500)=""/63, 0x3f}], 0x7, &(0x7f00000005c0)=""/247, 0xf7}, 0x400}, {{&(0x7f00000006c0)=@nl=@proc, 0x80, &(0x7f0000000940)=[{&(0x7f0000000740)=""/197, 0xc5}, {&(0x7f0000000840)=""/237, 0xed}], 0x2, &(0x7f0000000980)=""/230, 0xe6}, 0x81}, {{&(0x7f0000000a80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000b00)=""/212, 0xd4}, {&(0x7f0000000c00)=""/64, 0x40}, {&(0x7f0000000c40)=""/216, 0xd8}, {&(0x7f0000000d40)=""/188, 0xbc}, {&(0x7f0000000e00)=""/59, 0x3b}, {&(0x7f0000000e40)=""/14, 0xe}], 0x6, &(0x7f0000000f00)=""/208, 0xd0}, 0x7ff}, {{&(0x7f0000001000)=@nl, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/9, 0x9}, {&(0x7f00000010c0)=""/55, 0x37}, {&(0x7f0000001100)=""/120, 0x78}], 0x3, &(0x7f00000011c0)=""/126, 0x7e}, 0x4}, {{&(0x7f0000001240)=@caif=@dgm, 0x80, &(0x7f00000016c0)=[{&(0x7f00000012c0)=""/212, 0xd4}, {&(0x7f00000013c0)=""/118, 0x76}, {&(0x7f0000001440)=""/239, 0xef}, {&(0x7f0000001540)=""/209, 0xd1}, {&(0x7f0000001640)=""/89, 0x59}], 0x5, &(0x7f0000001740)=""/91, 0x5b}, 0x8}, {{&(0x7f00000017c0)=@ethernet={0x0, @local}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001840)=""/74, 0x4a}, {&(0x7f00000018c0)}, {&(0x7f0000001900)=""/112, 0x70}, {&(0x7f0000001980)=""/192, 0xc0}], 0x4, &(0x7f0000001a80)=""/138, 0x8a}, 0xf13}, {{&(0x7f0000001b40)=@caif=@rfm, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001bc0)=""/60, 0x3c}], 0x1, &(0x7f0000001c40)=""/42, 0x2a}, 0xba5}, {{&(0x7f0000001c80)=@ll, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001d00)=""/210, 0xd2}], 0x1, &(0x7f0000001e40)=""/241, 0xf1}, 0x1}], 0x8, 0x102, &(0x7f0000002140)={0x0, 0x1c9c380}) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000002180)={0x4, 0x2, 0x3, 0x3f, 0xff, 0xef, 0x8b, 0x1b, 0x22f9, 0xff}, 0xb) 11:23:20 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000040)={{}, 0x8, 0x7fff0000000, 0x380000000}) close(r1) 11:23:20 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000000c0)={0x9f0000, 0x5, 0x0, [], 0x0}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x28000, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000040)=""/37) 11:23:20 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, 0x0) 11:23:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba02d862cdba643573756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:20 executing program 3: write$vnet(0xffffffffffffffff, &(0x7f0000000180)={0x1, {0x0, 0x1d0, 0x0, 0x0, 0x2}}, 0x68) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0xc0, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x1, 0x4) 11:23:20 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x145000, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)={0x3, [0x5, 0x1, 0x8]}, 0xa) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:20 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/fscreate\x00', 0x2, 0x0) 11:23:20 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000240)='~', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000280)={0x5}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x1}, 0x8) sendto$rose(r1, &(0x7f00000000c0)='7', 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) r2 = dup(r1) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000040)={0x1, 0x200}) r3 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f00000002c0)={0xf, @pix_mp={0x3ff, 0xfd, 0x51424752, 0x5, 0xf, [{0x6, 0x6}, {0xfffffffffffffff8}, {0x8001, 0x5}, {0x6, 0x7ff}, {0x4, 0x9}, {0x1, 0x2}, {0x8, 0x5}, {0xe1, 0x9}], 0x1aa47b4d, 0x3, 0x8, 0x2, 0x7}}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0xa4000, 0x0) [ 989.525249][T21232] JFS: Cannot determine volume size 11:23:20 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0x0, {0x8, 0x8, 0x9, 0x613f082}}) [ 989.555109][T21232] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:20 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x400, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000100)=0x337, 0x1) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r1, &(0x7f0000000040)={0x1, {0x0, 0xfffffffffffffe86, 0x0, 0xffffffffffffffff, 0x80000000000}}, 0xa) write$binfmt_misc(r1, &(0x7f0000000140)={'syz0', "75cab2f63c1e855587e7e07d00a79d43f7469ffb9fe1b252ce471f212a50f9e3c9aba860a24f65b049fb563b6a064665bd1b980d9e09434091db7865f676523cb2cfc3f402cfb665e0bd6947f037bb2f26988730a4226b0e5d25af1ce5894397ac808833275196a52da98eb62244f0d5539a50eaec55c541ed8ecf72217b9e2e109c0e9bf6255774f806c7a7"}, 0x90) 11:23:20 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) close(r0) 11:23:20 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000200)={0x1, {&(0x7f0000000040)=""/153, 0x99, &(0x7f0000000100)=""/4, 0x3, 0x9}}, 0x68) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) [ 989.658874][T21232] JFS: Cannot determine volume size [ 989.664736][T21232] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:20 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000080)={0x0, @reserved}) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000)=0x650, 0x4) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) 11:23:20 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0x0, {0x8, 0x8, 0x9, 0x613f082}}) 11:23:20 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x800, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000080)={0x3, 0x6, 0xfffffffffffffe01}) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba09d862cdba643573756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:20 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) 11:23:20 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x100000001, 0x40, 0x1004000000, 0x2, 0x4}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={r2, 0x9}, 0x8) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:20 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0x0, {0x8, 0x8, 0x9, 0x613f082}}) 11:23:20 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) close(r1) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 11:23:21 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x1, 0x0) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) [ 989.936862][T21636] JFS: Cannot determine volume size [ 989.942067][T21636] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:21 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0xa, {0x0, 0x8, 0x9, 0x613f082}}) 11:23:21 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) 11:23:21 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x280000, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x6, 0x240) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000200)=ANY=[@ANYBLOB="08000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000001000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) alarm(0x1) 11:23:21 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0xc0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000140)={0x80000000, 0x0, 0x1f, 0x200}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) write$P9_RGETLOCK(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2d00000037010001b800000000000000070c000000000000", @ANYRES32=r2, @ANYBLOB="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"], 0x2d) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) [ 990.072521][T21636] JFS: Cannot determine volume size [ 990.092115][T21636] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:21 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0xa, {0x0, 0x0, 0x9, 0x613f082}}) 11:23:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba25d862cdba643573756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:21 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000000)={0x80000000, 0xfffffffffffffffc}) 11:23:21 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x2040, 0x0) close(r0) 11:23:21 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000200)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2000000000}}, 0x68) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000040)={0xfffffffffffffeff, {{0x2, 0x4e21, @multicast2}}}, 0x88) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0xfffffffffffffffc, 0x20000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000140)=0x8001, 0x8) 11:23:21 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0xa, {0x0, 0x0, 0x0, 0x613f082}}) 11:23:21 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) [ 990.348304][T21980] JFS: Cannot determine volume size 11:23:21 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x480000, 0x0) 11:23:21 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x20000, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000100)={r2, 0x0, 0x7fffffff, 0x0, 0xad7, 0x1a, 0x2}) [ 990.378036][T21980] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:21 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:21 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) close(r1) [ 990.454638][T21980] JFS: Cannot determine volume size [ 990.459938][T21980] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:21 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0xa}) 11:23:21 executing program 0: r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/ptype\x00') r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r1, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba53d862cdba643573756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:21 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000080)={0xf000000, 0x5, 0x9, [], &(0x7f0000000040)={0x98093d, 0x80000000, [], @p_u8=&(0x7f0000000000)=0x68235d87}}) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) 11:23:21 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0x0, {0x8, 0x8, 0x9, 0x613f082}}) 11:23:21 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000040)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:21 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x37f, 0x0, 0x1, 0xfffffffffffffffe}}, 0x68) [ 990.698801][T22230] JFS: Cannot determine volume size 11:23:21 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0x0, {0x8, 0x8, 0x9, 0x613f082}}) 11:23:21 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000080)={0x980000, 0xffffffffffff1c46, 0x3, [], &(0x7f0000000040)={0x0, 0xff, [], @p_u8=&(0x7f0000000000)=0x100000000}}) 11:23:21 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x240, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000080)=0xec52, 0x4) r2 = getgid() setgid(r2) [ 990.748826][T22230] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:21 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x3, &(0x7f0000000040)=0x0) io_cancel(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd, r0, &(0x7f0000000080)="5dccfa6f803448bf83774321e9331ff7ed5e8ccfa6ae5fcfb0195164e83809fd1450153e35cb8e6aebdd5b2993214c84c41ed5b7ba8b764e35ad1a36dd6597ba71892fbf3b1be35d758e3041fa9ed3dedc2ab39291b123ddb41a72a57706f9aa2161c34977bf6a78f404aaf03bc33a66cdc64c4f630ddbf92c32d06f62172b5a420cfa089dd7b9f6b5e27bef30c178c9bab418593a", 0x95, 0x0, 0x0, 0x3}, &(0x7f0000000200)) 11:23:21 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0xa7, 0x80040) fsetxattr$security_smack_entry(r0, &(0x7f0000000140)='security.SMACK64IPOUT\x00', &(0x7f0000000180)='/dev/vhost-net\x00', 0xf, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80003, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f00000000c0)=0x5) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x1, 0x4) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000500)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40080}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)={0x1f4, r4, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x20}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffffffffffc}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4f2f}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1000}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x526d}]}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xf4f8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="73698b78b14c237d004949b6bf27eac0"}]}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x9, 0x4}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6c}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xc}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7f}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x845}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}]}, 0x1f4}, 0x1, 0x0, 0x0, 0x44}, 0x800) close(r3) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f00000001c0)) write$binfmt_aout(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="df869fefd70200001a02000004000000df020000090000000000000000000000000000cf9ac9d312a67c05b788cc838508e15b0cf8b9025450cbb0d64c6f4ce100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000efffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x532) ioctl$SIOCX25CALLACCPTAPPRV(r2, 0x89e8) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) [ 990.842712][T22230] JFS: Cannot determine volume size 11:23:21 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0x0, {0x8, 0x8, 0x9, 0x613f082}}) [ 990.883198][T22230] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:21 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xa59, 0x800) openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 11:23:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d80acdba643573756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:22 executing program 1: ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f00000001c0)={0x0, {0x8, 0x8, 0x9, 0x613f082}}) 11:23:22 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) 11:23:22 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0xfffffe4c, 0x0, 0x0, 0x2}}, 0x68) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)=0xfcc0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40000, 0x3) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000200)=""/4096) 11:23:22 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) 11:23:22 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) close(r0) [ 991.120795][T22556] JFS: Cannot determine volume size 11:23:22 executing program 1: ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f00000001c0)={0x0, {0x8, 0x8, 0x9, 0x613f082}}) [ 991.152673][T22556] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:22 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x406700, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x1ff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r1, 0x10000, 0x30}, &(0x7f0000000100)=0xc) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) 11:23:22 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="000010", @ANYRES16=r2, @ANYBLOB="140729bd7000fbdbdf250700000044000100080004004e21000008000500020000000800050001000000080008000bffffff0c000700210000002800000014000300ac1414aa000000000000000000000000"], 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x10, r3, 0xfffffffffffffffa) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) rt_sigtimedwait(&(0x7f0000000040)={0x7fff}, &(0x7f0000000080), &(0x7f0000000100)={0x77359400}, 0x8) 11:23:22 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$bt_hci(r1, 0x0, 0x0, &(0x7f0000000080)=""/137, &(0x7f0000000140)=0x89) [ 991.287083][T22556] JFS: Cannot determine volume size [ 991.300751][T22556] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:22 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000000)={0x9f0000, 0x9, 0x100000, [], 0x0}) 11:23:22 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400000, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) close(r0) 11:23:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d825cdba643573756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:22 executing program 1: ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f00000001c0)={0x0, {0x8, 0x8, 0x9, 0x613f082}}) 11:23:22 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000080)=""/250, &(0x7f0000000200)=0xfa) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r1, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) [ 991.561758][T22801] JFS: Cannot determine volume size 11:23:22 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4100, 0x0) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000100)) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000080)={0x2, 0x400000000001, @stop_pts=0x5}) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000000)={0x9f0000, 0x103, 0x1, [], 0x0}) 11:23:22 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0x0, {0x8, 0x8, 0x9, 0x613f082}}) [ 991.590297][T22801] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:22 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x5, 0x80) getsockopt$inet_tcp_buf(r1, 0x6, 0x3f, &(0x7f00000000c0)=""/175, &(0x7f0000000200)=0xaf) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000240)={0x0, 0x0, [], @bt={0x52, 0x9e82, 0x0, 0x7, 0x100, 0x0, 0x1, 0x4}}) 11:23:22 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0x0, {0x8, 0x8, 0x9, 0x613f082}}) 11:23:22 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) close(r1) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x1) [ 991.692818][T22801] JFS: Cannot determine volume size [ 991.708483][T22801] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:23 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000002740)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000002780)={0x18d2, 0x1, 0x7fffffff, 0x5, 0x1, 0x9, 0x7}) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000002680)=0xe8) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x33, 0x9, &(0x7f0000002480)=[{&(0x7f0000000100)="ee1dbd03916b0b3755c8b56daf557e119f24347959", 0x15, 0x4}, {&(0x7f0000000200)="deb74c9ec0857beff044acfcd2714c09269d57e15dc361887627b1831ddabb858c33c0c1cf82040a190ed0424e4f89182ec908d809466358cdb9063fc12cbb06a252a86b1dce785c3c198b067ddb0af91c7e1037989245085225ea908b51433f362430f09bfaf5f923314f822398dddcb327d3cf004142a9456f531d694070556250f149a13f9e9023fea24a0bc79d89a3757b8942ac3626aa37deb4b92ae94c1b75804d0c9c3a9f739e3a2b48b81b7d564d1c8253277d48cceeb8ad7e541cc41df763860ad475baa401449345423a2131a8307fcf68b2fd7c222643fed1b5ed261d9b6a0764f25d090449491652d3696a7241aad2fb3880985b84eef0a3c74ea76177a070159c8c399bbb5059f0f3b24d43a1d925152ab2feb77ac2199723a887db6b4478502d16bd9851ee281dc1d4827b8fd6afe499bd066b56e56f78a9477c62b852d2af811fcf4c7c934dfe71feb6ca284b80a2a01877af1e9e489d95dba702b58ef85e88d499fef0d2cf539d0336b92d3fad78c85594f45b7149f354e6b21c834667adad4829242d2b07633bc31ea25663b7fc12ed5f026552436c7a67bddf92496f3b24cba0017f748c18df92b6a1490743a600f2208ad52cce60b032105a1993dd2f53c765634f306e27263133079f9252d6e3efbafde65910304f6c0c22540e068e2e122e823a5a75b24679896bfa2285299d6fc435f22f1a7f293abd62df6d2b0e413a923244ee31a78a4be196301f9e5234cb834802d68c4c89ee32607e2a7f6ed0f238879b716b98600ba059f95dde8977b59d7214411101475f8038917ef36ce82b2912a2acae24e6589cfb7357760729db31c5b2e9692b054fb60369e8d1fc92915d24abf11094a7bb78fee313515ae6fffb4a820dad8bd82937f67afcc2b282e1636536aac0d20c82b0bbf58c8dca057a022f64ee58c269de15c70d73312f594f06eb09e22e4e6696e5cd162bdcb54376f08a910ac6d05716b6e792e40238a02324700df8c5ab3d645ae42a19d520d89836b980b870de7c8882255041d1f06707ed5d47f221adbaf2e287ab97ba3cb5d9490d36f3845ffe62ef0ab906bfbfc9100dfe603be735fc7f88d9e53295a9570e284ae0c3424e6ba843441d3af3140cd9ccc7db4719c76dbb9763e04d92326c4c145ecb9942218587283bc401c2d0e680b9e6bb2a93e46bb1d2c1e264792bed8086ad00934f75738dba149be36c13936376ed160bda5cde539358dd8efefbaf9049d7e6c589343d2e96e4435b637f71a4974d39ab2b6e5f5aa5c7cd2ae15c6f894cba4aa622691a88e4680dc83c0fead4c67fc2b1ecc9c120a83d128e16d248d1fe25895280c3290e999b5c0f896589dd75e15d615e63d38ecfe426405cca8d341880e156ec1992ef81dd2a91c6826801bc63e5881baba29b2ad888073de4ddc70953af8b5f9b1478d175d01bd3df0855dac981c30b64f1b5043811fcadbfb2ea9be32b2e9b98680ddaa16dc361e871bd71787a4eea68809eafe2d76f11d703c7d6b221eb78693479deec72e6dcc1449bcf4eb9404b899b0ff3235d4a2a5f3fabb5ab16d6a9bc1f2813b12f0e73bb667fb2cb9c323ad9c05424ea333a36a0de17ab78c4a257644b11b311825cfdceede818e449525de93fdd888f4221e5db340f17ab8e4aad72cee0933645c196c988989bef66f9ca08c1b78358bf84cf65ea1c9a79692bddf21877231126e38ba864a6f5a9179ae6277ea20c7dafad6970648527f8ee0aec368c0b844ae1e9f2dfabf19a4e2ba129f89b43aa7669b75cccfd6b3120523d4b8589b862384bba379733e4b21335ded9c532fa46e7a0add11655f8e06bd44793637aa89c971c13354de3d65aa8dcf0dad8fdc2f205bb43e33a80a776f130ea2d67f102c30023a85f78def1251ea54299335b160089832d23919a8ea806423da04aeb8a19ac291d0af4704daa15e6fe0ba63ca702f8e4c4b7cac98fc9928edf80a58103994124264e437aabde86c0dd6ac51fe374945e148e691b0246e37d8c73e37067194d9104f2cc5beef5d2d6212f1823a1a2759abfed834a0e469c82b56e3e967bcb1f3b2c9763c86109b1844388bb45abcf00a024de3b39ad7edb6fa0ce2456158650d9132cdb14fcd260a319794b9131d25275c2466268f8ace5f54d0a438180acb83ea5c647a1c4ebf4d23f060ca532f674c7618d8068310a3c65b6a103d4cb95a2f62a125af4cad93ecc32aa67f14a8cc3d779ddc382fb563bfec90a6dc77f9f1c9782c54c3c3d0b5c7a4b96cf021cda4c07618d3d40e844d5a904deadab2d8cd1a5560c2be7745729c94ea291ffefc32ba9d7dcbcde0b31d644829773b4174970bb46ad28873b0744e17947014331e670b135fe520b505e007238469e3efdcfe67a3ad5d204eb510024c9150ff2638a7797bc64317811990ca980de4e413653d1830e7a5303fcdae2cebd8f2f92ba66fe5972cc767a73dacd54dca7d4ccf9bd515c9df3cc235292c72ecd8a0d02dea5c871beee61ea2ba760ab508c482c246818130b8bcefa04e713dec056ccfa05d86b3c0e0ab1633c3d5420af311f83c9441c57520af1275ddb22d64cde20a5e0484550609a77e01bc3c848b968377376956eacca5888b51d4a81dd27c1a6b172f508d4f34ec3b76e5e5e99c5d12088645525063ff8c122f2fb7ab383ca10a8f2152d7f766d6124c7df2b705db11c3a9b86e03edf25bf9239b30dc61f5a9436a61c04b39e812ed0fd2d372e0ee039030731091911aedc44306f03430b6ba2b53f8752139dcc7061acf1933dc41300990c10b494a1b0d47f2227800ab4261af6442f38963bd844e2cc8f68c14f6211322bfc8a25a8b5472159fa9aabbea1c7b7418d1c66ea070fcf6a350f53a2b0fb751b2b36cd638b4a4fdffe7d82da69afe9ce9903d8008fd5dc40a06ac84cfeed48c6251497d471d3126dedc297a86a77cb52c9e541368d439fa5394bc3a57034362c3122587c3bae73b27c66e2c105f96946c80a30f22dc18161023fcfe86b43265d2a34ae9b3bef87a262319da0d177537ed91c8794c060f32d2f613154869edc3e940c5792d1612cfd05ac5d1bc5a367c75f5e591ca2a7bbe975b2d6d18d2213d5c2b38679eabd6bdb59a783c5dee356dd53396aa64eeec48905190721b917d041112da91fc9b3e4b9d6bbe1df5613f05c37ba8c715d8fdfb0f96c03a128da323fb4eb7e44635f80e91070e20950a642199badc023fac09880596cd3f25cdfc5862708573cbd0cfa206a5ad969b1a35f0093c3f23195035be9eba7fd6128abe63da01d11525392d2b6236f27587b90a7aec47e87644aec46ed3a419e3f7d377088a426833503b095316c67184eb27312dbf4a2e046de25da1b1327b76e09311ed25fdb16bcc027c66874e1ff26b46649ffc96643b84c9e2bc5f782e0cebf5540979b316f9186e7becf4f06ad0f752c7f2583e56cf109b27defc64e66c6533819fc350c29b2a557c5056b52da98773e9509de97a7d53ca22bca3af36d55e66648ab035a78636871e1c003b89cd2326109e56f90a41681ed7bc4e4471993fc90af773d7699b130f0c893bec08b5e365e804e44688aff72335dad213f7fc34354ae7322b5be6fff3ff107849d773f94111f4cd93ba623ac1fb9ecb3a71eed6a4baf70b42864a3061526836af65c247c1fef16753758e997355f621fe4bf8969aebca439ea273cac6c454187e6ff40063478fea40b118a44d21acb41c00ac849288f3e12c2066c902d05d9999601201ef300b7d537dba5929d6866d23d2efd14fd2c6e13603bb48c5f0b19878e2b4b458ba7097ddd68fcd5258df71a13ab1e43ab58b047db62a8a07c65f956a8106bc0bd7ee10665ff567426b9c7453a3a46dc9d9bbf3e8c33e2c4c4458efbd7943ecc39e522c88aef39c35b9e1121350d23700f9f9ef1c6227678aeeb81714263de3663570ed596923b59ecda3d459591198149344302cbe275bdde0fb755a5055da7993102ac8d5c0d5ec4c8f6208cbf31576453307a825b6fd790d88fa8958774005aa8e72a4199c232e5c520ef6d9785ffae5fa401f37bbc49171f70d302ee1030abc85851fa0d22fd44ed9fad5bd85c20cbbba006fc47ce973ff384251b2abb6ba828220104f49c70ec16f18097f72acb0430a0d5e78a2f3865548bd6fa96a98ebbacf1ed9ac585a1d24c465a26cda883b6144c2f00136bad6b57f95f32615e9156874d52282140cd7a9878200d171a9dde8fddbd1d21c07e3a8e2ea94461efac269c642681458081f0893c10dca653930cd18153371c7521812aee17cf44824fef3423835eb82c28f59db1cfd709b6164f608c1aff4937931ef1458f202d0857165312dba9a01e17e9a849aac2faebc4ef45355d25f1c47e3f84ccafbc5ef192604ac3c01e99dc5c5255bcd6c1288405b0d1e55dc3f2c9b2fa7984e07bcbcde47ffca30d8bf3edefa6c540b052c53164de1feb0d0f690d61ef4b713c259a6d6e3f1894dbac1ff4ee502ca62c440894061b19dd4a66a7fab1976f81e7ddbb734abb1aa5d82ed1216498c774709584ff584a60e6db14d772f2e614d42c5966d4ddfbb4b957418b583ec83698ba69faab862094990f5994b26dd353310f222e350d9d96641499c2b45de6a0616bd74275edd894b0c56136d1df8c0910cb3b28ebdf3b164e5fbc34f19bae794501c3ed882ea79f7bfee50658a98deef45ae042c973953167f11a56bd5d4ce63680ca660aa5f3d6919e0e8b65e35d77a4213e00c624aa110ebf4c5fb4201c50a601bddfce0032ff3b8ae394128b48d3c6ff3a9f5ee85cbea77cefff4cb58c37bf1971944d1718c3fe6eef00b1ccff5d1ae5b6af6ccb96e0cb78691cc7d129e56bfdfb57f2d2c26f9217371cf685c6dfd43cb4b909eeae02431ee328dae077b75fee7f62ba21a95f1b9953ea1a3984099a775ea5b4ab20a2b1e0e836d5b6df85c23004b6869f989cbab59f102297314c5cb3e4256654ae43969e03f6059f84c4d4c8064dfa393e3e6b4c9ec8fb19b272775b0181d13199c9824b8be7d7a42cd3643799e4aba2f388464e7228e15cf2a8d97763217edeb5f4f2a42025d4d341060f0172fadfa70373ef8413dad4f7ec7b8f7be2ba13304258fc13e38e0d566c998781c79294d2f52b6545dcc280364b0a6875453f2fbe34558399420fbd0729faa39d08f0b6ae48e8d9a7c527926aa7d2c7df4779ec636b2a9ea80f0e189a754908dcdfa1745c10cb3df1692d9b0755f595285bede9521c8530b1b0147949da83b6956538beb9c093600611addbd459fb97daba4d463a1e4c6ca78d41dac1fec4b9ed3c8f0a92ca0bafc14af597c40250c2e7cb7224c5b82d7867d593fe72c4d879a0bc782b826d8b8efc46fea79c0e05abb2837a97b554e4169a1dc02d94e027e20ddf01d91b9180a59623fdd9beb800ffbe9d6dc1a756ace087d9ca66a9938a6242720ea79f734e034c38d293a7277215312fa7087d3e68878847c838bb984de766be57a7ebc5f31e5e49b46e99607d64c3a9b272d0e8448b2179cd5d2eb0900c2b62ce6ed65db054699f9bb84af61d5483e0d1644be0afdaf3fd8384df51de529246511ee039fcc8ac3475f17511196a47dda6c61e6e1e8b8a501e4eb758fbf752082aed1c52570f1446c29fc11da082f035c3211a78681050065d63680c1814086f07645efd1cbb5ca83e0ed91f19aa6f9ca95ba073958419de12c7c1aa6d4dbe3ebd44e6354b44af83cb18c45298152e5ac567da85b0aa712520de1f536ef42b153e9c4014707e", 0x1000}, {&(0x7f0000000140)="b394acfabe43608dcdf9b4b8447a300474230d594311627f97fb6298f6f03e4767d96355e309ed07423e72186bfc3a1c7e29e147bbaab4265042e1ea2d10a9e8", 0x40, 0x9}, {&(0x7f0000001200)="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", 0x1000, 0x76}, {&(0x7f0000002200)="3d11792b71", 0x5, 0x9}, {&(0x7f0000002240)="5a1e4969093d12681ac581df054602eb9a71f5477b117f70745cd0902a9fcc6f2a5c19a9138edb690948b397a76aaab234342762c544e3aa99a6fe748c3207814dafc7a989b0e3ffd0e936d72374c62394a23d8cd546b32a9a4ec7b4cef65706e7668b846d3f90b4c8eb369bccbb0f510b83e0aed718a4f93e", 0x79, 0xfff}, {&(0x7f00000022c0)="e083f622dd502c08afabf1dca693815e1833a5002e3027c63af088b88644d3a5d2f6f7fdb2c96d8cb958e5ae0fac9ae85e36b9acbf2556741ca649c41a866fcfc4792af51e68f62d41b25b697b3de3382c884ba6a7b45f827cfdd5dcb026450a78c540ee89b592eb3322131f93f638394cd5a86232f4100f71e1784d7e09330f99790d5bda75992c311929c686aad30746c2", 0x92, 0x4}, {&(0x7f0000002380)="c14d70a166afd096f088cb8db58691030e37a91ba424e5b7d0b05fdfc6471b587ddc4af926c9ee94f064781adce963845811484577042005ce7fbfb58f003c0f87b1904778455af71816e0f75e912f370a37b02bf6ebd308678cff515f517446", 0x60, 0x4}, {&(0x7f0000002400)="010d57d959815d7cf091f1188b3c3a5b17d316ced0b03bb966b29db56455625b6752caf3932b75af3e8681866f416b79a1ea9dff976c29cdb8b92306048b009aad608689", 0x44, 0x9}], 0x1000000, &(0x7f00000026c0)={[{@nodots='nodots'}, {@fat=@debug='debug'}, {@nodots='nodots'}, {@dots='dots'}, {@fat=@check_relaxed='check=relaxed'}, {@fat=@debug='debug'}], [{@smackfsdef={'smackfsdef', 0x3d, ']eth1{'}}, {@fowner_lt={'fowner<', r3}}]}) 11:23:23 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) 11:23:23 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @in6={0xa, 0x4e21, 0x89, @mcast1, 0x9}}}, 0x90) 11:23:23 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba0a3573756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:23 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0x0, {0x8, 0x8, 0x9, 0x613f082}}) 11:23:23 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) rmdir(&(0x7f00000002c0)='./file0\x00') epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000000c0)={0x4}) close(r1) 11:23:23 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) 11:23:23 executing program 1: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f00000001c0)={0x0, {0x8, 0x8, 0x9, 0x613f082}}) [ 992.240829][T23142] JFS: Cannot determine volume size [ 992.257263][T23142] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:23 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f00000000c0)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:23 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) sched_setscheduler(r2, 0x0, &(0x7f0000000100)=0x80) close(r1) [ 992.379680][T23142] JFS: Cannot determine volume size 11:23:23 executing program 1: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f00000001c0)={0x0, {0x8, 0x8, 0x9, 0x613f082}}) 11:23:23 executing program 4: r0 = userfaultfd(0x80000) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) signalfd(r0, &(0x7f0000000000)={0x21f}, 0x8) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) getpid() [ 992.408410][T23142] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:23 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x200101, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000000100)=0x10) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f0000000140)={0x3, 0x1, [0x7fff, 0x930, 0x2, 0x61, 0x8, 0x4, 0x9, 0x4]}) 11:23:23 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba183573756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:23 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x1, 0x4) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000a40)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000600)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x0, {0xa, 0x4e21, 0x709, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}, r3}}, 0x38) 11:23:23 executing program 1: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(0xffffffffffffffff, 0x4014563c, &(0x7f00000001c0)={0x0, {0x8, 0x8, 0x9, 0x613f082}}) 11:23:23 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7ee0, 0x101880) ioctl$RTC_UIE_ON(r1, 0x7003) [ 992.637677][T23531] JFS: Cannot determine volume size 11:23:23 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) close(r0) 11:23:23 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, 0x0) 11:23:23 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000200)={0x1, {0x0, 0xffffff71, 0x0, 0x400000}}, 0x68) [ 992.668661][T23531] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:23 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000000)={0x1, {0x0, 0x74, 0x0, 0x0, 0x3}}, 0x68) 11:23:23 executing program 4: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x1) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) 11:23:23 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, 0x0) [ 992.774251][T23531] JFS: Cannot determine volume size [ 992.779450][T23531] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:23 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000040)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:23 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) 11:23:23 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba253573756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:23 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x10000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e24, 0x56, @loopback, 0x3}], 0x1c) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:23 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, 0x0) 11:23:24 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x54203, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) close(r1) r2 = fcntl$getown(r1, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_generic(r0, &(0x7f00000008c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x804000}, 0xc, &(0x7f0000000880)={&(0x7f0000000900)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="95c68b49e52292544de85e6270a13a301487138fc19fe754096d16d9b0b887cc0fbf561ff07dce941bdd103006fe39db5370a3f9cb528b1f74a8cdafc593b52415c11e0ef3c30800750000000009c403410008005300ac1414aad3a86d4793d89a76a15345724bda8af445c5b321a962248908003800", @ANYRES32=r3, @ANYBLOB="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"], 0x664}, 0x1, 0x0, 0x0, 0x4001}, 0x40) [ 992.996533][T23781] JFS: Cannot determine volume size 11:23:24 executing program 0: accept(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f00000000c0)=0x80) bind$rds(r0, &(0x7f0000000100)={0x2, 0x4e23, @remote}, 0x10) prctl$PR_SET_UNALIGN(0x6, 0x2) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$vnet(r1, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) signalfd4(r1, &(0x7f0000000200)={0x6166}, 0x8, 0x800) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000240)) 11:23:24 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = accept$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @default}, [@default, @null, @rose, @rose, @netrom, @null, @rose, @rose]}, &(0x7f00000000c0)=0x48) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000100), 0x4) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:24 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x1, 0x12) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000240)=0xfffffffffffffd76) ptrace$getenv(0x4201, r1, 0x30, &(0x7f0000000280)) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000100)) 11:23:24 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0x0, {0x0, 0x8, 0x9, 0x613f082}}) [ 993.045809][T23781] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:24 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0x0, {0x0, 0x0, 0x9, 0x613f082}}) 11:23:24 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080), 0x4) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x99) write$vnet(r0, &(0x7f00000000c0)={0x1, {0x0, 0xffffffffffffff09, 0x0, 0x0, 0x2}}, 0xffffffc8) [ 993.144349][T23781] JFS: Cannot determine volume size [ 993.164315][T23781] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:24 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000080)) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:24 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x7, 0x40000000008, [], 0x0}) 11:23:24 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba2e3573756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000300), &(0x7f0000000340)=0x4) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x100, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400000, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x5, 0x800) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000440)=""/4096, &(0x7f0000001440)=0x1000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) r5 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x401, 0x30000) r6 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x80, 0x18) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x20000, 0x0) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000014c0)=ANY=[@ANYBLOB="90000000", @ANYRES16=r1, @ANYBLOB="000226bd7000fedbdf25010000000c00020002000000000000000c000300ffff0000000000000c000800ff7fffffffffffff0c00050024000000000000000c00050004000000000000000c00060003000000000000003400070008000100", @ANYRES32=r2, @ANYBLOB="05e9ab99000100aa236171430a010a5e459c5676eb61a402acd2a29d7a603166837fdd4f9693945c91381fbe191f37b230623eaaa920cec4544cdf8ec80587f14fbebe5befd5a1ac34b27e6d8f71aa812a1d110f6d0a66316e855c0f255ac19e70a1dcc554d14df44bc7f87d3cee55850877420dac68c74d4fdea3df56eab4ed018c43d09adc89095ca420b22b39d36f98c965080586a11c9cd6245be854ab41abfc0bcdf3a8c95b09c2f21505a81870395fbd2f8f1b98c58bc85f444d1ea682976e732c0764b62e2fd4ff9928a2ea5ac0d1c9d12f102eba9cf3692d", @ANYRES32=r3, @ANYBLOB="e193f157", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7], 0x90}, 0x1, 0x0, 0x0, 0x4}, 0x4000011) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$ION_IOC_ALLOC(r8, 0xc0184900, &(0x7f0000000040)={0xfffffffffffff0bc, 0x10, 0x1, r8}) signalfd(r2, &(0x7f0000001480)={0x1}, 0x8) close(r9) 11:23:24 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)={0x0, {0x0, 0x0, 0x0, 0x613f082}}) 11:23:24 executing program 0: lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) 11:23:24 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:24 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000040)) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) [ 993.465103][T24166] JFS: Cannot determine volume size 11:23:24 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)) 11:23:24 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x400000000003}}, 0x68) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x180, 0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0x2, &(0x7f00000000c0)="eba51916e19aedfbe8a684a12adea11e1c72310f064251497f83c2ecd73692ba0a613bea0835b51c525d7c60c3a157f837b325741210a18c2b7dd99819d94b707d7f18de8d15198320b2ba08934a85fe25bac5ec1f6dca2f96daf99c9f6358afeaeba4e4c15c180c4a1acea8b4daf30250ed4fc779c11af6025f73dc6531ef6b5dda985a9eeb4c3cc800b4493965534b24d0735134720e37", 0x98) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000500)=0xe8) sendto$packet(r1, &(0x7f0000000080)="1cbd77", 0x3, 0x4000, &(0x7f0000000540)={0x11, 0xf5, r2, 0x1, 0x1, 0x6, @dev={[], 0xa}}, 0x14) 11:23:24 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) close(r1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x800000000000018c, [0x1, 0xe387, 0x91, 0x5, 0x20006]}, &(0x7f00000000c0)=0xffffffb3) 11:23:24 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) [ 993.561060][T24166] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:24 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) 11:23:24 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f00000001c0)) [ 993.683820][T24166] JFS: Cannot determine volume size [ 993.689042][T24166] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:24 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba2f3573756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:24 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:24 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) fstat(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100)={0x5, [0x80000000, 0x9, 0x100000000, 0x3, 0x401]}, &(0x7f0000000140)=0x3) write$vnet(r2, &(0x7f0000000200)={0x1, {0x0, 0x887da15a3aeb5196, 0x0, 0x400000000000, 0x3}}, 0x68) 11:23:24 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x780, 0x141600) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0x7, 0x4d, 0x2}, 0x7) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) write$UHID_DESTROY(r1, &(0x7f0000000000), 0x4) 11:23:24 executing program 1: accept(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f00000000c0)=0x80) bind$rds(r0, &(0x7f0000000100)={0x2, 0x4e23, @remote}, 0x10) prctl$PR_SET_UNALIGN(0x6, 0x2) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$vnet(r1, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) signalfd4(r1, &(0x7f0000000200)={0x6166}, 0x8, 0x800) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000240)) 11:23:24 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) close(r1) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000040)=""/59) 11:23:25 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000000)) 11:23:25 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x9) ioctl$SIOCRSGL2CALL(r1, 0x89e5, &(0x7f0000000080)=@null) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) [ 994.026089][T24433] JFS: Cannot determine volume size 11:23:25 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) rmdir(&(0x7f00000002c0)='./file0\x00') epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000000c0)={0x4}) close(r1) [ 994.051769][T24433] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:25 executing program 0: write$vnet(0xffffffffffffffff, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:25 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) rmdir(&(0x7f00000002c0)='./file0\x00') epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000000c0)={0x4}) close(r1) 11:23:25 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000000)={0x0, @reserved}) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) [ 994.170960][T24433] JFS: Cannot determine volume size [ 994.180076][T24433] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:25 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) rmdir(&(0x7f00000002c0)='./file0\x00') epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000000c0)={0x4}) close(r1) 11:23:25 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba640a73756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:25 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket(0x0, 0x80000, 0x8) accept4$x25(r1, 0x0, &(0x7f0000000040), 0x80000) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:25 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7, 0x1) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000080)={0x18, 0x5, 0xb62}) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0x68) [ 994.378677][T24651] JFS: Cannot determine volume size 11:23:25 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) r1 = dup2(r0, r0) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000000)) 11:23:25 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) rmdir(&(0x7f00000002c0)='./file0\x00') epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000000c0)={0x4}) close(r1) [ 994.454348][T24651] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:25 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x109000, 0x0) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000080)) 11:23:25 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) rmdir(&(0x7f00000002c0)='./file0\x00') epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000000c0)={0x4}) close(r1) [ 994.569089][T24651] JFS: Cannot determine volume size 11:23:25 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/connector\x00') recvmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000040)=@l2, 0x80, &(0x7f0000001740)=[{&(0x7f00000000c0)=""/30, 0x1e}, {&(0x7f0000000240)=""/138, 0x8a}, {&(0x7f0000000300)=""/181, 0xb5}, {&(0x7f00000003c0)=""/227, 0xe3}, {&(0x7f00000004c0)=""/185, 0xb9}, {&(0x7f0000000100)=""/116, 0x74}, {&(0x7f0000000580)=""/213, 0xd5}, {&(0x7f0000000680)=""/186, 0xba}, {&(0x7f0000000740)=""/4096, 0x1000}], 0x9, &(0x7f0000001800)=""/124, 0x7c}, 0x1) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x5, [], 0x0}) 11:23:25 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x84, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1b, 0x80000001, 0x3, 0x666, 0x7, r1, 0xc0}, 0x2c) [ 994.590687][T24651] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:25 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000000)={0x7, "74effd364e48c140739d8fcd4f367b7dc1541978d5ca92f96f155c1af640a161", 0x2, 0x0, 0x8, 0xc000c, 0x6}) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) 11:23:25 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba642373756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:25 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) rmdir(&(0x7f00000002c0)='./file0\x00') epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000000c0)={0x4}) close(r1) 11:23:25 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000200)=""/4096) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x3, 0x2}}, 0x68) 11:23:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80000, 0x80) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000080)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r1, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) r2 = semget$private(0x0, 0x0, 0x8) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f00000000c0)=""/158) 11:23:25 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) rmdir(&(0x7f00000002c0)='./file0\x00') close(r1) 11:23:25 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000000)) 11:23:25 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000100)={r1, 0x100}) setsockopt$llc_int(r1, 0x10c, 0x7, &(0x7f00000000c0)=0x4, 0x4) [ 994.866061][T24995] JFS: Cannot determine volume size [ 994.871286][T24995] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:25 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) getrandom(&(0x7f0000000140)=""/110, 0x6e, 0x3) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f00000001c0)={0x3de, 0xf95}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000100)=0x400, 0x4) write$vnet(r0, &(0x7f0000000040)={0x1, {0x0, 0x0, 0x0}}, 0x68) dup3(r1, r0, 0x80000) 11:23:25 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000000)={0x7, "74effd364e48c140739d8fcd4f367b7dc1541978d5ca92f96f155c1af640a161", 0x2, 0x0, 0x8, 0xc000c, 0x6}) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) 11:23:26 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) close(r1) [ 995.001004][T24995] JFS: Cannot determine volume size [ 995.014864][T24995] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:26 executing program 4: ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) 11:23:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba642b73756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:26 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000080)={0x3d74, 0x9, 0x1, 0x401, 0xf6, 0x410e5f98}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r1, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000100)=0x2, 0x4) 11:23:26 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0xb2003, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={r2, 0x7fffffff}, &(0x7f0000000140)=0x8) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:26 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000000)={0x7, "74effd364e48c140739d8fcd4f367b7dc1541978d5ca92f96f155c1af640a161", 0x2, 0x0, 0x8, 0xc000c, 0x6}) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) 11:23:26 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) close(r1) [ 995.237874][T25252] JFS: Cannot determine volume size 11:23:26 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x202, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000040)=""/98) [ 995.273363][T25252] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:26 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) r1 = pkey_alloc(0x0, 0x2) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10) pkey_free(r1) write$vnet(r0, &(0x7f0000000040)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:26 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) r1 = dup3(r0, r0, 0x80000) recvfrom$inet6(r1, &(0x7f0000000200)=""/179, 0xb3, 0x40010001, &(0x7f0000000140)={0xa, 0x4e24, 0x5, @empty, 0x101}, 0x1c) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x20, 0x400) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e4) 11:23:26 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) close(r1) 11:23:26 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:26 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x8f0000, 0x5, 0xfffffffffffffffd, [], 0x0}) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x102, 0x1, {0x6, 0x7fffffff, 0x4, 0x7}}) pivot_root(&(0x7f0000000040)='.\x00', &(0x7f00000000c0)='./file0\x00') [ 995.370891][T25252] JFS: Cannot determine volume size [ 995.384924][T25252] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:26 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0xfffffc44, 0x0, 0x1}}, 0x68) 11:23:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba642d73756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:26 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) close(r1) 11:23:26 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) init_module(&(0x7f00000000c0)='\x00', 0x1, &(0x7f0000000100)='/dev/vhost-net\x00') write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x12000, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000080)={0x1, r1}) [ 995.570141][T25467] JFS: Cannot determine volume size 11:23:26 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) [ 995.593622][T25467] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:26 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0004, 0x5, 0x0, [], 0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20000, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000040)="92d4f41e9ce3d8fe44033700fbab37b874b01b5146f1b0c8ff570357ca745178ee8eb9eae172d9a45c50a5f504935869baabae764990695ec852927e7d8357e648ff7268e55da14e3c25811af03138e9696d5fcd186f307106c585d8a3bf4882eff83b0ee3ab7727a936b401422a890ae7c5767188094dc982647e187b2904ddff5f2d8be2fd08ad758cd3affd30ce0649d49f1e2b4782a3f8d6fe7ef7e2e91b3926") [ 995.648307][T25467] JFS: Cannot determine volume size 11:23:26 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x5, 0x30202) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000140)={0x4, 0x0, [], {0x0, @bt={0x100000001, 0x6, 0x0, 0x3, 0x0, 0x7ff, 0xa3c7, 0x0, 0x4, 0x80000001, 0x2, 0x0, 0x5, 0x2, 0x4, 0x10}}}) ioctl$KDDELIO(r1, 0x4b35, 0x92) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x101880, 0x0) write$vnet(r0, &(0x7f00000000c0)={0x1, {0x0, 0x0, 0x0}}, 0xfffffffffffffef2) [ 995.669607][T25467] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:26 executing program 3: syz_execute_func(&(0x7f0000000040)="6764660f38dd5e28c4a18a2ab55400000040d9e0c4e27d78ffc4a3d57d7db200c4e1f95adb8f8928019100008020c4817b2d672245c6f80f480fc74b1b") write$vnet(0xffffffffffffffff, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) 11:23:26 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) close(r1) 11:23:26 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f0000000300)='/dev/vhost-net\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) getresgid(&(0x7f0000000400)=0x0, &(0x7f0000000440), &(0x7f0000000480)) r6 = getpgid(0xffffffffffffffff) r7 = getuid() getresgid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000540)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={0x0}, &(0x7f00000005c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0}, &(0x7f0000000640)=0xc) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000009c0)=0x0) r13 = geteuid() r14 = getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000f80)={0x0, 0xffffffffffffffff, 0x0, 0xf, &(0x7f0000000f40)='/dev/vhost-net\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0}) r17 = getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001080)=0x0) fstat(r1, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000100)="c49238f50e7375a012919a55df209a72cadd39480cbd01958b12596d8c", 0x1d}, {&(0x7f0000000200)="178e7c6ef92645e861a8a0799083c24f60a15af0630e16566b25a582eebfb11e2f724dbb6cd7839c1d51ba0d984d16566b2d77af9f38ddbcaabd7d99b6c7499376564aa01088986154a9114f1aa51e7a09f6e429125500439639a7312d9288a827133c7e4316882091a5c8798034ec221adb7ec97d7fc51e4387ac05cf71a4961519e9db697247ea2bbeb5effca7b6a2b2d9ade4dec693b107d5ce70b50d76befa1e353568ca8f2ba1b0d6a1f5927b6efae092c9404facea4f672566e0f29c07cf1597c8182acfd64e", 0xc9}], 0x2, &(0x7f0000000740)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @rights={0x18, 0x1, 0x1, [r1, r0]}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @rights={0x18, 0x1, 0x1, [r1, r1]}, @rights={0x18, 0x1, 0x1, [r1]}], 0xa8, 0x5}, {&(0x7f0000000800)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000880)="53d09d5a2e81491d15cc87beb19325581bcbc7f93bf971056cdb713fcaacbb939ae9246f489b32668665a9c796c02d753beca5a42fa321acad37d155032c2c1f5957f6b5a0f8b6f91a75af945a21e6f3800a525e616e432ccbd9b0c05171823c8ed0ef0f0049106287d93c24ae4f880740d19298da9ea7972c76f154f99036a2a93639a0c4e9d8e3047d674673", 0x8d}, {&(0x7f0000000940)="cc2d951404b5fe3a565da5374f0f7ee3c06117d7cc8e7f5a34fab8fdd64cde4dea936a245f10661b5fbf56c410d368a4b74e", 0x32}], 0x2, &(0x7f0000000a00)=[@cred={0x20, 0x1, 0x2, r12, r13, r14}], 0x20, 0x40}, {&(0x7f0000000a40)=@abs={0x1, 0x0, 0x3}, 0x6e, &(0x7f0000000ec0)=[{&(0x7f0000000ac0)="5509df4ac08369db0f45fb70034174076e60c52dfb75195c1b8dc2dcb372f74b9190607480f12c40a053d6774a3e15b5a8d0f5a2892c2b4d62fad1e906169c1fe8d41022302326604d877708b143ef443f2bba0e01e1e2a41ed24b99624edadfb34eb63db0af57c587b36f9ca81e8edda484cc4d5c7e7839d2a56e5fa9ac6dd97dc9d580cb60e9297ec02d9e55ea7b744411ef815734a643f537ed445c10e784a2b06b950b5236b62906e6f0c74bca4a6c7f8d66f70e7cd944a2f952ba42aaa00cdd2c458461dd64b63f7a54baa901ec773a36f2ada0380764", 0xd9}, {&(0x7f0000000bc0)="88bb864b9652bc6b4e323c3a9e427a059e836d97568963f1a36d178d11838a16ab1ae4a09af551124d1c619ad050743c593024359e61c093a75f8df474c3b9f7438419c0a9b4d3e7c8b043b1871261caf1ec029a15ecd485d4332ba9c4803feceb0499946acb6e942bb5a274c1870564ed965fe8fd9d0981329ea6b9d0f47329004ab829c484c58787e36ceca5ab251c36bc7c5c29d16382c56e60eaebe0ce3b63a15a874fa9f1a7be9c4825f4653f588319f5090be34f3b2a93f7a956f4fc1a44fa191f96f0be2653ac37d3701590443b12b0e03b9ccae1449fac579c1c86f14326ac398d994b6616b760ed5b", 0xed}, {&(0x7f0000000cc0)="42c942f3b06e650581a8102cedbe804be65383a0940e66ace3019ac83d060b5127297f6f247a5639d395a636aad00ea79bb387229590e0c197dbbc270bf543eb2d82e7731ff5294bca4bf3ae791d3b08a77e8f349cb9c17fe96b6f605d197b08b044fdebd49f16bf2f2b8ab95f65dcb1fe51dae2ee56647821c7becb9f647ff09597b20286958f1dc45037f8ded01fdad42a6fb4f1dce8c9059c7ab5fecc64766a7551268a8ab2c1fda14088796888d88e2e070eec8945e374f1af013dc258197a79560258444c7ad4ea", 0xca}, {&(0x7f0000000dc0)="c64f466f1f38ddde1c06805f51f44431cefdad5d343f594a50febf08365156", 0x1f}, {&(0x7f0000000e00)="f39215f2632ef1da7b909b65340b0bb82e0fd10350be5ae6a7e58ff13293cae0da76b0a2c0bc85ef31656bd18fed1b5dd63562c7c7b18390bee089458fff2b4b68610eae221f8f0f628b094bcf3c91c1d6f265fdf4a223f6d7cf13b401c90548fd2ed723f3504b3aadada8b0aaedf372f6b1a96b076fd2ac6e202172d4c2780603c33690943e900a65f16c6528fbd96b7b356be9306c514807e63854d04e297b2b0b79374df7d8a7dd3a26eb074953", 0xaf}], 0x5, &(0x7f0000001240)=[@cred={0x20, 0x1, 0x2, r15, r16, r17}, @rights={0x18, 0x1, 0x1, [r1, r1]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r1, r0]}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x18, 0x1, 0x1, [r1]}], 0x98}], 0x3, 0x40800) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000005980)=0x10) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643073756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:26 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:26 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2002, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) [ 995.908722][T25605] JFS: Cannot determine volume size 11:23:26 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:26 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:27 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000080)={0x1, {0x0, 0xfffffffffffffced, 0x0, 0x0, 0x4}}, 0x68) [ 995.943636][T25605] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:27 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) [ 996.002556][T25605] JFS: Cannot determine volume size [ 996.012596][T25605] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:27 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x8000, 0x0) bind$pptp(r1, &(0x7f00000000c0)={0x18, 0x2, {0x2, @loopback}}, 0x1e) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000080)={0x8, 0x1ff, 0x7fff, 0xffff, 0xc1, 0x7}) 11:23:27 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643973756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:27 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) close(r1) 11:23:27 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:27 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0xd7, 0x0, 0x0, 0x2}}, 0x68) 11:23:27 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:27 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4000, 0xa) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x7, 0xfffffffffffffffd, 0x3, 0x421, 0x3}, 0x14) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x4, 0x10000) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000000)) [ 996.302456][T25839] JFS: Cannot determine volume size 11:23:27 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:27 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) [ 996.332651][T25839] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:27 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) [ 996.402263][T25839] JFS: Cannot determine volume size 11:23:27 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) close(r1) 11:23:27 executing program 3: openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) [ 996.455940][T25839] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:27 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:27 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7fff, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x3, 0x2) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r1, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:27 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba645373756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:27 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/165) 11:23:27 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r1, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) 11:23:27 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) close(r1) 11:23:27 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) [ 996.722453][T26012] JFS: Cannot determine volume size 11:23:27 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1a}}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @remote}, 0x41, 0x0, 0x0, 0x0, 0x80000000, &(0x7f0000000040)='syz_tun\x00', 0xbce8, 0x2}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000500)={0x53, 0x6f4, 0x0, 0xa3}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000440)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r2}) r3 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x800, 0x800) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x10000, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000280), &(0x7f0000000540)=0x4) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000580)={0x8, 0x0, 0x8, 0x0, r3}) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f00000004c0)={0x9e0000, 0x8000, 0x4, [], &(0x7f0000000480)={0x9b090b, 0x5, [], @value64=0x8}}) write$vnet(r1, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000002c0)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x180, 0x0) 11:23:27 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) dup(r0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:27 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r1, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) 11:23:27 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) [ 996.801187][T26012] jfs: Unrecognized mount option "obj_role=" or missing value [ 996.877404][T26012] JFS: Cannot determine volume size 11:23:27 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:27 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x1, 0x80) syz_execute_func(&(0x7f00000000c0)="0f73d7d1c42189e26e4fc4027918232e66470f380ba100000080650fae0e660f3a0a0f9f660f5525000000006ef3f0408194e2f5ffffff27000000c4e2c5409203000000") ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000080)={0x6, 0xffffffff00000000}) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) [ 996.914620][T26012] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:28 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40000, 0x8) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000200)={[], 0xdb5, 0x400, 0x6, 0x0, 0xfffffffffffffffb, 0x3002, 0xd000, [], 0x2}) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:watchdog_device_t:s0\x00', 0x27, 0x0) 11:23:28 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba64350a756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:28 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:28 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r1, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) 11:23:28 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:28 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x10080, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x68, r2, 0x900, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x7, @link='syz0\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 11:23:28 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0xfffffffffffffdc6) 11:23:28 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:28 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x1}}, 0x68) 11:23:28 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) 11:23:28 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:28 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) fsync(r0) [ 997.270686][T26396] JFS: Cannot determine volume size [ 997.276001][T26396] jfs: Unrecognized mount option "obj_role=" or missing value [ 997.381933][T26396] JFS: Cannot determine volume size [ 997.398231][T26396] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:28 executing program 0: syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xdff, 0x840) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x80, 0x400) 11:23:28 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643523756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:28 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:28 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) 11:23:28 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) close(r1) 11:23:28 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xf4e8, 0x800) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x10002, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x0, r1}) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r2, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000200)=""/245, 0xfffffffffffffffe) 11:23:28 executing program 3: write$vnet(0xffffffffffffffff, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, 0x68) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000040)=0x7ff) [ 997.634239][T26563] JFS: Cannot determine volume size [ 997.653454][T26563] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:28 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:28 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) 11:23:28 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x141000) write$vnet(r1, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:28 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643525756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:28 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) close(r1) 11:23:28 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:28 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:28 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1c080, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x13c4, 0xd, 0x0, 0x2, 0x70bd26, 0x25dfdbfc, {0x7, 0x0, 0x5}, [@nested={0x74, 0x42, [@generic="2aea57d9f8338670ddedd7b1de356372ae59de84692b02c02af55d758d0993547d0f9b5db557c88f50e1e51e0b26f5a6b313d631efb8534993dd8f057eef9ec85abab540fe99", @typed={0x14, 0x15, @ipv6=@loopback}, @typed={0x8, 0x61, @uid=r2}, @generic="8f7b7efeeb67560e2e95bb"]}, @nested={0x12a0, 0x39, [@typed={0x8, 0x7, @u32=0xb67}, @generic="9c041c0b7fb41bb55ade95160df7869c5d238aaee10f33d7f214880024ad33edc86ac763bb5073e1224ab282034062ee9b82da56dc3a768d2125b341c153387871f0ec826e447d969bd64958c681989bf20701", @typed={0x88, 0x7d, @binary="e25dd502371bc07bdb36b9b1e9c3e5e000c2783e0ab714375a9dff9e1c49dd1f128aa1e816e181e7ff0bccb9f37ba850eaf7bd4dbfcf12ae1a2504c06b4f308698684f91105af3c98441416841b8931037b77edac3838a90426a013db676a809348a1979b13111fa3d9b6dd54df5e7b287c13ec88bfee724e57953ac251d317c4f3d"}, @generic="20fbbacb00131bd88e0ce3b3dc0d2bcfa25a00294260ea717b77de337edd237cd9abb01fc249ee5513c91cac89d601505b1adfe0fe49b3addc62fe24166ddf4e9993521e8b86d3723107c6d0cd449ba0e17432d34fbbd6e371015c70a01c4fa795f3df960fcc08984c039b14d9259f35c42c890a15a78d1f0c5c0b52ce90649e6a1231e94864df4d54544c1e035b9ecde5c24b523afe0345daee13208ef5f2f45c936d62f0ffb73ba9f908738c02edd37a01cd51a7312563d6e22f8200c777184a864b47d6649e7a492219a56a730d175b218a87e6df1238993469", @generic="a1820027d9d76c545817afa92f791177f02a8f66746decf44c5ab620e973b2b69c3e19077b786289ef09da74fa0ca01e07fae647f0607f14ea4cc8475f2d46b99d304e92f8c883fc162b6f14500c35ca152cc4dc5e1e8cc5d390ac8626c637440ea200ce4a1b3e1d9962d7b9a5e30bd4cc1bda5c195dae0705d15d985ed5fe6200359c377d635597cefccca2818783771f62db116f6280eff4dc6cb65232687529bc4144e1a4bf70852336195391ee2bb3ef4c4b2164c03b78684e78017f0cccc56531a013bf345c48b5c7de2f760e2977cd4b38cde4f011256b7c6b4c41ecfdf2da55e9454ae742086fbb9c64c71ef3ce7890f4ee2f0962b1d82acc05767a6cab28d8d7fcc14097c8d51e7a352be98d185896388277d70a71a2f5cebbb91bfa8dd1ab77667f39a5e8c702070be13000766b51c822a07d23f43f3a600d625b322f62eeb0cb31a2e756a3e0d97e17ab207c21bbdfd462c9c1b38cd47948db25ae7c463dbf1af98b6212c8775f0ee70500d00d8a24b3c46fea42b6945409e305e7afec1794271a71cae094de414b3ae32a32a38f9c60bfc340084973abd6ff64a7f3f90e8c3031ac6f4507a58962db0969c685d62024dfed731d6285343e69fece7a4c839f69acea93adaa701549cfc4a76ca6da6473627a0b3fb9b7234ecf925ed10cc02acfdcb1f8a9716f187f26668b33b606dff35bf2756214ccc7ee32578292388ac1dd3794e8b0052c77eb09d2193a90ea242936bf44dda3c4329ac320dc8274ec049b73768f451b9bfe4247bb08cd08d378c80eb05f09beaa318a0ca8a718c1f29c0ff9051c9d3e61540677d668498a837837b211b420efd74a4acd254da37d4995b741b722d8623503f25a5216d90badb12c06eed8bcc9e961d2c19ea13ee914059d164d5ff41d2b8e61a9010de1963307f5a62f5b16a8db3e6e92f4805b80358865e3bcd96b785dc4b70bca7ad3b8d56caabdf780fff18ecb509a1f170cc653203c62fc87d6f51c2b17493dcbea54a89cfc18b3f0650b42cfea4731c4dd09de57c8c9fa49070b5b38abd147b2c0ad1e2f8d4fcca5d51627c14be79b904774fae883b3cc7898982e1f58dd5e0a72df83ac259e720d51ff7e2ef6f7d5977f6c30fee35d9207faa581f3a9a9ed98aacdadb9e88b849cfac286e83f2f45aee223f118c3b051b8cfc55b0ff9a8ff7620a9b5e0cc185cb6f4c80b67cb81e4819122617f39784ad9893f690c76345b3da639b5cb0c8e4b29c4cd31f1bd0d54e0e88483143166acd69fbed0f54202c1140c90b237a51b3a429e2e7d38f1bcdb3170d046fe39978e85fef78259551ab371a2175f0aeb2ea46f663ff1a69fddba46c11178f066361f0a4876509cb3559af02496eb07e5ac4d3f3d6a4a260e1d31edb701e8cfb76de29384434d8e0ace7264676da63e178b0903937ab731380f783babcf394e613abe11ac7a9f8a9c545161151e951fc87127e9da1ecc6c8957abd856f57eed58103220b7c214c7febb9f423e59d0a4605e69d2c1b1c8cfc33b08bea56bf87c969a842e0d69da060ea5ba7964e903e574b525b3cd9b8c4942502b91aeab6a921760010cbc213ff7709d9a1f117c468bb6f8bd277c4d7204d09611deb2923d513e831e91445fcb7439791522e9bbfc4c23e2c5b5954af05a01eaaadad5fe2dc131aa37d781008383b0c72525bbf3487eb04a4bae75d641cc277a6756eeebac174ba2507dd29b43e400f2f393526fc3a5f6540edbd331d8225d51f6d9d9399b891e330c415c69f9abcf102b1383ea08de75e6c9f93c5f81bc20ff4ecee49df60b22d365757bf03f6e3d028a4cf4813be40b59babe033a46ef25bc6c5e28693fd282c5f8fedff649e4b5c722952dfe917a050c00972cf991ff0f2f807d4c1cb1986e5ba770de1dea73a10aeec96cc39b86cc623f5944352b25eea93602ed5fd18699402ebe4bfbbae427a05b9d7032578f318a6d520b3b5036ef4534198b427a2ae94800b7ccfd411badbe2fbbac5f4b26dcc31f1854ca470aa37e27f846dad4c0fc749a947bf05ae9020060ca838bdff9d98d612ca08c674f049549b6481d7382f6fa23d5eedfe2b70183b80e90a4b7b8a597cb154a048d01f155d2db18d584f40ba32bae9aa4261a251f66036a8c7141a45875aa70daa1ea67ab419be3c9e94175036cc8f0bfb9d6d6d370f0e544a7e13ac743cbb56d97de4bf8494c5d6c71a21b2a63023454d7f944c0ac91f41371247ecf043668291c5702e6b4d99616ce49e8e8a085db79879ccd8293e8ebf25bc824785e3aeb954f23831a459998a511fcc08b74ebd4e4c0c77a3f0b4b21827e99f8c12a09dc1867433cd379b292ee1fb0a063aa241520034ef18e8873735ce6db88521bc16995cd0457b57dd427a4dce2c061f22c822ed056b05ef78ce249c048762228682f073a9c3a2d910f76ed1ef65ada9a1e4ee083d8ec9fb45a328ea9297bb322a02260e3b34e12616aa0cdf6f63cc32810741678c67a0778bb971522a8d6d159c0f98bfe2705cff93c01974da2ecdc30f6abf35e52b18dd1fd8f2b489a8bc1b2e29e328ce0513e2a5fdc925bf2848b441667f85197d13f8b9cbc201268f7290637340d76344a3b9986cb909d8f578a10619f61d4ec682dfa38c49ff44330b1e1dde45c35a89b1c507885e1fe7d9c8aedd92b2a048c260e663a1ad48a1c567a4977261ad3e584e69d33b56055015ef0bf090026fd1c0a5e68a6b1246925bca0fbd71ea71f137e720cd48f24f4553630c2f9df53096f0e457ee997c22ba84400ba3762ad54beffe661e5ebb3d05a89a4e07463eaec613d96ca0241cd7d4f80c72da55a9e16721d21b83f9dadb992727b6bef9d637b91717dce0dcaecf4d2ba5bdc7cdabc201b45a200bf966bd51e1c7165d4b053740128669a7dc7e09127304e09d182134262e7fa43191a02ae3e95af96a0c181e98d63094cba04934b018950a08f1af5fa42eda31ba37140151d0b22d8a1db5b289c53b13e04123cd141e8cc35803b414c3c98a9c9dd02aee06a479c7ad19c9e330c7c0b0d36bd2dc23945df56a246c2094f846f5bc3a68b76a547b97c7ecbfd1318a5317892472684d3d0632728331c7eff03bf38ffbc7f6d510d5d25d650a643ed96125af7c7eaec19cd956aae8f2e778d8954de178ea9bfeb34b8eb8e1b2275cffe0a3282686a4dc81cb3adbd8cca2d2834b7485df1617e1db32bec43c55eec0801a6942c9b848841e58d3dd4856b67d247ee51f5b2a6ceb534ac885fabaa12d1793c2fe20957b44b4045d995dbeaf0af2fba75106ae5d7eb02ca6c57b106eb2f029c5576a8c32c29f2b84fb901a534389fc574ed88fa8a87c4b26015a592bb744a655fb2b894e8ebee64e3d22cd9832d6b4ded409c60dfbd1e19c3e1749994fdca6aa658094a496c2bf97f1804287e854ba66be9c9181f46c489f6be9b985ada8e100b17e4b8f36dcf4ef0b18b42325e533fb74322e4b5dc5ee1c4c78a0809e62dfdf7fd9eb1c29d02ee3a0a33864ede09e78ae0d9c66888a4ba6e96d893ba9d9cf08ef8eb19c615657d3012a9ef08fab69c3ee7e2bd6cacb9dcbdade38ae738879d5df9815a863abeae020beae5716a7b0e7b245090d9bf72a7871c288eda7617c6d7e9b7dd4f13b5eee4ea0c006912b8da221b96d9b23df021b93c7fc74c2d45fabcb7dee83458b33070c7f5c8790951bbdbf22362569fa55da7ed1c7c37a5b56ed33eda7ccd44e2a12f3ad2c6ae00174a25f61e8eb2055c54389425a1dbab9405cab4212d870f0c27ea46f5b7fc7bf80e84c15bb788de1cc19a419aedb5e28f97606f7d141aa997651910b395da477eaab47d58f9d6ff90a8f0cc0db3de850f9243ca7ff4259ea994610008d645a290f6dbf9ac7f1b0a3a7dc0d6a86693cbea161d470d9b00ad68fb5db559e1e23f0df7b4358461be0dcee2fcfc0fbc08ad2b2e2f850d66913c10e105f0ca618aeaf7c09d1a79efab9398e48553b12ed2077dd605420e3caaa654dc56164a9f1c63cbf6dd669276c883cca17d000d82cf681dea5c8a85e4a2cef19edf4606adf081e48e57ad185c06e884a0733525e2d07ab0e5e77776aca43b2ce3322c58844f7f93076386e5a83201f06b00dae5e597273d472c2e4dd3daf34b36ea147f15500a6609163599f81989da797e9c4ce1e6fe184e842d8588e17b966b7b9be6cf2655a80385e869079cdf5bf77bbea36e0a24addd5c6c1141e5c563737a1ca690e14ad3fcd2df2a5eb244b76c76d5999cd40f0d364fe443f5ec4603ba96c4ff27ebde715500e7602de2c5375fb9f84db3bc714f180f98ee78ce8e5cbf94883e411a5cede3715169c342f01dd5a88ff9d447b8e8efbd3ccc3c8dae82d2eeb8da000ddbee07b6df0976c54f61c3732ea9053db8545aefc87f588b2e01fcb327ef157c85045bd23e47f1905caaaf4bc2d0ede5771e4288d9089e97c49787ab5e1b964d4b882b093707506c16e3b4ff5bbb33fb66456bf11b6334bce7f0d4550dda4ff74f025f62c208ff11ca15047269dbcb43960422c1f41ece51ccba4a407464c5eb37b9f341a88fdb2786d93e5997171e75dcc37b425f65364b7f808b324d84516f226fd2d37bfbc44741199c079fbe813c75509db0f30db26ebe6ba1b26b8c9618cd1d91f8aa9cccd308089dfb30b2b5097b75d1c47dfb7ad77a2a506f6c8d28fb3a1b03966792c4775e364c8ba13b1dc72aee30aef0468f61eb847fd5b0663e77d7aec3e869bbe746c82b42a9961f6dcbf7f20c4fc47a09232e4abe79cc108c454aaf088f732a3e665a11fdf8c2e3f8c2a7b334e0dfa5d92ea13db0a016245bd8dd37bc5d01c8b3322fa91cda5c8ded9eca218e6e1874b2f6c0f339ca4afbd797c75c23d184912cb888896ed4628faab7153a5feae8a6abce0268f44b7917cc4d27245cd0d95124b6d56c2d80655635409b1da16bb755331654690b6ab21c669d09e42701280897373cea806518331c79ac699b00214ed5b8927703b086b50f8ba27f66d24aec263c4937e93eff4d7395301ba2be7d337d486a748339e2ffd80ab17efbb92e8598593371a50f13db974da9177870a8a87789dbd2b06932311d689a27c110d94ff8d31858fb546f4d3b4d840efea82c5ea82e4a82c107a8bd0b4b3c4df2f3b0f25dce5b8d03b6c77fccfd9462bea07eecf9ccc31aa5853704fe54b08b248649a2e8c94c76e63f99eb6c13c1ccf5f8293d5561b40197d5b45d9ac98dd2d86d788f3a01578366677350388feb214bec50dd1d5bba853c95c4780c2fbc700c9e32da370779b1b4b61c67fc436c6aad35d978e8e94d5c178c9bfca481c9c727d87308c149fa08696725e518cde374d542655cc47f2811408e40672b6c7c0ccb5e09205f9fcd97ea6d8b52f8a590c5415bf0183df3f693775ea2c538aa4f245c4b4e595a0321a8cd1b500075b5ce2dc15a1e64d117dabea4f393644bb9bc7beaf46b6cf0b9a377d95027b36d93b837d7b41d8bbeb73eba0b66e10566086b1607a944f932b037e87df1ba5dc786c10e1170ef2bcad7f9abfd7044ef7b061998f92632426458020fa646c155cb2943e13915ccd803d44ecb4c97a6d86243c284b55eb411841d8df7ab2ef5222992bb99229de881b3684b15fc3278ff95823ff3b1bf178e43776cb77dff78bc3ab4e3f050eb440b08d9452952cbda773fda7b28c7aefe8cab17926a377419899b6fa35736404d25fe823c33d3b462fc7ddf2a07455ad392154c0896e6a21eea1f40a6dbf6b305b4ef6208c1e26484589f20caed961aac", @typed={0xc, 0x34, @u64=0x7}, @generic="70ae6d2d127f38b79e7e99f52ee962b69c0d025b24bc26b0def722587c0b4240258231a7276006373f10131e0a22a044c707ee28f80bb4549a96230ed585dcc2419c24ba215ff193687905bcc83ff68884fd499fba104cdc3d241e9209a1cfa9cc3f2ab379d877dfbd655004f11265c5ac1c2c4920bbe4e125e752c02de2bd5c3f", @generic="ff53ec006d66dfae8dd29046500ef54fccc3b244fd2ae5fe942fac105b0691113db5037711eb3f08769a8e2cd5544f2c68ebb6468b00a67020f1ec53ee5f192a40ecd2b35228417bc5aecf872756"]}, @generic="47059a8c680076f49637f1edcfd1452bab1a2a1adbb0b279288d3dbc6814bd78ffcb819b0b8a78226f9394fe1d6f77b0afd95958cf9cf0c9021c62cb6ab7d7943865508581f26f3894462735c41f42e96424511c5a04eeb7852ca2e0f21a1b15b3b2feddd0d5547afa3bde37be9a66869bd0edffeabb805923de36c56344f2d67260664836a6c617e7a4c79f5fbced924e759796faa00986740ebf"]}, 0x13c4}, 0x1, 0x0, 0x0, 0x24000000}, 0x4044001) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) [ 997.875599][T26691] JFS: Cannot determine volume size 11:23:28 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) [ 997.898362][T26691] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:28 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) close(r1) 11:23:29 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x90) write$vnet(r0, &(0x7f0000000200)={0x1, {&(0x7f0000000080)=""/111, 0x6f, &(0x7f0000000100)=""/77, 0x1, 0x6}}, 0x68) write$vnet(0xffffffffffffffff, &(0x7f0000000180)={0x1, {0x0, 0x9ebba0267e238251, 0x0, 0x3, 0x2}}, 0x68) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20010000}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x150, r1, 0x20, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xda18}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1b239310}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x25}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x8c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbe3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5d7d3a9a}]}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5d3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x150}}, 0x40) [ 997.973146][T26691] JFS: Cannot determine volume size [ 997.990290][T26691] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:29 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000080)=0x1ff) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r1, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:29 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:29 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba64352a756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:29 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) 11:23:29 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:29 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) [ 998.190595][T26809] JFS: Cannot determine volume size 11:23:29 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000040)={0x1, {0x0, 0xffffffffffffff91, 0x0, 0x2, 0x2}}, 0x13) [ 998.217926][T26809] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:29 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:29 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) fstatfs(r0, &(0x7f0000000040)=""/222) 11:23:29 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:29 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x461c8ae5b04d321e, 0x2}}, 0x68) 11:23:29 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) [ 998.372530][T26809] JFS: Cannot determine volume size 11:23:29 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x40, 0x131ec0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000400)={0xaa, 0x8}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000240)=0x20, 0x4) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="143f7801013bd4090010", @ANYRES16=r1, @ANYBLOB="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"], 0x1d4}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000000) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000200)={0x2f, @broadcast, 0x7fff, 0x2, 'nq\x00', 0x1a, 0x0, 0x4b}, 0x2c) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r2, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:29 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:29 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba64352b756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:29 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) [ 998.395822][T26809] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:29 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) 11:23:29 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/85, 0x55}, {&(0x7f00000000c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/146, 0x92}, {&(0x7f0000000100)=""/32, 0x20}], 0x4, 0x0) 11:23:29 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) [ 998.573669][T26963] JFS: Cannot determine volume size 11:23:29 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000040)={0x1, {0x0, 0xfffffdff, 0x0, 0x2, 0x2}}, 0x2d) 11:23:29 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:29 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x2043fdc2703238ae) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000040)) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x7, 0x480100) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:29 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) [ 998.594245][T26963] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:29 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) 11:23:29 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x1, 0x2}}, 0x68) r1 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000200)='/dev/vhost-net\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='/dev/vhost-net\x00', r1) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x8000, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000440)={0xe2df, 0x1, 0xded, 0x10000000000000}, 0x6) sendto$llc(r2, &(0x7f0000000340)="73911a485141fad85cf28070754829", 0xf, 0x20008000, &(0x7f0000000380)={0x1a, 0x337, 0x39e, 0xbcb, 0x6, 0x10000, @dev={[], 0x11}}, 0x10) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x40, 0x10400) ioctl$KVM_GET_DEBUGREGS(r3, 0x8080aea1, &(0x7f0000000280)) [ 998.696738][T26963] JFS: Cannot determine volume size [ 998.709498][T26963] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:29 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:29 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) 11:23:29 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x3}}, 0x68) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000080)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) sendto(r1, &(0x7f0000000340)="1c15c8b534429416df640ad8caf58594a74a5a54652b6b13cf4364565ce10d9fd2df45341d8c3131d87c324c192d8cea3c311505825767e974030cecf05169a8cc80f4703e5093118f10cfdec734f059bd8a", 0x52, 0x0, 0x0, 0x0) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000240)={0x3, @default, r2}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000001580)={0x3, 0x0, 0x0, 0x100000001}) preadv(r1, &(0x7f0000001540)=[{&(0x7f00000003c0)=""/169, 0xff5a}, {&(0x7f00000015c0)=""/144, 0x90}, {&(0x7f0000000540)=""/4096, 0x1000}], 0x3, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000280)={r1, 0x7f}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f00000002c0)={r3, 0x2}) 11:23:29 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba64352d756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:29 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:29 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) fadvise64(r0, 0x24, 0x80000000, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:29 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) 11:23:30 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:30 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x10000003ff) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:30 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) [ 998.945473][T27166] JFS: Cannot determine volume size [ 998.951053][T27166] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:30 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x240, 0x41) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000080)=0x8, &(0x7f00000000c0)=0x4) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x401, @default, @rose={'rose', 0x0}, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) [ 999.053710][T27166] JFS: Cannot determine volume size 11:23:30 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) 11:23:30 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:30 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) [ 999.093514][T27166] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f0000000080)=0x36) write$vnet(r1, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba64352e756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:30 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:30 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000080)={@bcast, @bcast}) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) 11:23:30 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) 11:23:30 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(0xffffffffffffffff) [ 999.362129][T27361] JFS: Cannot determine volume size 11:23:30 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) 11:23:30 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) [ 999.383311][T27361] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:30 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:30 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(0xffffffffffffffff) [ 999.441056][T27361] JFS: Cannot determine volume size [ 999.460838][T27361] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:30 executing program 5: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:23:30 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x4}}, 0xffffffffffffff10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x600400, 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f00000000c0)={0x6, 0x2}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x410000, 0x0) ioctl$RTC_VL_CLR(r2, 0x7014) 11:23:30 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x1a800, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000300)={0x0, 0x5}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000380)={0x0, 0x6}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000002c0)={r3, 0x35, "6b060d045561e428924319f0284392a3d74cad28ca20a88e2e6d19994b5a99f9ff59035d449de55987c2f6304da358351c1de855af"}, &(0x7f0000000240)=0x3d) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000200)={0x80000001, 0x6c14800000000000, 0x3}) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000280)={r4, 0x58}, 0x8) write$vnet(r0, &(0x7f00000000c0)={0x1, {0x0, 0x0, 0x0, 0x4}}, 0x68) r5 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000080)=0x1c) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000400)=@assoc_value={r2, 0xff}, 0x8) getsockopt$inet6_udp_int(r5, 0x11, 0x6f, &(0x7f0000000140), &(0x7f0000000180)=0x4) 11:23:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643530756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:30 executing program 5: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:23:30 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:30 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(0xffffffffffffffff) 11:23:30 executing program 5: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:23:30 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x9, 0x400000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x117, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r2, 0x13}}, 0x10) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000140)={0x7fff, 0x3}) [ 999.740546][T27601] JFS: Cannot determine volume size 11:23:30 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 11:23:30 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-net\x00', 0x2, 0x0) r1 = getpgrp(0x0) ptrace$getregs(0xc, r1, 0x7, &(0x7f0000000040)=""/36) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) r2 = msgget$private(0x0, 0x111) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r4 = getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000100)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000380)={{0x1, r3, r4, r5, r6, 0x10, 0x22163256}, 0x968, 0xd884, 0x4, 0x654, 0x0, 0x3, r1, r1}) 11:23:30 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) [ 999.773415][T27601] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:30 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) [ 999.854023][T27601] JFS: Cannot determine volume size [ 999.859330][T27601] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643558756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:30 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:30 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:30 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 11:23:31 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000040)={0xc, 0x0, 0x40}) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000200)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}]}, 0x88) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r1, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) [ 1000.016758][T27729] JFS: Cannot determine volume size [ 1000.021957][T27729] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:31 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:31 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:31 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) [ 1000.095884][T27745] kernel msg: ebtables bug: please report to author: Wrong nr of counters [ 1000.121324][T27745] kernel msg: ebtables bug: please report to author: Wrong nr of counters 11:23:31 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) write$vnet(r1, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockname(r0, &(0x7f0000000100)=@hci={0x1f, 0x0}, &(0x7f0000000200)=0x80) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000240)={0x0, @initdev, @initdev}, &(0x7f0000000280)=0xc) recvmmsg(r0, &(0x7f0000003f80)=[{{&(0x7f00000002c0)=@rc, 0x80, &(0x7f0000000540)=[{&(0x7f0000000340)=""/15, 0xf}, {&(0x7f0000000380)=""/209, 0xd1}, {&(0x7f0000000480)=""/172, 0xac}], 0x3, &(0x7f0000000580)=""/125, 0x7d}, 0x284}, {{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000000840)=[{&(0x7f0000000680)=""/168, 0xa8}, {&(0x7f0000000740)=""/221, 0xdd}], 0x2, &(0x7f0000000880)=""/97, 0x61}, 0x6}, {{&(0x7f0000000900)=@alg, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/161, 0xa1}, {&(0x7f0000000a40)=""/52, 0x34}, {&(0x7f0000000a80)=""/52, 0x34}, {&(0x7f0000000ac0)=""/103, 0x67}, {&(0x7f0000000b40)=""/102, 0x66}], 0x5}, 0xfffffffffffffffa}, {{&(0x7f0000000c40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000cc0)=""/242, 0xf2}, {&(0x7f0000000dc0)=""/150, 0x96}, {&(0x7f0000000e80)=""/186, 0xba}, {&(0x7f0000000f40)=""/2, 0x2}, {&(0x7f0000000f80)=""/41, 0x29}, {&(0x7f0000000fc0)=""/233, 0xe9}, {&(0x7f00000010c0)=""/148, 0x94}], 0x7, &(0x7f0000001200)=""/4096, 0x1000}, 0x67}, {{&(0x7f0000002200)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002540)=[{&(0x7f0000002280)=""/69, 0x45}, {&(0x7f0000002300)=""/142, 0x8e}, {&(0x7f00000023c0)=""/179, 0xb3}, {&(0x7f0000002480)=""/149, 0x95}], 0x4, &(0x7f0000002580)=""/84, 0x54}, 0xffffffffffffffff}, {{&(0x7f0000002600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000003800)=[{&(0x7f0000002680)=""/129, 0x81}, {&(0x7f0000002740)=""/138, 0x8a}, {&(0x7f0000002800)=""/4096, 0x1000}], 0x3}, 0x5}, {{&(0x7f0000003840)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000003900)=[{&(0x7f00000038c0)=""/54, 0x36}], 0x1}, 0x2}, {{&(0x7f0000003940)=@isdn, 0x80, &(0x7f0000003d40)=[{&(0x7f00000039c0)=""/146, 0x92}, {&(0x7f0000003a80)=""/63, 0x3f}, {&(0x7f0000003ac0)=""/228, 0xe4}, {&(0x7f0000003bc0)=""/90, 0x5a}, {&(0x7f0000003c40)=""/204, 0xcc}], 0x5, &(0x7f0000003dc0)=""/66, 0x42}, 0x13}, {{&(0x7f0000003e40)=@sco, 0x80, &(0x7f0000003f40)=[{&(0x7f0000003ec0)=""/90, 0x5a}], 0x1}, 0x5b}], 0x9, 0x40, &(0x7f00000041c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004200)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000004300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000004340)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000005a40)={'team0\x00', 0x0}) accept4$packet(r0, &(0x7f0000007700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007740)=0x14, 0x80000) getpeername$packet(r0, &(0x7f0000007780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000077c0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000007880)={'veth1_to_bond\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007980)={0x0, @multicast1, @initdev}, &(0x7f00000079c0)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007a00)={0x0, @broadcast, @broadcast}, &(0x7f0000007a40)=0xc) accept$packet(r0, &(0x7f0000007a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007ac0)=0x14) getpeername$packet(r0, &(0x7f0000007c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007cc0)=0x14) getpeername$packet(r0, &(0x7f0000007e80)={0x11, 0x0, 0x0}, &(0x7f0000007ec0)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000007f00)={@initdev, @remote, 0x0}, &(0x7f0000007f40)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000007f80)={0x0, @broadcast, @local}, &(0x7f0000007fc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000008100)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000008200)=0xe8) accept4(r0, &(0x7f0000008240)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000082c0)=0x80, 0x800) accept4$packet(r0, &(0x7f0000008840)={0x11, 0x0, 0x0}, &(0x7f0000008880)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000088c0)={'team0\x00', 0x0}) getpeername$packet(r0, &(0x7f0000008900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000008940)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000008980)={0x0, @empty, @multicast2}, &(0x7f00000089c0)=0xc) getpeername$packet(r0, &(0x7f0000008a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000008a40)=0x14) recvmmsg(r0, &(0x7f000000fb40)=[{{&(0x7f0000008b40)=@pppoe, 0x80, &(0x7f0000008c40)=[{&(0x7f0000008bc0)=""/112, 0x70}], 0x1, &(0x7f0000008c80)=""/93, 0x5d}, 0xf165}, {{&(0x7f0000008d00)=@nfc, 0x80, &(0x7f0000008ec0)=[{&(0x7f0000008d80)=""/99, 0x63}, {&(0x7f0000008e00)=""/185, 0xb9}], 0x2}, 0xfffffffffffffc01}, {{&(0x7f0000008f00)=@alg, 0x80, &(0x7f000000a340)=[{&(0x7f0000008f80)=""/252, 0xfc}, {&(0x7f0000009080)=""/190, 0xbe}, {&(0x7f0000009140)=""/115, 0x73}, {&(0x7f00000091c0)=""/4096, 0x1000}, {&(0x7f000000a1c0)=""/89, 0x59}, {&(0x7f000000a240)=""/204, 0xcc}], 0x6, &(0x7f000000a3c0)=""/129, 0x81}, 0xe395}, {{&(0x7f000000a480)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000b840)=[{&(0x7f000000a500)=""/223, 0xdf}, {&(0x7f000000a600)=""/135, 0x87}, {&(0x7f000000a6c0)=""/4096, 0x1000}, {&(0x7f000000b6c0)=""/185, 0xb9}, {&(0x7f000000b780)=""/140, 0x8c}], 0x5, &(0x7f000000b8c0)=""/67, 0x43}, 0x4}, {{&(0x7f000000b940)=@generic, 0x80, &(0x7f000000ba80)=[{&(0x7f000000b9c0)=""/151, 0x97}], 0x1}, 0x1}, {{&(0x7f000000bac0)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f000000cc40)=[{&(0x7f000000bb40)=""/215, 0xd7}, {&(0x7f000000bc40)=""/4096, 0x1000}], 0x2, &(0x7f000000cc80)=""/130, 0x82}, 0x5}, {{&(0x7f000000cd40)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f000000cec0)=[{&(0x7f000000cdc0)=""/232, 0xe8}], 0x1, &(0x7f000000cf00)=""/184, 0xb8}, 0x9}, {{&(0x7f000000cfc0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f000000d300)=[{&(0x7f000000d040)=""/29, 0x1d}, {&(0x7f000000d080)=""/25, 0x19}, {&(0x7f000000d0c0)=""/248, 0xf8}, {&(0x7f000000d1c0)=""/60, 0x3c}, {&(0x7f000000d200)=""/217, 0xd9}], 0x5, &(0x7f000000d380)=""/168, 0xa8}, 0x800}, {{&(0x7f000000d440)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f000000e740)=[{&(0x7f000000d4c0)=""/151, 0x97}, {&(0x7f000000d580)=""/153, 0x99}, {&(0x7f000000d640)=""/65, 0x41}, {&(0x7f000000d6c0)=""/81, 0x51}, {&(0x7f000000d740)=""/4096, 0x1000}], 0x5, &(0x7f000000e7c0)=""/171, 0xab}, 0x8}, {{&(0x7f000000e880)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, &(0x7f000000fa80)=[{&(0x7f000000e900)=""/4096, 0x1000}, {&(0x7f000000f900)=""/186, 0xba}, {&(0x7f000000f9c0)=""/166, 0xa6}], 0x3, &(0x7f000000fac0)=""/77, 0x4d}, 0xbc}], 0xa, 0x40, &(0x7f000000fdc0)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f000000fe00)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f000000ff00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000010000)={{{@in=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000010100)=0xe8) getpeername$packet(r0, &(0x7f0000010340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000010380)=0x14) accept$packet(r0, &(0x7f0000010480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000104c0)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000012780)={0x0, @multicast2, @multicast1}, &(0x7f00000127c0)=0xc) accept4$packet(r0, &(0x7f0000012800)={0x11, 0x0, 0x0}, &(0x7f0000012840)=0x14, 0x800) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000012880)={@broadcast, @dev, 0x0}, &(0x7f00000128c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000012a00)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000012b00)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000012b80)={@initdev, @rand_addr, 0x0}, &(0x7f0000012bc0)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000012c00)={@rand_addr, 0x0}, &(0x7f0000012c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000012c80)={{{@in, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000012d80)=0xe8) accept4$packet(r0, &(0x7f0000013e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013e40)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000013e80)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000013f80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000013fc0)={'team0\x00', 0x0}) recvmsg$kcm(r0, &(0x7f0000015580)={&(0x7f0000014000)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000015500)=[{&(0x7f0000014080)=""/93, 0x5d}, {&(0x7f0000014100)=""/98, 0x62}, {&(0x7f0000014180)=""/4096, 0x1000}, {&(0x7f0000015180)=""/205, 0xcd}, {&(0x7f0000015280)=""/195, 0xc3}, {&(0x7f0000015380)=""/137, 0x89}, {&(0x7f0000015440)=""/61, 0x3d}, {&(0x7f0000015480)=""/71, 0x47}], 0x8}, 0x10101) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000155c0)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000156c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000015700)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000016600)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000165c0)={&(0x7f0000015740)={0xe50, r2, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}}]}}, {{0x8, 0x1, r4}, {0x1ac, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3caa}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x23}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r10}, {0x7c, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r12}, {0x180, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r16}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r18}, {0x22c, 0x2, [{0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x3ff, 0x8, 0x1, 0x6}, {0x2, 0x10d2, 0x97, 0xfffffffffffffffe}, {0xffffffff00000001, 0xffffffff80000000, 0x6, 0x7}, {0x4, 0x0, 0x401, 0x5}, {0x8, 0x4, 0x8, 0x4}, {0x8001, 0x3450, 0x3ff, 0x7ff}, {0x81, 0x7e3b, 0x80000000, 0x1082}, {0x2, 0x0, 0xffffffffffffffff, 0xa929}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x400}}, {0x8, 0x6, r20}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8000}}, {0x8, 0x6, r24}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r25}, {0x168, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r28}, {0x200, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r30}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r32}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x3, 0x4, 0xffffffff, 0x80}, {0x2, 0x8000, 0x1000, 0x8}]}}}]}}, {{0x8, 0x1, r33}, {0x27c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x7ff, 0x8000, 0x9, 0x20}, {0x3, 0x1, 0x5, 0x800}, {0x1, 0x8, 0x0, 0x20}, {0xfffffffffffffff8, 0x3, 0x400, 0x4}, {0x4a5, 0x2, 0xfffffffffffffffe, 0x3}, {0x9, 0x1, 0x5, 0x6}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r34}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r35}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r36}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r37}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfff}}}]}}, {{0x8, 0x1, r38}, {0x84, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r39}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}]}}, {{0x8, 0x1, r40}, {0x174, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x100}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1508}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r41}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r42}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x964d}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r43}}, {0x8}}}]}}]}, 0xe50}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 11:23:31 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x68) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000040)='syz0\x00') [ 1000.145539][T27729] JFS: Cannot determine volume size [ 1000.163400][T27729] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:31 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643563756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:31 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:31 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:31 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:31 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x2000) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e21, @rand_addr=0x1000}}, 0x7af, 0x101}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=r2, &(0x7f0000000240)=0x4) 11:23:31 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:31 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:31 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:31 executing program 5: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba64352d756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) [ 1000.402404][T27971] JFS: Cannot determine volume size [ 1000.408625][T27971] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:31 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) [ 1000.499782][T27985] JFS: Cannot determine volume size 11:23:31 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) [ 1000.527243][T27971] JFS: Cannot determine volume size [ 1000.532464][T27971] jfs: Unrecognized mount option "obj_role=" or missing value [ 1000.533123][T27985] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:31 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:31 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643564756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:31 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:31 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) 11:23:31 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:31 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:31 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:31 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:31 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:31 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) [ 1000.808477][T28023] JFS: Cannot determine volume size [ 1000.818458][T28023] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:31 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:31 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:31 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) [ 1000.945334][T28023] JFS: Cannot determine volume size [ 1000.950538][T28023] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:32 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643569756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:32 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = dup2(r0, r0) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000000)=0x7, 0x2) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:32 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:32 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:32 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:32 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:32 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:32 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) [ 1001.145314][T28061] JFS: Cannot determine volume size 11:23:32 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:32 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) bind$nfc_llcp(r1, &(0x7f0000000080)={0x27, 0x1, 0x2, 0x3, 0x3, 0x1, "9114accadc980797dceba62fc9f5511e52aa791bc8923f340dc56a755c6241648ba97fbcadebba526984aa22d6c8abea81b60df4cd396f51ed946096664f99", 0x17}, 0x60) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:32 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:32 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) [ 1001.199381][T28061] jfs: Unrecognized mount option "obj_role=" or missing value [ 1001.332861][T28061] JFS: Cannot determine volume size [ 1001.348419][T28061] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:32 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba64356c756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:32 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:32 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:32 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:32 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0x1}, 0x28, 0x1) write$vnet(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x68) 11:23:32 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:32 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:32 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:32 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:32 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) [ 1001.543946][T28110] JFS: Cannot determine volume size 11:23:32 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:32 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) [ 1001.586560][T28110] jfs: Unrecognized mount option "obj_role=" or missing value [ 1001.684260][T28110] JFS: Cannot determine volume size [ 1001.689474][T28110] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:32 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba64356f756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:32 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) close(r1) 11:23:32 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:32 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:32 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:32 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:32 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:32 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) close(r1) 11:23:32 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:32 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) [ 1001.897755][T28140] JFS: Cannot determine volume size [ 1001.903086][T28140] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:32 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:33 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) close(r1) [ 1002.056939][T28140] JFS: Cannot determine volume size [ 1002.077469][T28140] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:33 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643570756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:33 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:33 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:33 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:33 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:33 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:33 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:33 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:33 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:33 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:33 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:33 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) [ 1002.474247][T28195] JFS: Cannot determine volume size [ 1002.479470][T28195] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:33 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643575756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:33 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r1) 11:23:33 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 11:23:33 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:33 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:33 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) [ 1002.516740][T28195] JFS: Cannot determine volume size [ 1002.521949][T28195] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:33 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 11:23:33 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:33 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) [ 1002.649552][T28215] JFS: Cannot determine volume size 11:23:33 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:33 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) [ 1002.713329][T28215] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:33 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) [ 1002.827696][T28215] JFS: Cannot determine volume size [ 1002.876518][T28215] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:33 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643578756d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:33 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) close(r0) 11:23:33 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 11:23:33 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) close(r1) 11:23:33 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:33 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:34 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) 11:23:34 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:34 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 11:23:34 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) rmdir(&(0x7f00000002c0)='./file0\x00') close(r1) 11:23:34 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) [ 1003.074778][T28254] JFS: Cannot determine volume size 11:23:34 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) [ 1003.113393][T28254] jfs: Unrecognized mount option "obj_role=" or missing value [ 1003.227081][T28254] JFS: Cannot determine volume size [ 1003.241519][T28254] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:34 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba6435730a6d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:34 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:34 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) rmdir(&(0x7f00000002c0)='./file0\x00') close(r1) 11:23:34 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4100, 0x0) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000100)) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000080)={0x2, 0x400000000001, @stop_pts=0x5}) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000000)={0x9f0000, 0x103, 0x1, [], 0x0}) 11:23:34 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 11:23:34 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 11:23:34 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:34 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 11:23:34 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4100, 0x0) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000100)) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000080)={0x2, 0x400000000001, @stop_pts=0x5}) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000000)={0x9f0000, 0x103, 0x1, [], 0x0}) 11:23:34 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) [ 1003.388625][T28292] JFS: Cannot determine volume size [ 1003.399476][T28292] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:34 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) rmdir(&(0x7f00000002c0)='./file0\x00') close(r1) 11:23:34 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) [ 1003.529143][T28292] JFS: Cannot determine volume size [ 1003.544205][T28292] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:34 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573236d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:34 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) 11:23:34 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000007240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000480), 0x4) ioctl$KVM_INTERRUPT(0xffffffffffffffff, 0x4004ae86, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='pids.max\x00', 0x2, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x9, r2, &(0x7f0000000580), 0x0, 0x40, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7003, &(0x7f00000000c0)) rmdir(&(0x7f00000002c0)='./file0\x00') close(r1) 11:23:34 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4100, 0x0) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000100)) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000080)={0x2, 0x400000000001, @stop_pts=0x5}) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000000)={0x9f0000, 0x103, 0x1, [], 0x0}) 11:23:34 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 11:23:34 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:34 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000080)={0xf000000, 0x5, 0x9, [], &(0x7f0000000040)={0x98093d, 0x80000000, [], @p_u8=&(0x7f0000000000)=0x68235d87}}) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) 11:23:34 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)={0x6, 0x401}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0003, 0x5, 0x20000000000000, [], 0x0}) 11:23:34 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:34 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4100, 0x0) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000100)) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000080)={0x2, 0x400000000001, @stop_pts=0x5}) 11:23:34 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xe1a6, 0x220000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)={0x5, 0x1, @stop_pts=0x23d02dfb}) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) 11:23:34 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000000)={0x0, @bt={0x100, 0x3, 0x1, 0x2, 0x0, 0x1, 0xea, 0xf59c, 0x9, 0x2, 0xffff, 0x2, 0x4, 0x5, 0x8, 0x4}}) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) [ 1003.758365][T28335] JFS: Cannot determine volume size [ 1003.809013][T28335] jfs: Unrecognized mount option "obj_role=" or missing value [ 1003.912918][T28335] JFS: Cannot determine volume size [ 1003.930607][T28335] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:35 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573256d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:35 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xe1a6, 0x220000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)={0x5, 0x1, @stop_pts=0x23d02dfb}) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) 11:23:35 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4100, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000080)={0x2, 0x400000000001, @stop_pts=0x5}) 11:23:35 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:35 executing program 1: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4c0800, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0003, 0x5, 0x20000000000000, [], 0x0}) 11:23:35 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000080)={0x2, 0x400000000001, @stop_pts=0x5}) 11:23:35 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xe1a6, 0x220000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)={0x5, 0x1, @stop_pts=0x23d02dfb}) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) 11:23:35 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) [ 1004.089916][T28469] JFS: Cannot determine volume size [ 1004.109171][T28469] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:35 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)={0x6, 0x401}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0003, 0x5, 0x20000000000000, [], 0x0}) 11:23:35 executing program 0: ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0xc0485661, &(0x7f0000000080)={0x2, 0x400000000001, @stop_pts=0x5}) 11:23:35 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xe1a6, 0x220000) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000140)) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)={0x5, 0x1, @stop_pts=0x23d02dfb}) [ 1004.234753][T28469] JFS: Cannot determine volume size [ 1004.239954][T28469] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:35 executing program 0: ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0xc0485661, &(0x7f0000000080)={0x2, 0x400000000001, @stop_pts=0x5}) 11:23:35 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 11:23:35 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba6435732a6d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:35 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) close(r1) write$P9_RLCREATE(r0, &(0x7f0000000040)={0x18, 0xf, 0x1, {{0x40, 0x3, 0x2}, 0x66f}}, 0x18) [ 1004.497064][T28702] JFS: Cannot determine volume size [ 1004.502470][T28702] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:35 executing program 1: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4c0800, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x6, &(0x7f00000002c0), 0x4) 11:23:37 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, 0x0) 11:23:37 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, 0x0) [ 1006.546127][T29278] JFS: Cannot determine volume size 11:23:37 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000080)) 11:23:37 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) [ 1006.581233][T29278] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:37 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x12, &(0x7f00000002c0), 0x4) 11:23:37 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, 0x0) [ 1006.677908][T29278] JFS: Cannot determine volume size [ 1006.688472][T29278] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:37 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 11:23:37 executing program 1: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4c0800, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x10, &(0x7f00000002c0), 0x4) 11:23:37 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)={0x0, 0x1, @stop_pts=0x23d02dfb}) 11:23:37 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573636d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e3f700000000000000ca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e74703c48f93b8446b9bbc7a461eb886a5e54e8ff5", 0x4c}], 0x1}, 0x0) 11:23:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1006.999806][T29520] JFS: Cannot determine volume size 11:23:38 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)={0x0, 0x0, @stop_pts=0x23d02dfb}) [ 1007.022882][T29520] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:38 executing program 0: getpeername(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd0100fffff000200c0501000800010003f2511a10df00", 0x1f) [ 1007.095956][T29520] JFS: Cannot determine volume size [ 1007.101197][T29520] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:23:38 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)) 11:23:38 executing program 3: r0 = open(&(0x7f0000000780)='./file0\x00', 0x80220, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004340)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) getpeername$inet6(r0, 0x0, 0x0) 11:23:38 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573646d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) [ 1007.204798][T29737] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1007.250368][T29743] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1007.308520][T29749] JFS: Cannot determine volume size [ 1007.324514][T29749] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:38 executing program 1: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4c0800, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x6, 0xa, &(0x7f00000002c0), 0x4) 11:23:38 executing program 0: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, 0x0, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x6, 0xc, &(0x7f00000002c0), 0x4) 11:23:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1007.427714][T29749] JFS: Cannot determine volume size [ 1007.438939][T29749] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:38 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:23:38 executing program 0: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x11, &(0x7f00000002c0), 0x4) 11:23:38 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573696d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:38 executing program 4: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x1b, &(0x7f00000002c0), 0x4) 11:23:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1007.676917][T29969] JFS: Cannot determine volume size 11:23:38 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:38 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)) [ 1007.753684][T29969] jfs: Unrecognized mount option "obj_role=" or missing value [ 1007.874851][T29969] JFS: Cannot determine volume size [ 1007.907865][T29969] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:39 executing program 1: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4c0800, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:39 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba6435736c6d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:23:39 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:39 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000080)) 11:23:39 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vcs\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x200) [ 1008.153088][T30018] JFS: Cannot determine volume size 11:23:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:23:39 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000080)) [ 1008.183524][T30018] jfs: Unrecognized mount option "obj_role=" or missing value [ 1008.263734][T30018] JFS: Cannot determine volume size [ 1008.273945][T30018] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:39 executing program 1: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4c0800, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x1) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0xe, &(0x7f0000000000)="22dbcedf", 0x4) 11:23:39 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000080)) 11:23:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:23:39 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba6435736f6d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:39 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) [ 1008.498939][T30048] JFS: Cannot determine volume size 11:23:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:23:39 executing program 4: ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)) 11:23:39 executing program 1: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4c0800, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1008.648627][T30048] JFS: Cannot determine volume size [ 1008.683375][T30048] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:39 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x375) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) socket$unix(0x1, 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000240)) r2 = socket$unix(0x1, 0x1, 0x0) r3 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x40000000000002) r4 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) poll(&(0x7f0000000200)=[{r1, 0x8000}, {r3, 0x100}, {r2, 0x200}, {r4, 0x20}, {}], 0x5, 0x80000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$P9_RLINK(r7, &(0x7f0000000280)={0x7, 0x47, 0x2}, 0x7) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x2, 0x4010000000000001, 0x0) rename(0x0, 0x0) bind$inet(r8, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0xef}, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r8, 0x6, 0x21, &(0x7f00000002c0)="8b0cfdcb393a33260a8d466f11571aa1", 0x10) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000300), 0xffffffffffffff10) sendto$inet(r8, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4000000004e23}, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r8, 0x40000000000001) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000080)) 11:23:40 executing program 4: ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)) 11:23:40 executing program 1: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4c0800, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) [ 1010.224272][T30437] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:41 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) personality(0x0) 11:23:41 executing program 4: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)) 11:23:41 executing program 1: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4c0800, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r0, 0x20400000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) 11:23:41 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:41 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573786d27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1010.926700][T30679] JFS: Cannot determine volume size 11:23:41 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:41 executing program 4: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)) 11:23:41 executing program 1: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4c0800, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x4, &(0x7f00000002c0), 0x4) [ 1010.951299][T30679] jfs: Unrecognized mount option "obj_role=" or missing value [ 1011.044906][T30679] JFS: Cannot determine volume size 11:23:42 executing program 4: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)) [ 1011.082143][T30679] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:42 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:23:42 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) personality(0x0) 11:23:42 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) 11:23:42 executing program 1: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4c0800, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:42 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573750a27766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:42 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1011.762880][T30813] JFS: Cannot determine volume size 11:23:42 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:42 executing program 1: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4c0800, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) [ 1011.859160][T30813] JFS: Cannot determine volume size [ 1011.898630][T30813] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:42 executing program 1: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:43 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573752527766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:43 executing program 1: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1012.700118][T30855] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:43 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:43 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0xffffffffffffff81) [ 1012.842627][T30855] JFS: Cannot determine volume size [ 1012.848253][T30855] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:43 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d25766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) [ 1013.027899][T31082] JFS: Cannot determine volume size [ 1013.033140][T31082] jfs: Unrecognized mount option "obj_role=" or missing value [ 1013.143557][T31082] JFS: Cannot determine volume size [ 1013.151681][T31082] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:44 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:23:44 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:44 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0xffffffffffffff81) 11:23:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:23:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) [ 1013.540307][T31102] JFS: Cannot determine volume size 11:23:44 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0xffffffffffffff81) [ 1013.563887][T31102] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:44 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, 0x0, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1013.641434][T31102] JFS: Cannot determine volume size [ 1013.651014][T31102] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:44 executing program 4: ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0xffffffffffffff81) 11:23:44 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d53766d6e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) [ 1013.831818][T31225] JFS: Cannot determine volume size [ 1013.857161][T31225] jfs: Unrecognized mount option "obj_role=" or missing value [ 1013.964587][T31225] JFS: Cannot determine volume size [ 1013.970037][T31225] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:45 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:23:45 executing program 4: ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0xffffffffffffff81) 11:23:45 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, 0x0, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:45 executing program 1: r0 = syz_open_procfs(0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:45 executing program 1: r0 = syz_open_procfs(0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:23:45 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0xffffffffffffff81) 11:23:46 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:23:46 executing program 1: r0 = syz_open_procfs(0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:46 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0xffffffffffffff81) 11:23:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1015.307221][T31577] JFS: Cannot determine volume size 11:23:46 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0xffffffffffffff81) 11:23:46 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={0x0, 0x0, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:46 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:23:46 executing program 1: syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:46 executing program 4: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0xffffffffffffff81) 11:23:46 executing program 1: syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1015.662853][T31814] JFS: Cannot determine volume size 11:23:46 executing program 1: syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:46 executing program 4: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xc0109207, 0xffffffffffffff81) 11:23:46 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r1, 0x20400000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) [ 1015.843580][T31814] JFS: Cannot determine volume size [ 1015.848788][T31814] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:46 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x0) 11:23:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:23:46 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d2776256e6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) [ 1016.080272][T31999] JFS: Cannot determine volume size [ 1016.085881][T31999] jfs: Unrecognized mount option "obj_role=" or missing value [ 1016.129740][T31999] JFS: Cannot determine volume size [ 1016.147704][T31999] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:49 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:23:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r1, 0x20400000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) 11:23:49 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:49 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000100)={0xffffffffffffff10}, 0xfffffc92) creat(&(0x7f00000001c0)='./bus\x00', 0x0) 11:23:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:23:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d27766d0a6574312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r1, 0x20400000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) 11:23:49 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) r0 = request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000200)='./file1\x00', 0x0) r1 = syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0xfff, 0x82) r2 = memfd_create(&(0x7f0000000000)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000080)='\'', 0x1}], 0x1, 0x81806) sendfile(r1, r1, 0x0, 0x9f4d) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) [ 1018.661208][T32076] JFS: Cannot determine volume size 11:23:49 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:49 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1018.689534][T32076] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r1, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) 11:23:50 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) [ 1019.185385][T32361] JFS: Cannot determine volume size [ 1019.202773][T32361] jfs: Unrecognized mount option "obj_role=" or missing value [ 1019.274771][T32361] JFS: Cannot determine volume size [ 1019.291747][T32361] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:52 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:23:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) 11:23:52 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d27766d6e0a74312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:53 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0xffffffffffffffff}) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) lsetxattr(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, 0x0, 0x0) [ 1022.011596][T32466] JFS: Cannot determine volume size [ 1022.023521][T32466] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:53 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) [ 1022.091808][T32466] JFS: Cannot determine volume size [ 1022.110641][T32466] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:23:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100081) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x1, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000100)={0x14}, 0x14) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) syz_genetlink_get_family_id$tipc2(0x0) sendfile(r1, r2, 0x0, 0x20000102000007) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 1025.087218][T32707] JFS: Cannot determine volume size [ 1025.102547][T32707] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1025.171123][T32707] JFS: Cannot determine volume size [ 1025.183391][T32707] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:59 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:23:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d27766d6e650a312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:59 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100081) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x1, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000100)={0x14}, 0x14) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) syz_genetlink_get_family_id$tipc2(0x0) sendfile(r1, r2, 0x0, 0x20000102000007) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 11:23:59 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d27766d6e6525312c002d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:23:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:59 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:23:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100081) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x1, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000100)={0x14}, 0x14) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) syz_genetlink_get_family_id$tipc2(0x0) sendfile(r1, r2, 0x0, 0x20000102000007) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 11:23:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:23:59 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x4, &(0x7f00000002c0), 0x4) [ 1028.624135][ T692] JFS: Cannot determine volume size [ 1028.629363][ T692] jfs: Unrecognized mount option "obj_role=" or missing value 11:23:59 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x4, &(0x7f00000002c0), 0x4) 11:24:02 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:24:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, 0x0, 0x0) 11:24:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:24:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 11:24:02 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, 0x0, 0x0) [ 1031.458114][ T857] JFS: Cannot determine volume size 11:24:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 11:24:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000003c0)) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, 0x0, 0x0) 11:24:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1031.607724][ T857] JFS: Cannot determine volume size [ 1031.612939][ T857] jfs: Unrecognized mount option "obj_role=" or missing value 11:24:05 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:24:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r1, 0x4475}}, 0x10) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) signalfd4(r0, &(0x7f0000000000)={0x4}, 0x8, 0x80000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x84000, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000240)=0x4) 11:24:28 executing program 1 (fault-call:4 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1057.268339][ T2593] RSP: 002b:00007fbc524f3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1057.276723][ T2593] RAX: ffffffffffffffda RBX: 00007fbc524f3c90 RCX: 0000000000457e29 [ 1057.284663][ T2593] RDX: 000000002000008f RSI: 0000000020000080 RDI: 0000000000000005 [ 1057.292617][ T2593] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1057.300556][ T2593] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbc524f46d4 [ 1057.308512][ T2593] R13: 00000000004c708b R14: 00000000004dca58 R15: 0000000000000006 11:24:30 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:24:30 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000040)=0x8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r1, 0x4475}}, 0x10) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) signalfd4(r0, &(0x7f0000000000)={0x4}, 0x8, 0x80000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x84000, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000240)=0x4) 11:24:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d27766d6e6574312c742d45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:24:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, 0x0, 0x0, 0x0, 0x1000) 11:24:30 executing program 1 (fault-call:4 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r1, 0x4475}}, 0x10) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0x9f0000, 0x5, 0x0, [], 0x0}) signalfd4(r0, &(0x7f0000000000)={0x4}, 0x8, 0x80000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x84000, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000240)=0x4) [ 1059.768113][ T2608] JFS: Cannot determine volume size 11:24:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1063.237375][ T2799] RSP: 002b:00007faa187c9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1063.245773][ T2799] RAX: ffffffffffffffda RBX: 00007faa187c9c90 RCX: 0000000000457e29 11:24:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1063.524118][ T2913] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1063.532514][ T2913] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 11:24:34 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d27766d6e6574312c003f45531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) [ 1063.540475][ T2913] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1063.548448][ T2913] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1063.556417][ T2913] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1063.564393][ T2913] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 [ 1063.572367][ T2936] CPU: 1 PID: 2936 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190227 #44 [ 1063.581380][ T2936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1063.591428][ T2936] Call Trace: [ 1063.594708][ T2936] dump_stack+0x172/0x1f0 [ 1063.599048][ T2936] should_fail.cold+0xa/0x15 [ 1063.603636][ T2936] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1063.609441][ T2936] ? ___might_sleep+0x163/0x280 [ 1063.614300][ T2936] __should_failslab+0x121/0x190 [ 1063.619233][ T2936] should_failslab+0x9/0x14 [ 1063.623740][ T2936] kmem_cache_alloc_node+0x264/0x710 [ 1063.628999][ T2936] ? __sk_dst_check+0x14b/0x2f0 [ 1063.633823][ T2936] __alloc_skb+0xd5/0x5e0 [ 1063.638126][ T2936] ? skb_trim+0x190/0x190 [ 1063.642426][ T2936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1063.648637][ T2936] ? tcp_chrono_stop+0x1f9/0x3b0 [ 1063.653560][ T2936] sk_stream_alloc_skb+0xc8/0x860 [ 1063.658559][ T2936] tcp_connect+0xfd8/0x4330 [ 1063.663042][ T2936] ? tcp_push_one+0x110/0x110 [ 1063.667699][ T2936] ? tcp_sendmsg_locked+0x2198/0x34b0 [ 1063.673046][ T2936] ? kmem_cache_alloc_trace+0x354/0x760 [ 1063.678568][ T2936] ? mark_held_locks+0xf0/0xf0 [ 1063.683305][ T2936] ? _copy_from_user+0xdd/0x150 [ 1063.688130][ T2936] tcp_sendmsg_locked+0x284b/0x34b0 [ 1063.693306][ T2936] ? lock_sock_nested+0xac/0x120 [ 1063.698226][ T2936] ? find_held_lock+0x35/0x130 [ 1063.702969][ T2936] ? mark_held_locks+0xa4/0xf0 [ 1063.707702][ T2936] ? tcp_sendpage+0x60/0x60 [ 1063.712182][ T2936] ? lock_sock_nested+0x9a/0x120 [ 1063.717084][ T2936] ? trace_hardirqs_on+0x67/0x230 [ 1063.722086][ T2936] ? lock_sock_nested+0x9a/0x120 [ 1063.726994][ T2936] ? __local_bh_enable_ip+0x15a/0x270 [ 1063.732332][ T2936] tcp_sendmsg+0x30/0x50 [ 1063.736547][ T2936] inet_sendmsg+0x147/0x5d0 [ 1063.741020][ T2936] ? ipip_gro_receive+0x100/0x100 [ 1063.746025][ T2936] sock_sendmsg+0xdd/0x130 [ 1063.750419][ T2936] ___sys_sendmsg+0x3e2/0x930 [ 1063.755067][ T2936] ? copy_msghdr_from_user+0x430/0x430 [ 1063.760504][ T2936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1063.766734][ T2936] ? kasan_check_read+0x11/0x20 [ 1063.771565][ T2936] ? __fget+0x381/0x550 [ 1063.775689][ T2936] ? ksys_dup3+0x3e0/0x3e0 [ 1063.780070][ T2936] ? find_held_lock+0x35/0x130 [ 1063.784802][ T2936] ? __fget_light+0x1a9/0x230 [ 1063.789451][ T2936] ? __fdget+0x1b/0x20 [ 1063.793500][ T2936] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1063.799706][ T2936] ? sockfd_lookup_light+0xcb/0x180 [ 1063.804872][ T2936] __sys_sendmmsg+0x1c3/0x4e0 [ 1063.809540][ T2936] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1063.814542][ T2936] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1063.820750][ T2936] ? fput_many+0x12c/0x1a0 [ 1063.825133][ T2936] ? fput+0x1b/0x20 [ 1063.828925][ T2936] ? ksys_write+0x166/0x1f0 [ 1063.833402][ T2936] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1063.838827][ T2936] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1063.844252][ T2936] ? do_syscall_64+0x26/0x610 [ 1063.848910][ T2936] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1063.854941][ T2936] ? do_syscall_64+0x26/0x610 [ 1063.859593][ T2936] __x64_sys_sendmmsg+0x9d/0x100 [ 1063.864501][ T2936] do_syscall_64+0x103/0x610 [ 1063.869073][ T2936] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1063.874931][ T2936] RIP: 0033:0x457e29 [ 1063.878798][ T2936] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1063.898372][ T2936] RSP: 002b:00007faa187c9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1063.906756][ T2936] RAX: ffffffffffffffda RBX: 00007faa187c9c90 RCX: 0000000000457e29 [ 1063.914706][ T2936] RDX: 0000000000000001 RSI: 0000000020003f80 RDI: 0000000000000003 [ 1063.922651][ T2936] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1063.930594][ T2936] R10: 0000000000000040 R11: 0000000000000246 R12: 00007faa187ca6d4 [ 1063.938573][ T2936] R13: 00000000004c4dd7 R14: 00000000004d8b10 R15: 0000000000000004 [ 1064.060809][ T3034] JFS: Cannot determine volume size [ 1064.066114][ T3034] jfs: Unrecognized mount option "obj_role=" or missing value [ 1064.097477][ T3034] JFS: Cannot determine volume size [ 1064.102686][ T3034] jfs: Unrecognized mount option "obj_role=" or missing value 11:24:36 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:24:36 executing program 4 (fault-call:4 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 11:24:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1066.145795][ T3054] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1066.154189][ T3054] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1066.162149][ T3054] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1066.170112][ T3054] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1066.178069][ T3054] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1066.186605][ T3054] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 [ 1066.194586][ T3045] CPU: 1 PID: 3045 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190227 #44 [ 1066.203616][ T3045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1066.213667][ T3045] Call Trace: [ 1066.216966][ T3045] dump_stack+0x172/0x1f0 [ 1066.221294][ T3045] should_fail.cold+0xa/0x15 [ 1066.225885][ T3045] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1066.231688][ T3045] ? ___might_sleep+0x163/0x280 [ 1066.236562][ T3045] __should_failslab+0x121/0x190 [ 1066.241521][ T3045] should_failslab+0x9/0x14 [ 1066.246026][ T3045] kmem_cache_alloc_node_trace+0x270/0x720 [ 1066.251833][ T3045] __kmalloc_node_track_caller+0x3d/0x70 [ 1066.257464][ T3045] __kmalloc_reserve.isra.0+0x40/0xf0 11:24:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f00000004c0)=0xc) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r2, &(0x7f0000000680)={0x6f, 0x7d, 0x1, {{0x0, 0x53, 0x3, 0x40, {0x4, 0x0, 0x2}, 0x2010000, 0x8, 0xffff, 0x0, 0x0, '', 0xa, 'selfvmnet0', 0xc, '}[em0%%wlan0', 0xa, '\"vboxnet1]'}, 0x7, 'system{', r4, r5, r6}}, 0x6f) getpgid(r3) io_setup(0x7f, &(0x7f0000000000)=0x0) io_submit(r7, 0x2, &(0x7f0000000380)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x80000001, r0, &(0x7f00000000c0)="0319fac8fa2e04005b180fe2b63aec4a1a58cd42b419c4f7fdaaccf23633ef3520debfc96e0a90d1c48ad8c3d78c8382e2f49bead70bb747451bdddfdb6f110b802f6e095d706613ab1fccb19d2da05c968e4e7747bc9c3cfe9d97495c011b4023ebe724b78a404eb5f3aa94384c5cec58b44e8dfaf20a743397e17db1a5e49940feed5f05503559dcba7653d032a6ea2fb252ae5bcfa024ef36e86669226753c8be2f5247890423ed75e40762", 0xad, 0x1, 0x0, 0x3, r1}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x6, r0, &(0x7f0000000240)="8be5e90534d6cdf7b9f6cfc31c8dcf9a808a1b41461e6eca4081e9027798eb695a69d70706b15d603ddcdebeafdfc1414bcf99f4f8e7e28d6c0befae2048c1c1454312d13242352895910098c4325bc1b1fc785aa14d9eaf534e8d1caed47c0cb45a49ceef086bf611b1429aa81500eb32cf8e6f005395ad4b0c507e58c45777fd46404ee1c15582c35ef442808b5313dde1b22b67d559e34ae1cb70d9923ad8c762fd4dbde5f373cef2dc0367168f0ed8b6d56f7306d367b0a09abd54304cc5d7c66e096beafcbd3be6d175241ab1aef70f2f670284ad70dfa23f8f51b541ba5dd52d64c09c12a026f086a95ff8319b", 0xf0, 0x8001, 0x0, 0x3, 0xffffffffffffff9c}]) [ 1066.262842][ T3045] __alloc_skb+0x10b/0x5e0 [ 1066.267260][ T3045] ? skb_trim+0x190/0x190 [ 1066.271588][ T3045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1066.277854][ T3045] ? tcp_chrono_stop+0x1f9/0x3b0 [ 1066.282795][ T3045] sk_stream_alloc_skb+0xc8/0x860 [ 1066.287844][ T3045] tcp_connect+0xfd8/0x4330 [ 1066.292365][ T3045] ? tcp_push_one+0x110/0x110 [ 1066.297043][ T3045] ? tcp_sendmsg_locked+0x2198/0x34b0 [ 1066.302417][ T3045] ? kmem_cache_alloc_trace+0x354/0x760 [ 1066.307975][ T3045] ? mark_held_locks+0xf0/0xf0 11:24:37 executing program 4 (fault-call:4 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 11:24:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000004c0)='net/raw\x00') openat$cgroup_ro(r2, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1066.529516][ T3045] RSP: 002b:00007faa187c9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1066.537927][ T3045] RAX: ffffffffffffffda RBX: 00007faa187c9c90 RCX: 0000000000457e29 [ 1066.545901][ T3045] RDX: 0000000000000001 RSI: 0000000020003f80 RDI: 0000000000000003 [ 1066.553868][ T3045] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 11:24:37 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1066.561834][ T3045] R10: 0000000000000040 R11: 0000000000000246 R12: 00007faa187ca6d4 [ 1066.569823][ T3045] R13: 00000000004c4dd7 R14: 00000000004d8b10 R15: 0000000000000004 11:24:37 executing program 5 (fault-call:5 fault-nth:3): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:24:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1066.913478][ T3433] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1066.921874][ T3433] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1066.929832][ T3433] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1066.937795][ T3433] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1066.945759][ T3433] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1066.953716][ T3433] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 11:24:38 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d27766d6e6574312c005345531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:24:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1067.283934][ T3446] RSP: 002b:00007faa187c9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1067.292322][ T3446] RAX: ffffffffffffffda RBX: 00007faa187c9c90 RCX: 0000000000457e29 [ 1067.300275][ T3446] RDX: 0000000000000001 RSI: 0000000020003f80 RDI: 0000000000000003 [ 1067.308233][ T3446] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 11:24:38 executing program 4 (fault-call:4 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 11:24:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r1, 0x0, 0x25, &(0x7f0000000180)='(\x80security])vboxnet0bdevem0{\'trusted\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r3, r2, 0x0, 0xb8, &(0x7f00000000c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1067.719633][ T3885] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1067.728032][ T3885] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1067.736017][ T3885] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1067.743974][ T3885] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1067.751933][ T3885] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1067.759901][ T3885] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 [ 1067.767888][ T3887] CPU: 0 PID: 3887 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190227 #44 [ 1067.776902][ T3887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1067.776907][ T3887] Call Trace: 11:24:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x7, 0x3, 0x5, 0xff, 0x2, 0x1, 0x2, {0x0, @in6={{0xa, 0x4e20, 0x6, @remote, 0x9}}, 0xfffffffffffff800, 0xa5, 0x5, 0x4, 0x4}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180)={r1, 0xf4a, 0x5}, 0x8) openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1068.096494][ T3887] RSP: 002b:00007faa187c9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1068.104885][ T3887] RAX: ffffffffffffffda RBX: 00007faa187c9c90 RCX: 0000000000457e29 [ 1068.112827][ T3887] RDX: 0000000000000001 RSI: 0000000020003f80 RDI: 0000000000000003 [ 1068.120769][ T3887] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1068.128736][ T3887] R10: 0000000000000040 R11: 0000000000000246 R12: 00007faa187ca6d4 [ 1068.136680][ T3887] R13: 00000000004c4dd7 R14: 00000000004d8b10 R15: 0000000000000004 [ 1068.152229][ T3878] JFS: Cannot determine volume size [ 1068.164876][ T3878] jfs: Unrecognized mount option "obj_role=" or missing value 11:24:39 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d27766d6e6574312c003045531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:24:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1070.964793][ T4127] RSP: 002b:00007faa187c9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1070.973203][ T4127] RAX: ffffffffffffffda RBX: 00007faa187c9c90 RCX: 0000000000457e29 [ 1070.981163][ T4127] RDX: 0000000000000001 RSI: 0000000020003f80 RDI: 0000000000000003 [ 1070.989119][ T4127] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1070.997077][ T4127] R10: 0000000000000040 R11: 0000000000000246 R12: 00007faa187ca6d4 11:24:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) r1 = syz_open_dev$vcsn(&(0x7f00000006c0)='/dev/vcs#\x00', 0x81, 0x1a1400) accept4$bt_l2cap(r1, &(0x7f0000000700), &(0x7f0000000800)=0xe, 0x80000) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='\x00\b\x00\x06\x00\x00\x00\x00\x00\x00\x00\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\xae\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd[4\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$DRM_IOCTL_ADD_MAP(r2, 0xc0286415, &(0x7f0000000680)={&(0x7f0000490000/0x3000)=nil, 0x4, 0x3, 0x4, &(0x7f0000670000/0x1000)=nil, 0x6}) openat$cgroup_ro(r2, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1071.215752][ T4126] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1071.224176][ T4126] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1071.232136][ T4126] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1071.240101][ T4126] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1071.248067][ T4126] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 11:24:42 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:24:42 executing program 5 (fault-call:5 fault-nth:6): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1071.256028][ T4126] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 11:24:42 executing program 4 (fault-call:4 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 11:24:42 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d27766d6e6574312c005345531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:24:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x58, &(0x7f0000000580)=[@in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e23, 0x8001, @local, 0x1}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e23, 0xf436, @dev={0xfe, 0x80, [], 0xe}, 0x3}]}, &(0x7f0000000640)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000680)={r1, 0x80000000}, &(0x7f00000006c0)=0x8) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000700)={[0x5f1951bd, 0x4, 0x1, 0x3, 0x49d, 0x6, 0x10001f, 0x100, 0x20, 0x1, 0x3f, 0x5, 0x51, 0x0, 0x0, 0x87], 0x3000, 0x2}) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000000)={&(0x7f0000000240)=""/249, 0x2000, 0x1800, 0x7}, 0x18) r2 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000880)={{{@in=@loopback, @in6=@remote, 0x4e21, 0x0, 0x4e24, 0x2, 0x2, 0x20, 0x80, 0x3a, 0x0, r4}, {0x4, 0xe2ea, 0x0, 0xffffffff, 0x4, 0xff, 0x98, 0x6}, {0x8001, 0x7, 0x2, 0xa4}, 0x14, 0x0, 0x2, 0x0, 0x3}, {{@in=@remote, 0x4d3, 0xff}, 0xa, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x34ff, 0x2, 0x1, 0x20, 0x5, 0x0, 0x80000000}}, 0xe8) keyctl$describe(0x6, r3, &(0x7f0000000480)=""/218, 0xda) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clock_adjtime(0x4, &(0x7f00000000c0)={0x3, 0x1f, 0x8, 0x7, 0xffffffff, 0x32, 0x354d56cb, 0x5, 0x5, 0x8, 0x10001, 0x5, 0x7f, 0x2, 0x7, 0x9, 0x7, 0x0, 0x7, 0x4, 0x7f, 0x8, 0x5, 0x0, 0x4, 0x2}) write$P9_RXATTRWALK(r5, &(0x7f0000000080)={0xf}, 0x2000008f) r6 = socket$rds(0x15, 0x5, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r6) ioctl$TIOCNXCL(r2, 0x540d) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000a00)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000009c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f0000000a40)={0x16, 0x98, 0xfa00, {&(0x7f0000000980), 0x4, r7, 0x1c, 0x0, @ib={0x1b, 0xd0b, 0x3ff, {"0453282981d72a817c00278ecf10c48d"}, 0x7ba0, 0x0, 0xfffffffffffffffa}}}, 0xa0) [ 1071.589515][ T4551] ? __check_object_size+0x3d/0x42f [ 1071.594715][ T4551] ? copy_strings_kernel+0x110/0x110 [ 1071.599988][ T4551] ? strncpy_from_user+0x2a8/0x380 [ 1071.605111][ T4551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1071.611361][ T4551] __x64_sys_execveat+0xed/0x130 [ 1071.616304][ T4551] do_syscall_64+0x103/0x610 [ 1071.620923][ T4551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1071.626809][ T4551] RIP: 0033:0x457e29 [ 1071.630696][ T4551] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1071.650304][ T4551] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1071.658708][ T4551] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1071.666699][ T4551] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1071.674663][ T4551] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1071.682622][ T4551] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 11:24:42 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0xf23976b1573cd7bd, 0x40}) ioctl$DRM_IOCTL_AGP_BIND(r2, 0x40106436, &(0x7f0000000100)={r3, 0x6}) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 1071.690583][ T4551] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 [ 1071.714515][ T4561] JFS: Cannot determine volume size [ 1071.725614][ T4528] CPU: 1 PID: 4528 Comm: syz-executor.5 Not tainted 5.0.0-rc8-next-20190227 #44 [ 1071.734645][ T4528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1071.744688][ T4528] Call Trace: [ 1071.747986][ T4528] dump_stack+0x172/0x1f0 [ 1071.752317][ T4528] should_fail.cold+0xa/0x15 [ 1071.756896][ T4528] ? mark_held_locks+0xf0/0xf0 [ 1071.761666][ T4528] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1071.767461][ T4528] ? should_fail+0x1de/0x852 [ 1071.772047][ T4528] ? __nf_conntrack_find_get+0xe41/0x1970 [ 1071.775835][ T4561] jfs: Unrecognized mount option "obj_role=" or missing value [ 1071.777762][ T4528] __should_failslab+0x121/0x190 [ 1071.790217][ T4528] should_failslab+0x9/0x14 [ 1071.794736][ T4528] __kmalloc_track_caller+0x6d/0x740 [ 1071.800059][ T4528] ? lock_downgrade+0x880/0x880 [ 1071.804906][ T4528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1071.811141][ T4528] ? nf_ct_ext_add+0x2a9/0x640 [ 1071.815912][ T4528] __krealloc+0x71/0xc0 [ 1071.820076][ T4528] nf_ct_ext_add+0x2a9/0x640 [ 1071.824667][ T4528] init_conntrack.isra.0+0x439/0x1170 [ 1071.830040][ T4528] ? nf_conntrack_alloc+0x50/0x50 [ 1071.835062][ T4528] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1071.841299][ T4528] ? ipt_do_table+0xf1e/0x1b90 [ 1071.846055][ T4528] ? __lock_acquire+0x55d/0x4710 [ 1071.850979][ T4528] nf_conntrack_in+0xd93/0x1410 [ 1071.855808][ T4528] ? nf_conntrack_update+0x960/0x960 [ 1071.861076][ T4528] ? __do_replace+0x910/0x910 [ 1071.865723][ T4528] ? __lock_acquire+0x55d/0x4710 [ 1071.870632][ T4528] ? save_stack+0xa9/0xd0 [ 1071.874935][ T4528] ipv4_conntrack_local+0x169/0x210 [ 1071.880105][ T4528] nf_hook_slow+0xbf/0x1f0 [ 1071.884506][ T4528] __ip_local_out+0x403/0x880 [ 1071.889165][ T4528] ? ip_finish_output+0xd50/0xd50 [ 1071.894185][ T4528] ? ip_append_data.part.0+0x170/0x170 [ 1071.899615][ T4528] ip_local_out+0x2d/0x1b0 [ 1071.904006][ T4528] __ip_queue_xmit+0x86f/0x1bf0 [ 1071.908829][ T4528] ? kasan_check_write+0x14/0x20 [ 1071.913748][ T4528] ip_queue_xmit+0x5a/0x70 [ 1071.918150][ T4528] __tcp_transmit_skb+0x1a32/0x3750 [ 1071.923339][ T4528] ? __tcp_select_window+0x8b0/0x8b0 [ 1071.928593][ T4528] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1071.934284][ T4528] ? _copy_from_iter+0x312/0xc60 [ 1071.939194][ T4528] ? check_stack_object+0x114/0x160 [ 1071.944368][ T4528] ? __phys_addr_symbol+0x30/0x70 [ 1071.949368][ T4528] ? kasan_check_write+0x14/0x20 [ 1071.954294][ T4528] tcp_connect+0x1bb1/0x4330 [ 1071.958862][ T4528] ? tcp_push_one+0x110/0x110 [ 1071.963511][ T4528] ? tcp_sendmsg_locked+0x2198/0x34b0 [ 1071.968871][ T4528] ? kmem_cache_alloc_trace+0x354/0x760 [ 1071.974391][ T4528] ? mark_held_locks+0xf0/0xf0 [ 1071.979125][ T4528] ? _copy_from_user+0xdd/0x150 [ 1071.983972][ T4528] tcp_sendmsg_locked+0x284b/0x34b0 [ 1071.989142][ T4528] ? lock_sock_nested+0xac/0x120 [ 1071.994051][ T4528] ? find_held_lock+0x35/0x130 [ 1071.998792][ T4528] ? mark_held_locks+0xa4/0xf0 [ 1072.003541][ T4528] ? tcp_sendpage+0x60/0x60 [ 1072.008049][ T4528] ? lock_sock_nested+0x9a/0x120 [ 1072.012970][ T4528] ? trace_hardirqs_on+0x67/0x230 [ 1072.017967][ T4528] ? lock_sock_nested+0x9a/0x120 [ 1072.022880][ T4528] ? __local_bh_enable_ip+0x15a/0x270 [ 1072.028224][ T4528] tcp_sendmsg+0x30/0x50 [ 1072.032442][ T4528] inet_sendmsg+0x147/0x5d0 [ 1072.036920][ T4528] ? ipip_gro_receive+0x100/0x100 [ 1072.041925][ T4528] sock_sendmsg+0xdd/0x130 [ 1072.046365][ T4528] ___sys_sendmsg+0x3e2/0x930 [ 1072.051068][ T4528] ? copy_msghdr_from_user+0x430/0x430 [ 1072.056500][ T4528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1072.062737][ T4528] ? kasan_check_read+0x11/0x20 [ 1072.067574][ T4528] ? __fget+0x381/0x550 [ 1072.071710][ T4528] ? ksys_dup3+0x3e0/0x3e0 [ 1072.076099][ T4528] ? find_held_lock+0x35/0x130 [ 1072.080838][ T4528] ? __fget_light+0x1a9/0x230 [ 1072.085490][ T4528] ? __fdget+0x1b/0x20 [ 1072.089541][ T4528] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1072.095751][ T4528] ? sockfd_lookup_light+0xcb/0x180 [ 1072.100963][ T4528] __sys_sendmmsg+0x1c3/0x4e0 [ 1072.105626][ T4528] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1072.110680][ T4528] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1072.116903][ T4528] ? fput_many+0x12c/0x1a0 [ 1072.121290][ T4528] ? fput+0x1b/0x20 [ 1072.125072][ T4528] ? ksys_write+0x166/0x1f0 [ 1072.129566][ T4528] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1072.134998][ T4528] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1072.140443][ T4528] ? do_syscall_64+0x26/0x610 [ 1072.145102][ T4528] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.151147][ T4528] ? do_syscall_64+0x26/0x610 [ 1072.155816][ T4528] __x64_sys_sendmmsg+0x9d/0x100 [ 1072.160738][ T4528] do_syscall_64+0x103/0x610 [ 1072.165339][ T4528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.171215][ T4528] RIP: 0033:0x457e29 11:24:43 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:24:43 executing program 4 (fault-call:4 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 11:24:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\xdbD\x0f7>\'\xe3KH\xaf/\x83\xa7\x16') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) 11:24:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1072.175085][ T4528] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1072.194672][ T4528] RSP: 002b:00007faa187c9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1072.203051][ T4528] RAX: ffffffffffffffda RBX: 00007faa187c9c90 RCX: 0000000000457e29 [ 1072.210992][ T4528] RDX: 0000000000000001 RSI: 0000000020003f80 RDI: 0000000000000003 [ 1072.218933][ T4528] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1072.226875][ T4528] R10: 0000000000000040 R11: 0000000000000246 R12: 00007faa187ca6d4 [ 1072.234815][ T4528] R13: 00000000004c4dd7 R14: 00000000004d8b10 R15: 0000000000000004 11:24:43 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d27766d6e6574312c002d09531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) [ 1072.361012][ T4756] FAULT_INJECTION: forcing a failure. [ 1072.361012][ T4756] name failslab, interval 1, probability 0, space 0, times 0 [ 1072.406761][ T4756] CPU: 1 PID: 4756 Comm: syz-executor.4 Not tainted 5.0.0-rc8-next-20190227 #44 [ 1072.415791][ T4756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1072.425834][ T4756] Call Trace: [ 1072.429130][ T4756] dump_stack+0x172/0x1f0 [ 1072.433477][ T4756] should_fail.cold+0xa/0x15 [ 1072.433509][ T4756] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1072.433530][ T4756] ? ___might_sleep+0x163/0x280 [ 1072.433551][ T4756] __should_failslab+0x121/0x190 [ 1072.443909][ T4756] should_failslab+0x9/0x14 [ 1072.443925][ T4756] kmem_cache_alloc_trace+0x2d1/0x760 [ 1072.443948][ T4756] __do_execve_file.isra.0+0x325/0x23f0 [ 1072.443968][ T4756] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1072.475316][ T4756] ? __phys_addr_symbol+0x30/0x70 [ 1072.480339][ T4756] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1072.486072][ T4756] ? __check_object_size+0x3d/0x42f [ 1072.491282][ T4756] ? copy_strings_kernel+0x110/0x110 [ 1072.496578][ T4756] ? strncpy_from_user+0x2a8/0x380 [ 1072.501693][ T4756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1072.507949][ T4756] __x64_sys_execveat+0xed/0x130 [ 1072.512897][ T4756] do_syscall_64+0x103/0x610 [ 1072.517491][ T4756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1072.523387][ T4756] RIP: 0033:0x457e29 [ 1072.527283][ T4756] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1072.546878][ T4756] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 11:24:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000140)='ppp1cgroup\\)\x00', 0xffffffffffffffff}, 0x30) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1072.982014][ T5032] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1072.990392][ T5032] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1072.998338][ T5032] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1073.006293][ T5032] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1073.014247][ T5032] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1073.022211][ T5032] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 11:24:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:24:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f0000000180)=0xc) write$FUSE_LK(r1, &(0x7f00000001c0)={0x28, 0x0, 0x4, {{0x7, 0x8001, 0x1, r2}}}, 0x28) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x70, 0x2800, 0x5, 0xbce, 0x7f, 0x0, 0x4, 0x10000, 0x1, 0x8001, 0x9, 0x100, 0x6, 0x6, 0x3, 0x80000000, 0x2, 0x9, 0x7, 0x7, 0x6, 0x8000, 0x250000000000, 0xffff, 0x6, 0x9, 0x7, 0x4, 0x4f2, 0x1000, 0x2, 0x3, 0x2, 0x1, 0x7, 0x4, 0x80, 0x0, 0x100000000, 0x0, @perf_bp, 0x11080, 0x8, 0x89f, 0x6, 0x81, 0x8, 0x61}, r0, 0x6, r3, 0x23c190b3de718ceb) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000200)=0x1, 0x4) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x2000008f) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000480)={&(0x7f0000760000/0x1000)=nil, &(0x7f00001f8000/0x1000)=nil, &(0x7f00007f7000/0x2000)=nil, &(0x7f0000482000/0xc000)=nil, &(0x7f00001a5000/0x1000)=nil, &(0x7f00001e3000/0x3000)=nil, &(0x7f000079a000/0x3000)=nil, &(0x7f000042c000/0x4000)=nil, &(0x7f000046c000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000673000/0x3000)=nil, &(0x7f00000002c0)="b55511bd6650f69f72621186b4a3a958975eed5ff831c7a677925c748cc0b77750e8fcb0556b394a469f7024900a66bd959a2aeb14f31ce81de6ef16cb416194d43b2e727c66701cb33e9e957fb604fe9a6f04be273129234c5b47a8cb2b665c9fc5779bb90856acb50e04aa1b59525df99eacff575a42c1ffe93f7b11b876067629cc7fe55ccb38fde6a7376d2fa427c16f3d9fa07d020bbeb9b0ba6812602f063e1a37b4ea4de4fd749db012c978a011796cfff168cf8850dae4ebf2155a3eab8985f46c613fa53e3cdc55cff91d5bf344fba301749eff6e221606124751", 0xdf, r1}, 0x68) 11:24:46 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1075.443213][ T5047] ? ___might_sleep+0x163/0x280 [ 1075.443230][ T5047] __should_failslab+0x121/0x190 [ 1075.443282][ T5047] should_failslab+0x9/0x14 [ 1075.443297][ T5047] __kmalloc+0x2dc/0x740 [ 1075.443313][ T5047] ? refcount_inc_not_zero_checked+0x144/0x200 [ 1075.443334][ T5047] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1075.474482][ T5047] ? security_prepare_creds+0x123/0x190 [ 1075.480024][ T5047] security_prepare_creds+0x123/0x190 [ 1075.485394][ T5047] prepare_creds+0x2f5/0x3f0 11:24:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1075.578261][ T5047] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1075.586698][ T5047] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 11:24:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r1, 0x20400000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) [ 1075.594667][ T5047] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1075.602628][ T5047] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1075.610594][ T5047] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1075.618558][ T5047] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 11:24:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x4, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:24:46 executing program 4 (fault-call:4 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1075.694181][ T5042] JFS: Cannot determine volume size [ 1075.699381][ T5042] jfs: Unrecognized mount option "obj_role=" or missing value 11:24:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f000021d000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0xff4e, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) syz_emit_ethernet(0x5c, &(0x7f0000359fd5)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000240)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x99\x84\x1e\x8d\x02\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, @in6={{0xa, 0x4e20, 0xff, @dev={0xfe, 0x80, [], 0xd}, 0x3fffc00000}}, [0x6, 0x6, 0x7, 0xfffffffffffff967, 0x7fff, 0x101, 0x10000, 0x8000, 0x8, 0x10000, 0x8, 0xfffffffffffffffb, 0x2, 0x8, 0x7]}, &(0x7f0000000140)=0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000004c0)={r4, 0x1000, "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"}, &(0x7f0000000180)=0x1008) [ 1075.777445][ T5482] FAULT_INJECTION: forcing a failure. [ 1075.777445][ T5482] name failslab, interval 1, probability 0, space 0, times 0 [ 1075.798388][ T5482] CPU: 0 PID: 5482 Comm: syz-executor.4 Not tainted 5.0.0-rc8-next-20190227 #44 [ 1075.807410][ T5482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1075.817468][ T5482] Call Trace: [ 1075.820799][ T5482] dump_stack+0x172/0x1f0 [ 1075.825150][ T5482] should_fail.cold+0xa/0x15 [ 1075.829740][ T5482] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1075.835562][ T5482] ? ___might_sleep+0x163/0x280 [ 1075.840424][ T5482] __should_failslab+0x121/0x190 [ 1075.845363][ T5482] should_failslab+0x9/0x14 [ 1075.849861][ T5482] kmem_cache_alloc+0x2b2/0x6f0 [ 1075.854707][ T5482] ? kasan_check_read+0x11/0x20 [ 1075.859599][ T5482] __alloc_file+0x27/0x300 [ 1075.864028][ T5482] alloc_empty_file+0x72/0x170 [ 1075.868802][ T5482] path_openat+0xef/0x46e0 [ 1075.873219][ T5482] ? save_stack+0xa9/0xd0 11:24:46 executing program 3: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000180)='environ\x00') openat$cgroup_ro(r1, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1076.052035][ T5482] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1076.060466][ T5482] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1076.068410][ T5482] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1076.076384][ T5482] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1076.084355][ T5482] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1076.092307][ T5482] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 11:24:47 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d27766d6e6574312c002d53531c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:24:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r1, 0x20400000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) [ 1076.267740][ T5953] JFS: Cannot determine volume size [ 1076.297775][ T5953] jfs: Unrecognized mount option "obj_role=" or missing value [ 1076.364704][ T5953] JFS: Cannot determine volume size [ 1076.392513][ T5953] jfs: Unrecognized mount option "obj_role=" or missing value 11:24:49 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:24:49 executing program 4 (fault-call:4 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 11:24:49 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f \xcc\x1d\xd13\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87,\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xff\xff4\xdaL;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1078.993398][ T6016] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1079.001821][ T6016] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1079.009824][ T6016] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1079.017780][ T6016] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 11:24:50 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0x0, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:24:50 executing program 4 (fault-call:4 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1079.025752][ T6016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1079.033740][ T6016] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 11:24:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1079.404322][ T6455] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1079.412713][ T6455] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1079.420671][ T6455] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 11:24:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, @ANYBLOB="ac0000009e95d8db821389d5aee7fa3e222b09d240f21fbd990fbe65b6dcbd140200b21f93be76dfa2b57a33a2d64bdbef52637efaf37874d1c779dc18cec6ad5c8c07e74eab74534e344e5fdf64b20f31058e80ac77b9b1432c053e247a82d8f7e66306b700e9741e90eccfca32e4bd370cacd9aa1ba223ebdf3ee26b4f1a434480c02c2e0000d36e803df7667beb706ac06606cacf9ab8a6d293fb9d319cf1efd5b2be17121348a2187ea8bea4f8e193b286cadf7d6e23e4dd6a0e5323b2551eeafd405e0d0de9add122bbd427100cd8f5"], &(0x7f0000000000)=0xb4) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000180)={r2, 0x81}, 0x8) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000600000000000000000000000000000000c38e0000000000000000000000000000000000000000000000000000000000000000000000000000000100000003000000faffffffffffffff000000000000000006000000000000003f0000000000000000000000000000000000000000000000000000000000000000000000f400000001000000010000003f00000000000000ffffffff000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) [ 1079.633651][ T6762] JFS: Cannot determine volume size 11:24:50 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xfb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1079.839633][ T6777] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1079.848020][ T6777] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1079.855965][ T6777] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1079.863921][ T6777] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1079.871876][ T6777] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1079.879845][ T6777] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 [ 1079.910827][ T6762] JFS: Cannot determine volume size [ 1079.917137][ T6762] jfs: Unrecognized mount option "obj_role=" or missing value 11:24:53 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0x0, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:24:53 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') ioctl$VT_DISALLOCATE(r0, 0x5608) lseek(r1, 0x20400000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) 11:24:53 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10d403) write$P9_RSTATFS(r0, &(0x7f00000000c0)={0x43, 0x9, 0x2, {0x8, 0x1, 0x6e, 0x37f9, 0x3f, 0xc8, 0xfffffffffffffffe, 0xff, 0x1d}}, 0x43) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000240)='fd/4\x00') write$P9_RRENAME(r3, &(0x7f0000000040)={0x7, 0x15, 0x1}, 0x7) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000280)={'broute\x00'}, &(0x7f0000000180)=0x78) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf, 0x1f, 0x2}, 0xf) 11:24:53 executing program 4 (fault-call:4 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 11:24:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x218, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:24:53 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d27766d6e6574312c002d45041c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) [ 1082.171155][ T7098] FAULT_INJECTION: forcing a failure. [ 1082.171155][ T7098] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1082.188794][ T7098] CPU: 0 PID: 7098 Comm: syz-executor.4 Not tainted 5.0.0-rc8-next-20190227 #44 [ 1082.197815][ T7098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1082.207874][ T7098] Call Trace: [ 1082.207897][ T7098] dump_stack+0x172/0x1f0 [ 1082.207918][ T7098] should_fail.cold+0xa/0x15 [ 1082.207942][ T7098] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1082.220487][ T7092] JFS: Cannot determine volume size [ 1082.225895][ T7098] ? ___might_sleep+0x163/0x280 [ 1082.225918][ T7098] should_fail_alloc_page+0x50/0x60 [ 1082.225933][ T7098] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1082.225957][ T7098] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1082.235985][ T7098] ? find_held_lock+0x35/0x130 [ 1082.236016][ T7098] ? percpu_ref_put_many+0x94/0x190 [ 1082.236031][ T7098] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 11:24:53 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0x0, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1082.236049][ T7098] alloc_pages_current+0x107/0x210 [ 1082.236085][ T7098] __get_free_pages+0xc/0x40 [ 1082.247528][ T7092] jfs: Unrecognized mount option "obj_role=" or missing value [ 1082.252332][ T7098] pgd_alloc+0x8b/0x3f0 [ 1082.252359][ T7098] ? pgd_page_get_mm+0x40/0x40 [ 1082.252372][ T7098] ? lockdep_init_map+0x10c/0x5b0 [ 1082.252385][ T7098] ? lockdep_init_map+0x10c/0x5b0 [ 1082.252404][ T7098] mm_init+0x590/0x9b0 [ 1082.308655][ T7098] mm_alloc+0xa6/0xd0 [ 1082.312638][ T7098] __do_execve_file.isra.0+0xaa3/0x23f0 [ 1082.318177][ T7098] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1082.324408][ T7098] ? copy_strings_kernel+0x110/0x110 [ 1082.329677][ T7098] ? strncpy_from_user+0x2a8/0x380 [ 1082.334761][ T7098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1082.340975][ T7098] __x64_sys_execveat+0xed/0x130 [ 1082.345892][ T7098] do_syscall_64+0x103/0x610 [ 1082.350455][ T7098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1082.356361][ T7098] RIP: 0033:0x457e29 [ 1082.360266][ T7098] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1082.379962][ T7098] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1082.388341][ T7098] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1082.396287][ T7098] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1082.404231][ T7098] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1082.412203][ T7098] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 11:24:53 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r2 = openat$cgroup_ro(r1, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1082.867105][ T7419] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1082.875520][ T7419] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1082.883485][ T7419] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1082.891448][ T7419] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 11:24:53 executing program 4 (fault-call:4 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1082.899416][ T7419] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1082.907377][ T7419] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 11:24:53 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev\x00') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, &(0x7f00000002c0)) setfsgid(r4) [ 1083.041154][ T7996] FAULT_INJECTION: forcing a failure. [ 1083.041154][ T7996] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1083.042442][ T7994] JFS: Cannot determine volume size [ 1083.094823][ T7996] CPU: 1 PID: 7996 Comm: syz-executor.4 Not tainted 5.0.0-rc8-next-20190227 #44 [ 1083.103838][ T7996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.113002][ T7994] jfs: Unrecognized mount option "obj_role=" or missing value [ 1083.113894][ T7996] Call Trace: [ 1083.113919][ T7996] dump_stack+0x172/0x1f0 [ 1083.113954][ T7996] should_fail.cold+0xa/0x15 [ 1083.113986][ T7996] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1083.114017][ T7996] ? ___might_sleep+0x163/0x280 11:24:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x500, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1083.114065][ T7996] should_fail_alloc_page+0x50/0x60 [ 1083.114082][ T7996] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1083.114104][ T7996] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1083.114122][ T7996] ? current_time+0x6b/0x140 [ 1083.165135][ T7996] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1083.170947][ T7996] ? __lock_acquire+0x55d/0x4710 [ 1083.175888][ T7996] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1083.181626][ T7996] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1083.187900][ T7996] alloc_pages_current+0x107/0x210 [ 1083.192992][ T7996] get_zeroed_page+0x14/0x50 [ 1083.197578][ T7996] __pud_alloc+0x3b/0x250 [ 1083.201885][ T7996] __handle_mm_fault+0x7a5/0x3ec0 [ 1083.206884][ T7996] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1083.212414][ T7996] ? find_held_lock+0x35/0x130 [ 1083.217201][ T7996] ? handle_mm_fault+0x322/0xb30 [ 1083.222113][ T7996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1083.228330][ T7996] ? kasan_check_read+0x11/0x20 [ 1083.233153][ T7996] handle_mm_fault+0x43f/0xb30 [ 1083.237942][ T7996] __get_user_pages+0x7b6/0x1a40 [ 1083.242858][ T7996] ? follow_page_mask+0x19a0/0x19a0 [ 1083.248029][ T7996] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1083.253736][ T7996] get_user_pages_remote+0x21d/0x440 [ 1083.259146][ T7996] copy_strings.isra.0+0x3dc/0x890 [ 1083.264251][ T7996] ? remove_arg_zero+0x590/0x590 [ 1083.269211][ T7996] ? prepare_binprm+0x6aa/0x940 [ 1083.274047][ T7996] ? lock_downgrade+0x880/0x880 [ 1083.278881][ T7996] ? vma_link+0x117/0x180 [ 1083.283182][ T7996] ? install_exec_creds+0x180/0x180 [ 1083.288361][ T7996] copy_strings_kernel+0xa5/0x110 [ 1083.293370][ T7996] __do_execve_file.isra.0+0x10ef/0x23f0 [ 1083.299001][ T7996] ? copy_strings_kernel+0x110/0x110 [ 1083.304275][ T7996] ? strncpy_from_user+0x2a8/0x380 [ 1083.309372][ T7996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1083.315611][ T7996] __x64_sys_execveat+0xed/0x130 [ 1083.320524][ T7996] do_syscall_64+0x103/0x610 [ 1083.325099][ T7996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1083.330988][ T7996] RIP: 0033:0x457e29 [ 1083.334868][ T7996] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1083.354469][ T7996] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1083.362868][ T7996] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1083.371338][ T7996] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1083.379287][ T7996] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1083.387230][ T7996] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 11:24:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x100000001, 0x30, 0x5, 0x6}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r2, @ANYBLOB="850000007e8987b702ec39403c082c810afd769c6d7f03612b1d07b11869a7f6c29f497107d164c39ac3dcc43e382f023840701810138abb56c15c742b8bdd8df05abd10f4ac3e2e7ccd627ea17a0666adc07b68d00f954ba23fcf3448a3d7c12acfd1b9660052fb64991bab4274617a76bc5a9077dea9773c0dc7c6539d91e1be7a41ed9309c55c3d"], &(0x7f0000000240)=0x8d) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) [ 1083.395172][ T7996] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 [ 1083.454810][ T7994] JFS: Cannot determine volume size [ 1083.482715][ T7994] jfs: Unrecognized mount option "obj_role=" or missing value 11:24:56 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:24:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000000c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1086.268283][ T8334] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1086.276684][ T8334] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1086.284662][ T8334] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1086.292628][ T8334] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 11:24:57 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) accept$packet(r0, &(0x7f0000001640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001680)=0x14) sendmsg$nl_route(r3, &(0x7f0000001740)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001700)={&(0x7f00000016c0)=@ipv6_getroute={0x2c, 0x1a, 0x200, 0x70bd28, 0x25dfdbfe, {0xa, 0x0, 0x80, 0x7, 0xff, 0x0, 0xfe, 0x1, 0x3700}, [@RTA_IIF={0x8, 0x1, r4}, @RTA_IIF={0x8, 0x1, r5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x8c0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) [ 1086.300574][ T8334] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1086.308532][ T8334] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 11:24:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x1, 0x3e81, 0x2f, 0xfffffffffffffffc, 0x7}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000100)={r3, @in={{0x2, 0x4e23, @empty}}}, 0x84) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000240)={0x0, 0x0, {0x51, 0x2, 0x5001, 0x9, 0x6, 0xa, 0x2, 0x2}}) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) 11:24:57 executing program 4 (fault-call:4 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1086.362474][ T8327] JFS: Cannot determine volume size [ 1086.384335][ T8327] jfs: Unrecognized mount option "obj_role=" or missing value 11:24:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d27766d6e6574312c002d45071c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) [ 1086.487741][ T8643] FAULT_INJECTION: forcing a failure. [ 1086.487741][ T8643] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.503600][ T8643] CPU: 1 PID: 8643 Comm: syz-executor.4 Not tainted 5.0.0-rc8-next-20190227 #44 [ 1086.512621][ T8643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1086.522693][ T8643] Call Trace: [ 1086.525973][ T8643] dump_stack+0x172/0x1f0 [ 1086.530285][ T8643] should_fail.cold+0xa/0x15 [ 1086.534862][ T8643] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1086.540676][ T8643] ? ___might_sleep+0x163/0x280 [ 1086.545502][ T8643] __should_failslab+0x121/0x190 [ 1086.550424][ T8643] should_failslab+0x9/0x14 [ 1086.554927][ T8643] kmem_cache_alloc+0x2b2/0x6f0 [ 1086.559765][ T8643] ? alloc_pages_current+0x10f/0x210 [ 1086.565039][ T8643] __pmd_alloc+0xc9/0x460 [ 1086.569360][ T8643] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1086.575602][ T8643] __handle_mm_fault+0x192a/0x3ec0 [ 1086.580707][ T8643] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1086.586230][ T8643] ? find_held_lock+0x35/0x130 [ 1086.590977][ T8643] ? handle_mm_fault+0x322/0xb30 [ 1086.595906][ T8643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1086.602147][ T8643] ? kasan_check_read+0x11/0x20 [ 1086.607002][ T8643] handle_mm_fault+0x43f/0xb30 [ 1086.611759][ T8643] __get_user_pages+0x7b6/0x1a40 [ 1086.616709][ T8643] ? follow_page_mask+0x19a0/0x19a0 [ 1086.621891][ T8643] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1086.627589][ T8643] get_user_pages_remote+0x21d/0x440 [ 1086.632854][ T8643] copy_strings.isra.0+0x3dc/0x890 [ 1086.637960][ T8643] ? remove_arg_zero+0x590/0x590 [ 1086.642880][ T8643] ? prepare_binprm+0x6aa/0x940 [ 1086.647700][ T8643] ? lock_downgrade+0x880/0x880 [ 1086.652521][ T8643] ? vma_link+0x117/0x180 [ 1086.656831][ T8643] ? install_exec_creds+0x180/0x180 [ 1086.662015][ T8643] copy_strings_kernel+0xa5/0x110 [ 1086.667024][ T8643] __do_execve_file.isra.0+0x10ef/0x23f0 [ 1086.672662][ T8643] ? copy_strings_kernel+0x110/0x110 [ 1086.677956][ T8643] ? strncpy_from_user+0x2a8/0x380 [ 1086.683052][ T8643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1086.689281][ T8643] __x64_sys_execveat+0xed/0x130 [ 1086.694208][ T8643] do_syscall_64+0x103/0x610 [ 1086.698798][ T8643] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1086.704666][ T8643] RIP: 0033:0x457e29 [ 1086.708548][ T8643] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1086.728124][ T8643] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1086.736523][ T8643] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1086.744484][ T8643] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1086.752430][ T8643] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1086.760373][ T8643] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1086.768319][ T8643] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 [ 1086.856095][ T8772] JFS: Cannot determine volume size [ 1086.874041][ T8772] jfs: Unrecognized mount option "obj_role=" or missing value [ 1086.934473][ T8772] JFS: Cannot determine volume size [ 1086.939802][ T8772] jfs: Unrecognized mount option "obj_role=" or missing value 11:25:00 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:25:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) r3 = syz_open_procfs(r2, &(0x7f0000000180)='fd/4\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x2000008f) socket$nl_generic(0x10, 0x3, 0x10) 11:25:00 executing program 4 (fault-call:4 fault-nth:18): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 11:25:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x900, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:25:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1089.332382][ T8784] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1089.340774][ T8784] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 11:25:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x1802, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:25:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f00000000c0)=0xc) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000100)={0x3, @null, r1}) r2 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, [0x2b, 0x6, 0x3, 0x101, 0xfff, 0xfffffffffffffff8, 0xfffffffffffffe72, 0x8, 0x0, 0x0, 0x6b0, 0x9, 0x3, 0x81, 0x1f]}, &(0x7f0000000140)=0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000180)={r4, 0x80000001}, &(0x7f0000000340)=0x8) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x2000008f) [ 1089.348717][ T8784] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1089.356659][ T8784] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1089.364616][ T8784] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1089.372562][ T8784] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 [ 1089.440057][ T8785] JFS: Cannot determine volume size [ 1089.446020][ T8785] jfs: Unrecognized mount option "obj_role=" or missing value [ 1089.461163][ T9003] FAULT_INJECTION: forcing a failure. [ 1089.461163][ T9003] name failslab, interval 1, probability 0, space 0, times 0 11:25:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x7, 0x0, 0x8}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r2, 0x5}, &(0x7f0000000140)=0x8) [ 1089.514652][ T9003] CPU: 1 PID: 9003 Comm: syz-executor.4 Not tainted 5.0.0-rc8-next-20190227 #44 [ 1089.523673][ T9003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.533719][ T9003] Call Trace: [ 1089.537128][ T9003] dump_stack+0x172/0x1f0 [ 1089.541462][ T9003] should_fail.cold+0xa/0x15 [ 1089.546048][ T9003] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1089.551857][ T9003] ? ___might_sleep+0x163/0x280 [ 1089.556703][ T9003] __should_failslab+0x121/0x190 11:25:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x2000, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1089.561640][ T9003] should_failslab+0x9/0x14 [ 1089.566140][ T9003] kmem_cache_alloc+0x2b2/0x6f0 [ 1089.570987][ T9003] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1089.577228][ T9003] ptlock_alloc+0x20/0x70 [ 1089.581568][ T9003] pte_alloc_one+0x6d/0x1a0 [ 1089.586068][ T9003] __pte_alloc+0x20/0x310 [ 1089.590391][ T9003] __handle_mm_fault+0x3391/0x3ec0 [ 1089.595503][ T9003] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1089.601045][ T9003] ? find_held_lock+0x35/0x130 [ 1089.605784][ T9003] ? handle_mm_fault+0x322/0xb30 [ 1089.610719][ T9003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1089.616940][ T9003] ? kasan_check_read+0x11/0x20 [ 1089.621765][ T9003] handle_mm_fault+0x43f/0xb30 [ 1089.626506][ T9003] __get_user_pages+0x7b6/0x1a40 [ 1089.631420][ T9003] ? follow_page_mask+0x19a0/0x19a0 [ 1089.636591][ T9003] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1089.642287][ T9003] get_user_pages_remote+0x21d/0x440 [ 1089.647550][ T9003] copy_strings.isra.0+0x3dc/0x890 [ 1089.652652][ T9003] ? remove_arg_zero+0x590/0x590 [ 1089.657566][ T9003] ? prepare_binprm+0x6aa/0x940 [ 1089.662389][ T9003] ? lock_downgrade+0x880/0x880 [ 1089.667210][ T9003] ? vma_link+0x117/0x180 [ 1089.671524][ T9003] ? install_exec_creds+0x180/0x180 [ 1089.676720][ T9003] copy_strings_kernel+0xa5/0x110 [ 1089.681723][ T9003] __do_execve_file.isra.0+0x10ef/0x23f0 [ 1089.687334][ T9003] ? copy_strings_kernel+0x110/0x110 [ 1089.692605][ T9003] ? strncpy_from_user+0x2a8/0x380 [ 1089.697690][ T9003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1089.703904][ T9003] __x64_sys_execveat+0xed/0x130 [ 1089.708816][ T9003] do_syscall_64+0x103/0x610 [ 1089.713381][ T9003] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1089.719244][ T9003] RIP: 0033:0x457e29 [ 1089.723123][ T9003] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1089.742703][ T9003] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1089.751084][ T9003] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1089.759049][ T9003] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1089.766990][ T9003] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1089.774935][ T9003] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1089.782880][ T9003] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 11:25:03 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:25:03 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1092.390726][ T9332] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1092.399150][ T9332] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 11:25:03 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) r3 = syz_open_procfs(r2, &(0x7f00000002c0)='net/ip6_tables_matches\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0xfff, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0xffffffff, 0xffff, 0x400, 0xe244, 0x8001}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000180)={r4, 0x3}, &(0x7f0000000240)=0x4) lseek(r3, 0x20400000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x2000008f) 11:25:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0xff0f, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1095.126172][T10071] JFS: Cannot determine volume size [ 1095.143368][T10071] jfs: Unrecognized mount option "obj_role=" or missing value [ 1095.143486][T10076] FAULT_INJECTION: forcing a failure. [ 1095.143486][T10076] name failslab, interval 1, probability 0, space 0, times 0 11:25:06 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8aa, 0x200) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0xef, "166641124c179376b35f883407620daf4628481be02ef4a1c09e4223fa87bc957e3d682331b5040eb9f86d25db51e87acb7ff0a3fbf1d2ab86d0ce7a85ac28ab5f5dc4ee960f2b4e72489e3f11c90ecf7f41d581679c933897c5f45b2d791fe408c189f24f7db257c22d620c885fa5a632829a9df0e7499587b55bc1efcf2829f7c65247fbb11236ffaaa0b8ba64026e3582d6de23f932b44c1c7dcd255ff90552d9f5132c499b165c441d1eab8fc19b7f08dc69bd4c9119833470f3944aebf8c908fd40a55f28f46617b414939e0317026cb335a8691514d2d9e5fb863c1b135a92b4c9bb9469d2bb88d4d4249242"}, &(0x7f0000000000)=0xf7) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000240)={0x800, 0x8000, 0x3ff, 0x3825, r3}, 0x10) [ 1095.225622][T10076] should_failslab+0x9/0x14 [ 1095.230119][T10076] kmem_cache_alloc+0x2b2/0x6f0 [ 1095.234999][T10076] ? __might_sleep+0x95/0x190 [ 1095.239677][T10076] __anon_vma_prepare+0x1b1/0x3c0 [ 1095.244705][T10076] ? __pte_alloc+0x1ba/0x310 [ 1095.249298][T10076] __handle_mm_fault+0x34db/0x3ec0 [ 1095.254414][T10076] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1095.260143][T10076] ? find_held_lock+0x35/0x130 [ 1095.264896][T10076] ? handle_mm_fault+0x322/0xb30 [ 1095.269812][T10076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1095.276053][T10076] ? kasan_check_read+0x11/0x20 [ 1095.280909][T10076] handle_mm_fault+0x43f/0xb30 [ 1095.285663][T10076] __get_user_pages+0x7b6/0x1a40 [ 1095.290621][T10076] ? follow_page_mask+0x19a0/0x19a0 [ 1095.295819][T10076] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1095.301546][T10076] get_user_pages_remote+0x21d/0x440 [ 1095.306837][T10076] copy_strings.isra.0+0x3dc/0x890 [ 1095.311949][T10076] ? remove_arg_zero+0x590/0x590 [ 1095.317286][T10076] ? prepare_binprm+0x6aa/0x940 [ 1095.322134][T10076] ? lock_downgrade+0x880/0x880 11:25:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) io_cancel(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x6, r0, &(0x7f00000002c0)="0e2f04da1d5a0ce0836d71ec11dac43b57e613a940eb73c2892a49f1d06961c6364bdf0529d8148bd3a42c1969dbc01b464860ff520041a6d4cc51dee003545d82c23171baae58e2dcbed8acc02588998f00ebc0d6c3599583b742d5c8d1d32c54b64f4fce072d719de28740bb9573cb1326676b3a13a230eaf73f1cdf1c63754c3d39d5cce77326fcd37ab98d45f007f8ccb70b0b404760e978564717f7b5ea7ab7f7d0e4db8d7d31c723d288656103293b67f9e1ef8df3c1a325497a35e0218b40", 0xc2, 0x8, 0x0, 0x3, 0xffffffffffffff9c}, &(0x7f00000004c0)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) fcntl$setsig(r0, 0xa, 0x6) mmap(&(0x7f00005a4000/0x1000)=nil, 0x1000, 0x1000000, 0x200000013, r2, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(serpent)\x00'}, 0xfffffffffffffda2) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000240)=0x5) [ 1095.326975][T10076] ? vma_link+0x117/0x180 [ 1095.331304][T10076] ? install_exec_creds+0x180/0x180 [ 1095.336546][T10076] copy_strings_kernel+0xa5/0x110 [ 1095.341592][T10076] __do_execve_file.isra.0+0x10ef/0x23f0 [ 1095.347227][T10076] ? copy_strings_kernel+0x110/0x110 [ 1095.352510][T10076] ? strncpy_from_user+0x2a8/0x380 [ 1095.357619][T10076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1095.363867][T10076] __x64_sys_execveat+0xed/0x130 [ 1095.368829][T10076] do_syscall_64+0x103/0x610 [ 1095.373424][T10076] entry_SYSCALL_64_after_hwframe+0x49/0xbe 11:25:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @loopback, @loopback, 0x1f, 0xff, 0x4, 0x100, 0xf7, 0x20000, r3}) ioctl$sock_rose_SIOCDELRT(r1, 0x890c, &(0x7f0000000240)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, @default, @bpq0='bpq0\x00', 0x7, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) [ 1095.379324][T10076] RIP: 0033:0x457e29 [ 1095.383214][T10076] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1095.402809][T10076] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1095.411208][T10076] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1095.419171][T10076] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 11:25:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x50000, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1095.427131][T10076] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1095.435082][T10076] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1095.443049][T10076] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 11:25:06 executing program 4 (fault-call:4 fault-nth:22): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1095.520116][T10071] JFS: Cannot determine volume size [ 1095.529585][T10071] jfs: Unrecognized mount option "obj_role=" or missing value [ 1095.560706][T10599] FAULT_INJECTION: forcing a failure. [ 1095.560706][T10599] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1095.595551][T10599] CPU: 1 PID: 10599 Comm: syz-executor.4 Not tainted 5.0.0-rc8-next-20190227 #44 [ 1095.604658][T10599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1095.614703][T10599] Call Trace: [ 1095.617991][T10599] dump_stack+0x172/0x1f0 [ 1095.622337][T10599] should_fail.cold+0xa/0x15 [ 1095.626933][T10599] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1095.632747][T10599] ? ___might_sleep+0x163/0x280 [ 1095.637622][T10599] should_fail_alloc_page+0x50/0x60 [ 1095.642826][T10599] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1095.648203][T10599] ? __anon_vma_prepare+0x184/0x3c0 [ 1095.653400][T10599] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1095.659166][T10599] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1095.665403][T10599] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1095.671627][T10599] alloc_pages_vma+0xdd/0x540 [ 1095.676307][T10599] __handle_mm_fault+0x1dd4/0x3ec0 [ 1095.681404][T10599] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1095.686920][T10599] ? find_held_lock+0x35/0x130 [ 1095.691681][T10599] ? handle_mm_fault+0x322/0xb30 [ 1095.696629][T10599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1095.702851][T10599] ? kasan_check_read+0x11/0x20 [ 1095.707678][T10599] handle_mm_fault+0x43f/0xb30 [ 1095.712447][T10599] __get_user_pages+0x7b6/0x1a40 [ 1095.717392][T10599] ? follow_page_mask+0x19a0/0x19a0 [ 1095.722582][T10599] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1095.728299][T10599] get_user_pages_remote+0x21d/0x440 [ 1095.733586][T10599] copy_strings.isra.0+0x3dc/0x890 [ 1095.738682][T10599] ? remove_arg_zero+0x590/0x590 [ 1095.743591][T10599] ? prepare_binprm+0x6aa/0x940 [ 1095.748413][T10599] ? lock_downgrade+0x880/0x880 [ 1095.753239][T10599] ? vma_link+0x117/0x180 [ 1095.757574][T10599] ? install_exec_creds+0x180/0x180 [ 1095.762755][T10599] copy_strings_kernel+0xa5/0x110 [ 1095.767758][T10599] __do_execve_file.isra.0+0x10ef/0x23f0 [ 1095.773406][T10599] ? copy_strings_kernel+0x110/0x110 [ 1095.778684][T10599] ? strncpy_from_user+0x2a8/0x380 [ 1095.783800][T10599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1095.790042][T10599] __x64_sys_execveat+0xed/0x130 [ 1095.794969][T10599] do_syscall_64+0x103/0x610 [ 1095.799584][T10599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1095.805448][T10599] RIP: 0033:0x457e29 [ 1095.809324][T10599] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1095.828898][T10599] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1095.837288][T10599] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1095.845238][T10599] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1095.853176][T10599] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1095.861124][T10599] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1095.869236][T10599] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 11:25:09 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:25:09 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="2f72646d61202d636473200000d4e05950a763621600000000000000"], 0x1c) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) getpgrp(r1) r2 = getpgid(0xffffffffffffffff) r3 = syz_open_procfs(r2, &(0x7f00000000c0)='status\x00') bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10) r4 = syz_open_procfs(r2, &(0x7f0000000240)='net/udp6\x00') dup2(r0, r3) openat$cgroup_ro(r4, &(0x7f0000000180)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) r3 = syz_open_procfs(r2, &(0x7f0000000040)='fd/4\x00') ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0bc5351, &(0x7f00000000c0)={0xd6, 0x0, 'client1\x00', 0x7, "e92f36f08e87d4a2", "5735e1c57bb0239e1f1ca9a2112f6286af0bc019bd68adc8dd45e2aef948b510", 0xe8d, 0x3}) lseek(r3, 0x20400000, 0x0) write$binfmt_script(r3, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], 0x45e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r3, &(0x7f0000000000)={0xf, 0x1f, 0x0, 0xc62}, 0xf) [ 1098.335486][T10717] search_binary_handler+0x77/0x570 [ 1098.340668][T10717] ? kasan_check_read+0x11/0x20 [ 1098.345538][T10717] __do_execve_file.isra.0+0x1394/0x23f0 [ 1098.351177][T10717] ? copy_strings_kernel+0x110/0x110 [ 1098.356469][T10717] ? strncpy_from_user+0x2a8/0x380 [ 1098.362114][T10717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1098.368569][T10717] __x64_sys_execveat+0xed/0x130 [ 1098.373533][T10717] do_syscall_64+0x103/0x610 [ 1098.378191][T10717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1098.384078][T10717] RIP: 0033:0x457e29 11:25:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1098.407591][T10717] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1098.415995][T10717] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1098.423962][T10717] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 11:25:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x2000000, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:25:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1098.809785][T11267] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1098.818163][T11267] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1098.826117][T11267] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1098.834071][T11267] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1098.842015][T11267] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1098.849964][T11267] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 11:25:12 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:25:12 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x3, 0x8, 0x7ff, 0xfffffffffffffff8, 0x7}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000240)={r2, 0x52, "1cdc6af7ee57c508bb7b3303463cfe1ad25d900bb1bed4b209138362fdc0e021b4d2e8d5dde6ca4379d3274c6dbce7a63369956aad62d76ce788bf0fa73ff4a342011f3f5d6cf4a982b9fce594e66a58ec0e"}, &(0x7f00000002c0)=0x5a) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x8}) fcntl$getown(r1, 0x9) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) syz_open_procfs(r3, &(0x7f00000000c0)='fd/4\x00') mprotect(&(0x7f0000752000/0x2000)=nil, 0x2000, 0x1) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000040)={{0x6, 0x16f, 0x2, 0x353108df, 0xa686, 0x6}, 0x3}) ioctl$int_out(r1, 0x5462, &(0x7f0000000300)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x23) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) 11:25:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x3, 0xb979}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000002c0)={r2, 0x9}, 0x8) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x4, {0xa, 0x4e20, 0x6, @loopback, 0x2}, r3}}, 0x38) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000080)={0xf}, 0x2000008f) 11:25:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d27766d6e6574312c002d450c1c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:25:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x3000000, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:25:12 executing program 4 (fault-call:4 fault-nth:25): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 11:25:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x1}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000100)={r3, 0x4, 0x0, 0x7ce, 0xfbb3}, &(0x7f0000000140)=0x18) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000180)={'hsr0\x00', {0x2, 0x4e24, @multicast1}}) 11:25:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\x9a\xe2Fp\x0fW\xe4\xc4w\xaa\'<4\xe2\xa0\x1f\xf7\xdep\x06|\"\xd8Y', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r1, 0x20400000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) [ 1101.469006][T11354] search_binary_handler+0x77/0x570 [ 1101.474187][T11354] ? kasan_check_read+0x11/0x20 [ 1101.479057][T11354] __do_execve_file.isra.0+0x1394/0x23f0 [ 1101.484706][T11354] ? copy_strings_kernel+0x110/0x110 [ 1101.489984][T11354] ? strncpy_from_user+0x2a8/0x380 [ 1101.490002][T11354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1101.490019][T11354] __x64_sys_execveat+0xed/0x130 [ 1101.490038][T11354] do_syscall_64+0x103/0x610 [ 1101.490056][T11354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1101.517104][T11354] RIP: 0033:0x457e29 [ 1101.521001][T11354] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1101.540592][T11354] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1101.548996][T11354] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1101.556965][T11354] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 11:25:12 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}, 0x117, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2, 0x5}}, 0x10) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000000)={0xf}, 0x0) 11:25:15 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1104.544045][T11926] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 11:25:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x7000000, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:25:15 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1105.114500][T12240] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1105.122912][T12240] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1105.130870][T12240] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 11:25:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x8000000, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1105.138826][T12240] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1105.146782][T12240] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1105.154738][T12240] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 [ 1105.196903][ T12] binder: send failed reply for transaction 2 to 12222:12336 [ 1105.211595][ T12] binder: undelivered TRANSACTION_ERROR: 29189 11:25:18 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:25:18 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d27766d6e6574312c002d450e1c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) 11:25:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net+icmp\x00') openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x880, 0x0) openat$cgroup_ro(r1, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1107.782974][T12625] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1107.791361][T12625] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 11:25:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x10fbea3f, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:25:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) r4 = accept4$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000100)={r4, 0x0, 0x2, 0xfffffffffffffc00, 0x3}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000fc0)={'gretap0\x00', r3}) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) [ 1107.799311][T12625] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1107.807261][T12625] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1107.815236][T12625] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1107.823177][T12625] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 11:25:18 executing program 4 (fault-call:4 fault-nth:29): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 11:25:18 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x18000, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x75) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r2 = openat$cgroup_ro(r1, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1108.428631][T12950] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1108.437030][T12950] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1108.444974][T12950] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1108.452913][T12950] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1108.460860][T12950] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1108.468804][T12950] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 11:25:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1110.810719][T13104] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1110.819100][T13104] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1110.827050][T13104] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1110.835003][T13104] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1110.842947][T13104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1110.850901][T13104] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 11:25:21 executing program 4 (fault-call:4 fault-nth:31): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 11:25:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x3f000000, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 1110.894586][T13108] JFS: Cannot determine volume size [ 1110.899792][T13108] jfs: Unrecognized mount option "obj_role=" or missing value 11:25:21 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000140)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r2 = openat$cgroup_ro(r1, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0xffff, 0xeace}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r3, 0xfffffffffffffe01}, &(0x7f0000000180)=0x8) syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x6, 0x20000) [ 1110.973944][T13334] FAULT_INJECTION: forcing a failure. [ 1110.973944][T13334] name failslab, interval 1, probability 0, space 0, times 0 [ 1111.007764][T13334] CPU: 0 PID: 13334 Comm: syz-executor.4 Not tainted 5.0.0-rc8-next-20190227 #44 [ 1111.016871][T13334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1111.026913][T13334] Call Trace: [ 1111.030203][T13334] dump_stack+0x172/0x1f0 [ 1111.034544][T13334] should_fail.cold+0xa/0x15 [ 1111.039155][T13334] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1111.044959][T13334] ? ___might_sleep+0x163/0x280 [ 1111.049805][T13334] __should_failslab+0x121/0x190 [ 1111.054738][T13334] ? proc_i_callback+0x30/0x30 [ 1111.059489][T13334] should_failslab+0x9/0x14 [ 1111.064030][T13334] kmem_cache_alloc+0x2b2/0x6f0 [ 1111.068899][T13334] ? find_held_lock+0x35/0x130 [ 1111.073685][T13334] ? tid_fd_mode+0x215/0x3f0 [ 1111.078297][T13334] ? proc_i_callback+0x30/0x30 [ 1111.083059][T13334] proc_alloc_inode+0x1c/0x1a0 [ 1111.087821][T13334] alloc_inode+0x66/0x190 [ 1111.092150][T13334] new_inode_pseudo+0x19/0xf0 [ 1111.096833][T13334] new_inode+0x1f/0x40 [ 1111.100914][T13334] proc_pid_make_inode+0x22/0x230 [ 1111.105925][T13334] proc_fd_instantiate+0x58/0x1f0 [ 1111.110927][T13334] proc_lookupfd_common+0x126/0x1c0 [ 1111.116132][T13334] ? tid_fd_update_inode+0xf0/0xf0 [ 1111.121226][T13334] ? tid_fd_revalidate+0x230/0x230 [ 1111.126324][T13334] ? lockdep_init_map+0x10c/0x5b0 [ 1111.131333][T13334] ? lockdep_init_map+0x10c/0x5b0 [ 1111.136361][T13334] proc_lookupfd+0x25/0x30 [ 1111.140762][T13334] __lookup_slow+0x27e/0x500 [ 1111.145339][T13334] ? vfs_unlink+0x560/0x560 [ 1111.149825][T13334] ? __d_lookup+0x433/0x760 [ 1111.154389][T13334] lookup_slow+0x58/0x80 [ 1111.158635][T13334] walk_component+0x74b/0x2000 [ 1111.163394][T13334] ? inode_permission+0xb4/0x570 [ 1111.168332][T13334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1111.174558][T13334] ? path_init+0x18f0/0x18f0 [ 1111.179128][T13334] ? walk_component+0x2000/0x2000 [ 1111.184128][T13334] ? save_stack+0x45/0xd0 [ 1111.188457][T13334] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1111.194245][T13334] ? path_mountpoint+0x1de0/0x1e60 [ 1111.199353][T13334] path_lookupat.isra.0+0x1f5/0x8d0 [ 1111.204521][T13334] ? do_syscall_64+0x103/0x610 [ 1111.209260][T13334] ? path_parentat.isra.0+0x160/0x160 [ 1111.214632][T13334] ? cache_grow_end+0xa4/0x190 [ 1111.219379][T13334] ? find_held_lock+0x35/0x130 [ 1111.224128][T13334] ? cache_grow_end+0xa4/0x190 [ 1111.228877][T13334] filename_lookup+0x1b0/0x410 [ 1111.233638][T13334] ? nd_jump_link+0x1d0/0x1d0 [ 1111.238323][T13334] ? simple_attr_release+0x50/0x50 [ 1111.243445][T13334] ? memcpy+0x46/0x50 [ 1111.247428][T13334] ? getname_kernel+0x223/0x370 [ 1111.252257][T13334] kern_path+0x36/0x40 [ 1111.256787][T13334] tomoyo_realpath_nofollow+0x74/0xdb [ 1111.262155][T13334] ? tomoyo_realpath_from_path+0x730/0x730 [ 1111.267933][T13334] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1111.274150][T13334] ? tomoyo_init_request_info+0x105/0x1d0 [ 1111.279855][T13334] tomoyo_find_next_domain+0x28c/0x1f8a [ 1111.285375][T13334] ? mark_held_locks+0xf0/0xf0 [ 1111.290110][T13334] ? mark_held_locks+0xf0/0xf0 [ 1111.294868][T13334] ? tomoyo_dump_page+0x510/0x510 [ 1111.299889][T13334] ? lock_acquire+0x16f/0x3f0 [ 1111.304544][T13334] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1111.310340][T13334] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1111.316038][T13334] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1111.321828][T13334] security_bprm_check+0x69/0xb0 [ 1111.326741][T13334] search_binary_handler+0x77/0x570 [ 1111.331910][T13334] ? kasan_check_read+0x11/0x20 [ 1111.336754][T13334] __do_execve_file.isra.0+0x1394/0x23f0 [ 1111.342377][T13334] ? copy_strings_kernel+0x110/0x110 [ 1111.347639][T13334] ? strncpy_from_user+0x2a8/0x380 [ 1111.352723][T13334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1111.358946][T13334] __x64_sys_execveat+0xed/0x130 [ 1111.363906][T13334] do_syscall_64+0x103/0x610 [ 1111.368494][T13334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1111.374376][T13334] RIP: 0033:0x457e29 [ 1111.378256][T13334] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1111.397861][T13334] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1111.406256][T13334] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1111.414226][T13334] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 11:25:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) ioprio_set$uid(0x3, r2, 0xff) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) 11:25:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='fd/4\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) 11:25:24 executing program 2: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000015c0)=ANY=[@ANYBLOB="726573697a652c6f626a5f726f6c653d2c736d61636b6673666c6f6f723d2e2e2b5e5b292d2e6d643573f419ba40d862cdba643573756d27766d6e6574312c002d45111c0dcc186680de9a76a9bcc98b1ad094b45ee32c828a9b9696822f49d907e6c10929084a68e2c582c43156ebb4fe168614be762c51137017006ea863b96c27e224a99763560de11d4d4e875b05c2ec712337aa78a7b7bdddc8441f44d77e"]) [ 1113.452051][T13667] FAULT_INJECTION: forcing a failure. [ 1113.452051][T13667] name failslab, interval 1, probability 0, space 0, times 0 [ 1113.476676][T13687] JFS: Cannot determine volume size 11:25:24 executing program 0: clone(0x13102041ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x24, 0xfffffeffffffffff, 0x3e}) ptrace$setregs(0xd, r0, 0x0, 0x0) tkill(r0, 0xb) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:25:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}, &(0x7f00000000c0)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000240)='ne\x1a\x81\xe8M6(~\x89label\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) [ 1113.597393][T13667] ? tomoyo_realpath_from_path+0x730/0x730 [ 1113.603194][T13667] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1113.609436][T13667] ? tomoyo_init_request_info+0x105/0x1d0 [ 1113.615145][T13667] tomoyo_find_next_domain+0x28c/0x1f8a [ 1113.620686][T13667] ? mark_held_locks+0xf0/0xf0 [ 1113.625446][T13667] ? mark_held_locks+0xf0/0xf0 [ 1113.630210][T13667] ? tomoyo_dump_page+0x510/0x510 [ 1113.635224][T13667] ? lock_acquire+0x16f/0x3f0 [ 1113.639891][T13667] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1113.645690][T13667] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1113.651403][T13667] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1113.657220][T13667] security_bprm_check+0x69/0xb0 [ 1113.662163][T13667] search_binary_handler+0x77/0x570 [ 1113.667344][T13667] ? kasan_check_read+0x11/0x20 [ 1113.672171][T13667] __do_execve_file.isra.0+0x1394/0x23f0 [ 1113.677781][T13667] ? copy_strings_kernel+0x110/0x110 [ 1113.683040][T13667] ? strncpy_from_user+0x2a8/0x380 [ 1113.688134][T13667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1113.694352][T13667] __x64_sys_execveat+0xed/0x130 [ 1113.699266][T13667] do_syscall_64+0x103/0x610 [ 1113.703856][T13667] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1113.709754][T13667] RIP: 0033:0x457e29 [ 1113.713634][T13667] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1113.733212][T13667] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1113.741606][T13667] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 11:25:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x40020000, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 11:25:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f00000003c0)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1113.912912][T13667] RSP: 002b:00007f90d16bbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1113.920504][T13687] jfs: Unrecognized mount option "obj_role=" or missing value [ 1113.922683][T13667] RAX: ffffffffffffffda RBX: 00007f90d16bbc90 RCX: 0000000000457e29 [ 1113.922691][T13667] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1113.922710][T13667] RBP: 000000000073bf00 R08: 0000000000001000 R09: 0000000000000000 [ 1113.922717][T13667] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90d16bc6d4 [ 1113.922725][T13667] R13: 00000000004be41a R14: 00000000004ced18 R15: 0000000000000005 [ 1113.928390][T13667] Kernel Offset: disabled [ 1114.096417][T13667] Rebooting in 86400 seconds..