p={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0xa6ab612e262138f5}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x5}, @op={0x18}, @iv={0x100, 0x117, 0x2, 0xe5, "e7bceaa0ecce7eb29b85d8530a17e4ab8b46fa83fe364cca486bc07b85592334e0ee473b3e24c0f0287d54dea94d5da3b7020db17a7e242a08633c8269b4d0004d96cda460d257a90519d79ee3c12646b2345b8e8facca4f004645b717abb8f523b2aca350eac55d0f5b887af420752703f9c953fd82bc37be2a3afd426541c7e837fce994d2f311df947ae0eb82c97756805e04ae6c0ec4c6f9e6f915e56aa829b846c21ec3e401fd1bb001752d9dd05e9e034a4a66ed06ef446dbaee1f2216a3d5ec15216fe6630434095532650bf77a54c25ab85c84dc79db3656f571c730092c91f5ea"}], 0x2f0, 0x4000}, {0x0, 0x0, &(0x7f0000002240)=[{&(0x7f0000001f40)="24ee59f9a563db6c41af83270609d68047223e26638277773d87b1964191eb8d247ce072af93fa1bb76584f244bb98b8d1e56437fcc79b3b0d96aafd05349156738e30b3ad52561bb9f820e6d33845ceef4810f1785e738535c29fccbc790a4c7758bd95dc3a0def6e20ad3c", 0x6c}, {&(0x7f0000001fc0)="3f1fc7ef4e2de4ce8e7a606e31bb7e88a97d661fe8334c1faf44079aa10f27cd266b43e2a78d30a4342afac107488ffc8f5b8af52b5e9e5128dee7470db745f887a20e4721b4faa123156773c1b595133de3903b51c27b73c08a797c17385b2f2903b7f2808b4b23a4ef0f0570dc20636a18f8ae7e516583af9c8390873dcca51c43a369e16ed7a55ded2d57054ffbd8c662ce7ab878e16c7b6eb7a67b8da0e968dd29bf66f0b1d71499073c43726cf6d3cd1c4709303afadb42a8c728d2153752587c6f1015bf648c3357a07d91fb337638e942cc3d948b80002af44c77b29b1226faa2686772803b97b2506ed7e443640008c789761e16f1", 0xf9}, {&(0x7f00000020c0)="5cb65c65d9cb29f3426d304424d41aabf3362d2a2f8be90f5b0fa96927b2ae405c79f7bcac696d8e9c3d12f56c0de7bf9dafc0a24b4a964c46e4109a59042a4858d5edefcee704900f03fd82134e25997c6945d4a552f20e8d676b114ddb0b8b256d59e5fe02419f97d93d709336b27d76e18c59b2e63a761cba888d88e6b6f73c6dc5b5355e2ad842f83151067914da11e5427b122a086962c768ec8ac795560f4c11199baa64cc9568", 0xaa}, {&(0x7f0000002180)="193f16447fd7ea4f56e31803d3aaa0f736afaa122f878d65b930207c13866d60e639231bea2cce94d634f54a476cb4d6536461cd0f87e680a03c9f9bdc8a0b490e47ba092b391ebf007ff448cc43dfc2ea1bda5778ae648a863e2f2b0bed95537964b1ebeea2ea8a55ab9ca3d6684bfc8a590cf0afcee6fc15ef210b22abe576be5cac46910a4d303b9a203cee942daf642ece92d5f58e91935b", 0x9a}], 0x4, &(0x7f0000002280)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xcf}, @iv={0x80, 0x117, 0x2, 0x6c, "4a11edf133fc6144a86284f36c42413c7135fa8bad4a3c46a4f60262642129d3e3f8ecb49bd1548c9daeb2c5f6c9e2034d5fbdb783a7be40cb695510c0535636e04a5a2fedc0219156deca1e2071291e5c698c02f13b560ca55f4efc2ce6b58f11db3ae11496564fa0af01ee"}, @assoc={0x0, 0x117, 0x4, 0x1}], 0xc8, 0x800}, {0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000002380)="72e1973509e377c060e8904811373f166422ecc9a203aa69b0c9e74d494f1bf4177c49067a01b4c247aa14a1fce8bfe5e4f9a45778c9265e4cc46e8132a7ce485f6606c8d7fc408d830125f44207c5bcb1623af47e542bd69debe2441ee557bc5fa0ae2be5a1b3a823f82c1c742bde0288af6fcfc562b59ca67718598f9a5be4fee3bb4848eac6ffad6038b9049019e7089c8f35c10bdff09871d39110dd7b9e50e6da5cac39eea7b53e61a36cd0f3", 0xaf}, {&(0x7f0000002440)="d965fa9c5a6e034d40fafd5b420fc613e8b8c1e2cb00932eba373c1451625a34635ea955873d8ad72a831c102fff90896eb6680d7d61c4658a5e513ecb7d8ecc826f7193910d38dbfa61e8297d651f2cdc7f3445fe788d4ce7c850d135aaa8a4329dae1dbe88a6a363a37319a1a2ddcd0f7791385abab6c2e383f8ad1cb15d91d3e41fb918f9421f9464f7df01c3b88e999b8e2773388ed452d33b63c74a5be5d366af111f5c78b0cfbacb77fd10031e171147e3b5f9e525d162e55b85f398e9abf83a2d5bbdd35c16ec1df31f26cfcb8e31bae13c0d1454dba3dfceca86f0eb790fc2ac9c", 0xe5}, {&(0x7f0000002540)="4bc20eaf2cbcbd70e78bc01a17cf9f6757cfa700fe86c0fbcb511b08e53438c08c91de06f030adfb1388ca286aed44f8dcd18e58e307b41da9b8d465d8d0d27467215de1afbdac6b215491a6b7cce5ec", 0x50}], 0x3, &(0x7f0000002600)=[@assoc={0x18, 0x117, 0x4, 0x800}, @assoc={0x18, 0x117, 0x4, 0xfffff25b}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x3}, @assoc={0x18, 0x117, 0x4, 0x2}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x9}, @iv={0x108, 0x117, 0x2, 0xf2, "ff628b6f3f4fdf856d81c3e543bfff47591269cc8f665f1611e0afde62abc238cbb4f8b6106799f121836b4043a411afdd28a2ca47fa6b21c5f831a3123a2cf31bdd4a26d2804409f9e0f10b8e6132f0e7b915f24d66c3cd731bb200509c6fe2f025faeeefa367e8fe13d5ddd8031f732206fbe13f89d182d60e4aae162aecf6b4510b033a1fb213448ecad46cde1ff86466dfecf1b5bb81ac76b5ffbc5d276f27b1f2ceb0092d64dc00bdbc0979df1ccad9ea7fc410645d516b6ce93de1eb6f66f1a39a6586310a2d6cb177c8b75a3ba1e25f71964f3db97e6cfb6afda2524b222f3353590002675dd4beb631ce833aedb3"}], 0x1e0, 0x4000001}, {0x0, 0x0, &(0x7f0000002b40)=[{&(0x7f0000002800)="37ab76cedd986dfe2dde0cda0682a0ee50a9b813acc92609088992f3e4d3496dfec11fe62e53cbe974621e7a5bf17844a83c4889c34842945209ace8a563d1ed2e126ea142d44652ea16c9674dbade5f90c9fb08ae7923a8ac6dfa93ad6c2f426878f16fac0328a6506bc8ceb1ad2d43c60fdf12e731c2fc4cf6f2d6a09192b90fb12e6f1ace5d2356127112f9720fc05d63622a5fb2d082cd1005", 0x9b}, {&(0x7f00000028c0)="fc3609ab4994e5d6db8de491d23bf25547d26761de4e8b84664450faf3dce3d9456d4e85ba278cd9654000313a36702dcc647f299e3f4c53d67ccd3c1cde34852741c762fc774136b69588266cf9f1be9e1e9c3e38198891c08ef83cdaafe7dec997c3b7db3e53f6e347bd6ee3fea2", 0x6f}, {&(0x7f0000002940)="530b104f9faf0cd5208bbfbc98b3edc142e24f6fdf92b68227f8e9e45f5499cc6863736aaa330e33d737d58619bc79317bb37f30a86e2ed054aabab869", 0x3d}, {&(0x7f0000002980)="8132ee73e186cbe74a73baf1d4d9addec11c383a588efe902a70523d53adb38854d14581d60b193986ff4a2a7974e6f8f7bec6ef7a8123e47fb737367bb24070e2b27b766985ef231c88b5834c25662b9ea78935aba4bcc962bf1b94291760e3f01e9e97fba8a34ea8969222d7623737f86150cef1f36c655726d7cbe0034c68744a66fab05e5b3b4e4be050605d2481b58a2cd85ffe661b0a981088bc537e8ba8a64eee2dfcb7620c3e252957192dc6cf8e0ce923b5f69d8eb6f9", 0xbb}, {&(0x7f0000002a40)="fb9470ae37a04eb75335b3295720e08de5572ef7a676d5d0ba3942d2038773f2ef8ea4a253e6be1d4b35ef2263e786b19fbcfc9bb6cd6bac9a6b0896ee07549df766e44f19311b13590f5b6f457c8afdf31967f701cb0b4f85f9c5574ec17375c7fe877a2fe5047f98061abc6336119c1bb14a74b873d4a1f58e9ca57aa61cf1b98e3540488938bc1576ed2b9fdc994c9f6f825154bd4bafd8d939e6ef033e2b84f6f599b038aece4c68375d53c8005859c85ce28e4a9a234ff4ba706443d004a5fd47d77437", 0xc6}], 0x5, 0x0, 0x0, 0x40880}], 0x6, 0x8000014) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r4) ioctl$VIDIOC_S_CROP(r4, 0x4014563c, &(0x7f0000004680)={0xa, {0x7fffffff, 0x9, 0x9, 0x7ff}}) r5 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r5, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) sendmsg$OSF_MSG_ADD(r2, &(0x7f0000004640)={&(0x7f0000002e40)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004600)={&(0x7f0000002e80)={0x175c, 0x0, 0x5, 0x401, 0x0, 0x0, {0x7, 0x0, 0x4}, [{{0x254, 0x1, {{0x2, 0x7ff}, 0x40, 0x5d, 0xeb5, 0x5, 0x3, 'syz0\x00', "77880c87d864efdbad34bda72cc2f1f1e262eb27742b68651fcb8b4a0f424edd", "80305afb07845be78c035076e8d965246e0629946f18a23ccf85c90f5d7a9bb5", [{0xaf, 0x0, {0x1, 0x9a}}, {0x800, 0x80, {0x0, 0x40}}, {0x0, 0x5, {0x0, 0x3}}, {0x4, 0x5, {0x3, 0x9}}, {0xffff, 0x7, {0x1, 0x4}}, {0x4, 0x3, {0x3, 0x2}}, {0x8000, 0x3f, {0x1}}, {0xb5, 0xbb, {0x0, 0xfffffffe}}, {0x4, 0x2, {0x0, 0x3f}}, {0x8, 0xf8bf, {0x0, 0x4}}, {0x9, 0x7, {0x1, 0x7e}}, {0x1, 0x0, {0x1, 0x9}}, {0x6, 0x8001, {0x1, 0x2}}, {0x708f, 0x4, {0x0, 0x1}}, {0x8, 0xe53f, {0x2, 0x1}}, {0x5, 0x0, {0x0, 0x10001}}, {0x7de1, 0xb16, {0x0, 0x80}}, {0xfbfe, 0x7, {0x0, 0x9}}, {0x5, 0x101, {0x3, 0x9}}, {0x6, 0x7, {0x1, 0x400}}, {0x2f, 0x400, {0x3f420f877b548835, 0x5}}, {0xcc, 0x8fe, {0x1, 0x56}}, {0x20, 0x1400, {0x2, 0x9}}, {0x9, 0x1, {0x3, 0x69}}, {0x287e, 0x80, {0x3, 0x40}}, {0x20, 0xfe01, {0x2, 0x1c000}}, {0x7774, 0x9, {0x2, 0x80}}, {0x0, 0x6, {0x1, 0x101}}, {0x6, 0x78, {0x3, 0xffffffff}}, {0x200, 0x9, {0x0, 0x2}}, {0xb2bc, 0x1, {0x2}}, {0x13, 0xe1}, {0x81, 0x80, {0x1, 0x80000000}}, {0x200, 0x71, {0x3, 0x9}}, {0x7f, 0x8, {0x1, 0x80000000}}, {0x3, 0x3, {0x0, 0x101}}, {0xfff, 0xf632, {0x1, 0x8000}}, {0x9, 0x4, {0x1, 0x400}}, {0xe3, 0x800, {0x2, 0x4}}, {0x640e, 0x401, {0x0, 0x1}}]}}}, {{0x254, 0x1, {{0x2, 0x6}, 0x0, 0x81, 0x7fff, 0x1f, 0x1f, 'syz1\x00', "d56040e5256395ca6cc8d01eab0bfc3f53973822da35ca5d96f4ea0b86fac3c6", "39d636c671127bd9241d26c3d0433b9a5271e96953e93c6ff2d0012df4cd72c7", [{0x1, 0x2, {0x2, 0x3}}, {0x0, 0x4, {0x3, 0x9}}, {0x9, 0x6d14, {0x3, 0xc07}}, {0x7, 0x11cb, {0x3, 0xe5}}, {0xfffa, 0x6, {0x3, 0xd86f}}, {0x1, 0x2, {0x3, 0x6}}, {0x401, 0x4, {0x1, 0xb0}}, {0x6496, 0x5, {0x1, 0xfffffffa}}, {0x3, 0x81, {0x2, 0x1ff}}, {0x4, 0x3, {0x2, 0x22dc}}, {0xff, 0x0, {0x1, 0x8001}}, {0x9, 0x8, {0x2, 0x3bc}}, {0x2, 0x800, {0x2, 0x100}}, {0x9, 0x3, {0x1, 0x1}}, {0xffff, 0x79, {0x1, 0xd7}}, {0xcd, 0x2, {0x2, 0x2}}, {0xffff, 0x401, {0x1, 0x4}}, {0x3, 0x5, {0x3, 0x5}}, {0x8, 0x26d, {0x0, 0xc91}}, {0x7717, 0x400, {0x3, 0x5}}, {0x200, 0x3, {0x2, 0xfffffff7}}, {0x8000, 0x81, {0x2, 0x6}}, {0x8, 0x7, {0x1, 0x800}}, {0xd8, 0x7fff, {0x1, 0x1000}}, {0xf93, 0x7fff, {0x1, 0x7ff}}, {0x200, 0x4, {0x2, 0x3}}, {0x3, 0x20, {0x3, 0x82}}, {0x1, 0x8000, {0x2, 0x5}}, {0xb7b, 0x0, {0x2}}, {0x800, 0x8000, {0x3, 0x2}}, {0x80, 0x32e, {0x3, 0x100}}, {0x200, 0x81, {0x1, 0x7}}, {0x3, 0x1, {0x2, 0x6}}, {0x62bf, 0x5, {0x2, 0x25}}, {0x80, 0x1, {0x1, 0x100}}, {0x8, 0x6e, {0x2, 0x20}}, {0x68d, 0xffff, {0x0, 0x8000}}, {0x8001, 0x2, {0x2, 0x8}}, {0x4, 0x6, {0x3, 0x7ff}}, {0x2, 0x3, {0x1, 0x44f99952}}]}}}, {{0x254, 0x1, {{0x0, 0xb3e}, 0x0, 0x0, 0xfff8, 0x1, 0xb, 'syz0\x00', "393c50b04c330be48e688ccfb9314eb93130cf5952d59e9c58d9528896b80d93", "3111874d80e6d3150eaf6109e13931b9304191431681ad4b30a49ea0b60e4a5c", [{0x7, 0x7, {0x3, 0xffffffff}}, {0xfffa, 0x2, {0x0, 0x5}}, {0x36, 0x20, {0x3, 0x1000}}, {0x2, 0x2, {0x1, 0x9}}, {0x2, 0x0, {0x0, 0x46}}, {0x8, 0x7, {0x2, 0xd63a}}, {0xfff9, 0x101, {0x0, 0x9}}, {0x3, 0xf752, {0x2, 0x2}}, {0x90dd, 0x5, {0x2, 0xffff}}, {0x9, 0x100, {0x3, 0x4}}, {0x2d09, 0x6, {0x2, 0x4}}, {0x8001, 0x9, {0x1, 0x5}}, {0x8001, 0x6, {0x2, 0x9}}, {0x5, 0x7fff, {0x1, 0x3}}, {0x3, 0x8000, {0x0, 0x20}}, {0x2ac, 0x8f23, {0x0, 0x6}}, {0x1, 0x0, {0x0, 0x7}}, {0xf8c5, 0x400}, {0x8, 0x9, {0x2, 0x1f}}, {0x6a5d, 0xffff, {0x0, 0xffffffe0}}, {0x604, 0x7, {0x1, 0x8}}, {0x8, 0x6, {0x2, 0x36}}, {0xfffa, 0x7f, {0x1}}, {0x305f, 0x8, {0x3, 0x1f309193}}, {0x8000, 0x0, {0x1, 0x40}}, {0x5, 0x800, {0x2, 0x9}}, {0x100, 0x1b7b, {0x3, 0x8}}, {0x8, 0x9, {0x3, 0x800}}, {0x3, 0x7, {0x2, 0xc500}}, {0x9, 0x7f, {0x0, 0xd8}}, {0x401, 0x20, {0x3, 0x8}}, {0x4, 0xb008, {0x3, 0x8}}, {0xd6bc, 0xfc01, {0x2, 0x20}}, {0x1000, 0xfffe}, {0x8, 0x1000, {0x2, 0xe8}}, {0x0, 0x7f, {0x2, 0x9}}, {0x200, 0x1, {0x1, 0x800}}, {0x7, 0x80, {0x1, 0x6f9e}}, {0x288f, 0xfff, {0x2, 0x3}}, {0x9, 0x12, {0x3, 0x2}}]}}}, {{0x254, 0x1, {{0x3, 0xb198}, 0x7f, 0x9, 0x401, 0x7ff, 0xb, 'syz1\x00', "6053550c98c68abb359d1c5348a01d7f95f0f621441a62659f75f2587e87f469", "c92513f54302c76a24816e78574bd7947ceecd3b7bdb85fd0026381df536d551", [{0x3, 0x8, {0x2, 0x4}}, {0x7, 0x0, {0x3, 0x1f}}, {0x9, 0x8, {0x0, 0x3e0000}}, {0x0, 0x3, {0x1, 0x9ec}}, {0x7, 0xf2d, {0x1, 0xfffffffa}}, {0x8, 0x6, {0x3}}, {0x6, 0x2, {0x1, 0x10001}}, {0x6, 0xffff, {0x3, 0x8}}, {0x1, 0x7, {0x2, 0x2}}, {0x8001, 0x0, {0x2, 0x7}}, {0xe, 0x5, {0x2, 0x9}}, {0x401, 0x8b, {0x2, 0x80}}, {0x4, 0x6, {0x0, 0x339d}}, {0x7f, 0x1f, {0x2, 0xffffffff}}, {0x800, 0x3ff, {0x2, 0x1f}}, {0x5, 0xffff, {0x3, 0x10001}}, {0x4, 0x5, {0x0, 0x2}}, {0x2, 0x7, {0x3, 0xfffffffa}}, {0x9, 0x2, {0x1, 0x3}}, {0x4, 0x1, {0x2, 0xffff}}, {0x30, 0x2, {0x1, 0xc99}}, {0xf801, 0x0, {0x3, 0xff}}, {0x0, 0x3ff, {0x2, 0xfffffa47}}, {0x88c, 0x3, {0x0, 0x6b254de2}}, {0x0, 0x3f, {0x1}}, {0x5, 0x9, {0x0, 0x7}}, {0x8001, 0x9a51, {0x1, 0x1}}, {0x4, 0x7, {0x0, 0xfffffff8}}, {0x8, 0x5, {0x0, 0x7}}, {0x4, 0x3ff, {0x2}}, {0x2, 0x4f7, {0x2, 0x80000000}}, {0xc898, 0xb927, {0x3, 0x3}}, {0x830, 0xfff, {0x1, 0x100}}, {0x100, 0x1, {0x1, 0x5}}, {0x7fff, 0x5, {0x2, 0x1f}}, {0x3, 0x3ff, {0x1, 0x8d83}}, {0x2, 0x7, {0x2, 0x19c}}, {0x401, 0x0, {0x1, 0x1000}}, {0x56ae, 0x3134, {0x1, 0xbf}}, {0x0, 0x232, {0x0, 0x10000000}}]}}}, {{0x254, 0x1, {{0x0, 0x80}, 0x3, 0x5, 0x1, 0xffe1, 0x26, 'syz0\x00', "5d447895abe3fa48ed720d6936c13ee30f64f4f47229be217ed4bdbbfbf277af", "9728f65d2274517ce3da22d67e9fb55b3ae08dab02015da1371a3711c8a0ee37", [{0x8, 0x2, {0x0, 0x9c}}, {0x5, 0x0, {0x1, 0x401}}, {0x7, 0x9, {0x2, 0x7}}, {0x9, 0xfcac, {0x0, 0x4}}, {0x7, 0x2, {0x1, 0x8}}, {0x8000, 0x3, {0x1}}, {0x0, 0x3, {0x3, 0xfffeffff}}, {0x7, 0xff, {0x2, 0x2}}, {0x20, 0x0, {0x1}}, {0x1, 0x5, {0x0, 0x3}}, {0x6, 0x4, {0x3, 0x7fffffff}}, {0x3d, 0x2c, {0x3, 0xfff}}, {0x401, 0x7fff, {0x0, 0x8}}, {0x0, 0xf45b, {0x0, 0xfffffe1f}}, {0x4, 0xf309}, {0xff, 0x100, {0x0, 0x76d}}, {0x3f, 0x7, {0x1, 0x81}}, {0x8, 0x8, {0x1, 0x200}}, {0x0, 0x3f, {0x0, 0x1ff}}, {0xff, 0xf1a, {0x1, 0x1000}}, {0x3ff, 0x2, {0x2, 0x3}}, {0x80, 0x5464, {0x7, 0x8001}}, {0x1, 0x3, {0x1, 0xe64}}, {0xe6, 0x1, {0x1, 0x512}}, {0x9, 0x1ff, {0x3}}, {0x1, 0x7, {0x2, 0x81}}, {0x22aa, 0x8, {0x1, 0x400}}, {0x5, 0x5335, {0x3, 0x9}}, {0x400, 0x8, {0x2, 0x4}}, {0x3abb, 0xfffc, {0x0, 0x2}}, {0x4, 0x3, {0x1, 0x401}}, {0x1000, 0x8, {0x1, 0x1f928000}}, {0x2, 0x9, {0x3, 0xffffff5b}}, {0x5, 0x1, {0x6, 0x2}}, {0x20, 0x23ed, {0x1, 0xa88b}}, {0xffff, 0x1, {0x3}}, {0x5, 0x1ff, {0x59377580060e7fa1, 0x28e4}}, {0x3ff, 0x5, {0x3, 0x3}}, {0x0, 0x4, {0x3, 0x10001}}, {0x800, 0x678f, {0x2, 0x3d66}}]}}}, {{0x254, 0x1, {{0x0, 0x2}, 0x3f, 0x0, 0x2, 0x4, 0xd, 'syz1\x00', "02681b91cbe55e601a6477ba410df1871f81a3adc8669dae84d8ce5a2b542958", "ac1703d64daf4a592ac8ac2cdc18754cfd2e26fbd3885d5642b8c98d69bc32c0", [{0x0, 0x1, {0x0, 0x80}}, {0x2, 0x4, {0x2}}, {0x5, 0xfffc, {0x1, 0x5}}, {0xd4, 0x4, {0x3, 0x1}}, {0x40, 0x7, {0x2, 0x2f5}}, {0x9, 0x3, {0x0, 0x8}}, {0x0, 0x2, {0x3, 0x3}}, {0x9, 0x152, {0x0, 0x9}}, {0xa15, 0x1, {0x1, 0x10000}}, {0x8, 0x1, {0x2, 0x71}}, {0x2, 0x3, {0x3, 0x4}}, {0x6, 0x5, {0x0, 0x6}}, {0x1ff, 0xd8d, {0x3, 0x19}}, {0x3f, 0xffff, {0x2, 0x65}}, {0x6, 0x59, {0x1, 0x9}}, {0x987, 0x401, {0x1, 0x494}}, {0x9, 0x5, {0x0, 0x101}}, {0x2, 0x8, {0x1, 0xfffffff8}}, {0x0, 0x4, {0x3, 0x800}}, {0x9, 0x0, {0x0, 0xffffffff}}, {0x99, 0x4, {0x1, 0x40}}, {0x1, 0x7ff, {0x3, 0x7}}, {0x6, 0x0, {0x1, 0x4788}}, {0x9, 0x9, {0x3, 0x942d}}, {0x20, 0x0, {0x2, 0x1}}, {0x5, 0x8001, {0x0, 0xffff}}, {0x7, 0x7, {0x1, 0x101}}, {0x80, 0x7, {0x0, 0x7fff}}, {0x1, 0x6, {0x2, 0x757}}, {0x7, 0x1ff, {0x1, 0x6}}, {0x1, 0x8000, {0x0, 0x7f}}, {0x6, 0x6, {0x0, 0xfffffffe}}, {0x6, 0x3, {0x3, 0x400}}, {0x8, 0x1257, {0x3, 0x7fffffff}}, {0x4, 0x7fff, {0x3, 0x3}}, {0xd2, 0x9, {0x0, 0x8}}, {0x9, 0x6, {0x1}}, {0x100, 0x101, {0x0, 0x1ff}}, {0x1, 0xfffc, {0x0, 0x4}}, {0x101, 0xfffe, {0x3, 0x9}}]}}}, {{0x254, 0x1, {{0x2, 0x2}, 0xe7, 0x7c, 0x100, 0x6, 0x7, 'syz1\x00', "07615862822a36f375ae23db89779cd2b82e8641cd453d5806f649b4c67bacd7", "f8c7c259e1cdd336ca924e63f3fc1a70b04949e4511de56c9677f54a8013b500", [{0x1f, 0xfffb, {0x3, 0x2}}, {0x0, 0x1, {0x3, 0x100}}, {0x1, 0x0, {0x2, 0x4}}, {0x98e, 0x1, {0x2, 0xe3c}}, {0x9, 0x0, {0x3, 0x6}}, {0x7, 0x7, {0x0, 0x1c00}}, {0x101, 0x7ffa, {0x2, 0xeb05}}, {0x4, 0x8, {0x1, 0x4}}, {0x0, 0x7, {0x0, 0x8e}}, {0xd315, 0x7, {0x0, 0x7f}}, {0x3, 0x4, {0x1, 0x8}}, {0x5, 0xfff7, {0x3, 0x5e1d}}, {0x7ff, 0xd35d, {0x1, 0x101}}, {0x8, 0xf13, {0x1, 0x1}}, {0x400, 0x3, {0x1, 0x2}}, {0x1, 0x8, {0x5d2f277450aa92ee, 0x1}}, {0xfffe, 0x40, {0x1}}, {0x1, 0xc2dc, {0x2, 0xf1}}, {0x8, 0x8, {0x3}}, {0x9, 0x5, {0x0, 0x8}}, {0x9, 0x1, {0x2, 0x9}}, {0x4, 0x9800, {0x2, 0x7fff}}, {0xd2d6, 0x6, {0x3, 0x2}}, {0x7fff, 0x1, {0x1, 0x200}}, {0x1000, 0x7, {0x1, 0x4576e3ea}}, {0xfff, 0x6, {0x2, 0x64f}}, {0xfff7, 0x670, {0x3, 0x1}}, {0x3f, 0x20, {0x2, 0x7}}, {0x9, 0x2, {0x1, 0x50b8000}}, {0x8, 0x8000, {0x0, 0x1}}, {0x81, 0x4, {0x2, 0x100}}, {0x8e35, 0x8, {0x2, 0x400}}, {0x1a6, 0x3ff, {0x3, 0x1f}}, {0x8, 0x3f, {0x1, 0x4}}, {0x4, 0x8, {0x1}}, {0x7fff, 0x7, {0x0, 0x8000}}, {0x6, 0x1d7, {0x3, 0x7f8}}, {0x80, 0x101, {0x3, 0x7fff}}, {0x40, 0x5, {0x0, 0x1}}, {0x3e, 0xc2a, {0x3, 0x9}}]}}}, {{0x254, 0x1, {{0x3, 0x1}, 0xb8, 0x40, 0xcc, 0x400, 0x20, 'syz1\x00', "514a8764ac614e2cc6b1dc2c997a82f18f0dcbaad479f78eeb0fba91b3284bab", "549cf51389b38804eb85516f1afb9254972c040ec47f5a504261f96eae8ee8fc", [{0x8, 0xfeff, {0x2, 0x7}}, {0x3a5d, 0x9, {0x0, 0xfe31}}, {0x2, 0x2, {0x0, 0x7fffffff}}, {0xfff, 0x8, {0x2}}, {0x7, 0x6, {0x0, 0x350}}, {0x6, 0x3, {0x2, 0x8}}, {0x1cb, 0x3, {0x2}}, {0x1f, 0x60, {0x2, 0x5}}, {0x40, 0x1, {0x2, 0x3}}, {0x1, 0x7, {0x0, 0x6}}, {0x4ea, 0x40, {0x2, 0xf9}}, {0x401, 0xfff, {0x3, 0x2}}, {0x1000, 0x94cd, {0x0, 0xfffffff7}}, {0x800, 0x3e4, {0x2, 0x8001}}, {0x44, 0x80, {0x0, 0x3}}, {0x9, 0x1ff, {0x3, 0x8}}, {0x800, 0xa6, {0x3, 0xff}}, {0x0, 0x44}, {0xbd8, 0x7, {0x3, 0xd6}}, {0xc68, 0x3f0, {0x2, 0x8}}, {0x200, 0x100, {0x0, 0xffffff01}}, {0x7f, 0x6, {0x2, 0x1f}}, {0x9, 0x2, {0x1, 0x1}}, {0x8, 0x3f, {0x3, 0x1}}, {0x7fff, 0x3f, {0x0, 0xa3}}, {0x2, 0x4010, {0x0, 0x1}}, {0x6, 0x9, {0x0, 0x2}}, {0x1, 0xd70d, {0x3, 0x4}}, {0x0, 0x4, {0x1, 0x1000}}, {0x9, 0x7fff, {0x0, 0x91d5}}, {0x4, 0x1, {0x3, 0x9}}, {0x2d, 0xb8c, {0x1, 0x7}}, {0x0, 0xfff, {0x2, 0x1}}, {0x7ff, 0x200, {0x1, 0x5}}, {0x5, 0x7796, {0x2, 0x9}}, {0x67, 0x6, {0x2, 0x7}}, {0x7, 0x8, {0x0, 0x7ff}}, {0x4, 0x3, {0x0, 0x1}}, {0x0, 0x600, {0x3, 0x3ff}}, {0x6, 0x7fff, {0x0, 0x1}}]}}}, {{0x254, 0x1, {{0x2, 0x4}, 0x0, 0x3, 0x4e23, 0xe81, 0x1b, 'syz0\x00', "60c4f28d40dfe89d48126b45994afa80bcd003e99ac1855553b044c6ad4a5f39", "320b54a662931d80b04ef68af9304ea5c9a4070f8e7971d695a1fec9383f9cea", [{0x9, 0x2, {0x2, 0x2}}, {0x9bb3, 0x2e6, {0x3, 0x1000}}, {0x8000, 0x800, {0x0, 0x9}}, {0x1a, 0x921f, {0x1}}, {0x9, 0x6, {0x2, 0x6d72de98}}, {0xd5, 0x5, {0x2, 0x7}}, {0xb32c, 0x1, {0x0, 0x6}}, {0xfffa, 0x61, {0x2, 0x9}}, {0x1, 0x1f, {0x2, 0x4}}, {0x1, 0x20, {0x0, 0x3}}, {0x40, 0x2, {0x1, 0x400}}, {0x735f, 0x40, {0x2, 0x4}}, {0x0, 0x9, {0x1, 0xe6e}}, {0x7, 0x8}, {0x800, 0x6fac, {0x2, 0x5}}, {0x8000, 0x1000, {0x1, 0x5}}, {0x40, 0x80, {0x3, 0x6}}, {0x6c, 0x0, {0x1, 0xfffffffa}}, {0x0, 0x3, {0x2, 0x1}}, {0xff2a, 0x72ce, {0x0, 0x8}}, {0x5, 0x1000, {0x0, 0x27b5}}, {0x3, 0x4504, {0x0, 0x100}}, {0x1, 0x401, {0x3}}, {0x7, 0x7, {0x1}}, {0xb0, 0xf6c, {0x1, 0x10000}}, {0x1606, 0x8001, {0x2, 0x2}}, {0x8, 0x400, {0x1, 0x769}}, {0x800, 0x9, {0x1, 0x10000}}, {0x3, 0x6, {0x0, 0x8}}, {0x5, 0x7, {0x1, 0x7}}, {0x3ff, 0x3ff, {0x1, 0xff}}, {0xb0, 0x6, {0x1, 0x6}}, {0x9, 0x0, {0x2, 0x1}}, {0x87c8, 0xd0dd, {0x0, 0x6}}, {0x2, 0x5, {0x3, 0x80}}, {0x2, 0x6, {0x1, 0x101}}, {0x1b, 0x401, {0x2, 0x7fff}}, {0x6, 0x6, {0x0, 0x6}}, {0x6, 0x6, {0x0, 0x5}}, {0x9, 0x80, {0x2, 0x32}}]}}}, {{0x254, 0x1, {{0x1, 0x7ccc}, 0xa2, 0x5, 0x6, 0x8000, 0x24, 'syz1\x00', "720236b6ecb6f6d3cf85632a998cf3167e601f62757f9955cc6c81c2e995e6de", "eab143c447acf44fa1d761ec5b743fc0140d8af0e3b8ac41b4459a4a1f266519", [{0x3f, 0x7fff, {0x3, 0x1}}, {0xc000, 0x86, {0x3, 0xff}}, {0x5, 0x401, {0x2, 0xdcd}}, {0x6, 0x9, {0x3, 0x7}}, {0x3, 0x38, {0x2}}, {0x7, 0x200, {0x0, 0x3}}, {0x4, 0x7f, {0x2, 0x80000000}}, {0x20, 0x4bc, {0x3, 0x8000}}, {0x0, 0x4, {0x2, 0x6}}, {0x3, 0x77, {0x3, 0x8}}, {0x0, 0x401, {0x3, 0x671f}}, {0x5, 0x8, {0x0, 0xfffffffb}}, {0x0, 0x3, {0x3, 0xfffffff7}}, {0x2, 0x5, {0x3, 0x1}}, {0x3, 0x7, {0x7, 0xff}}, {0x1, 0x40, {0x3, 0x81}}, {0x0, 0xe545, {0x1, 0x20}}, {0x9, 0x4, {0x3, 0x8000}}, {0x0, 0x5, {0x3, 0x7}}, {0x8000, 0x40, {0x0, 0x3e18}}, {0x2, 0xa03d, {0x1, 0x3f}}, {0x800, 0x9, {0x1, 0x8}}, {0x1, 0x1ff, {0x2, 0x10000}}, {0x5, 0x5, {0x3, 0x7}}, {0xff01, 0xd192, {0x2, 0x1}}, {0x1, 0x80, {0x0, 0x401}}, {0x8001, 0x100, {0x0, 0x3}}, {0x100, 0x7, {0xf9915a109863db47, 0x2900}}, {0xce55, 0x7f, {0x3, 0x6}}, {0x8, 0x1ff, {0x2, 0x7ff}}, {0x83, 0x3, {0x1, 0x8}}, {0x0, 0x5, {0x2, 0x5}}, {0x1, 0x4, {0x3, 0x8}}, {0x5, 0x9, {0x0, 0x3e}}, {0x4, 0x8001, {0x2, 0x5}}, {0x22a, 0x5207, {0x2, 0x2}}, {0x0, 0x14c, {0xcdf5978b8ab48f2f, 0x3}}, {0x1, 0x800, {0x2, 0x2}}, {0xb97, 0x3, {0x1, 0x400}}, {0x7, 0x9, {0x3, 0x9}}]}}}]}, 0x175c}, 0x1, 0x0, 0x0, 0x200000c1}, 0x44804) lstat(&(0x7f0000001e80)='./file0\x00', &(0x7f0000001ec0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000002d40)={{{@in=@empty, @in6=@local, 0x4e24, 0x46, 0x4e22, 0xffff, 0x2, 0xa0, 0x20, 0x6c, 0x0, r6}, {0xb4, 0x8, 0x7ff, 0x2, 0x4, 0x3, 0x40, 0x7}, {0x20, 0x5, 0x1, 0x1ff}, 0x0, 0x6e6bba, 0x2, 0x3, 0x3, 0x1}, {{@in6=@mcast1, 0x4d2, 0x32}, 0xa, @in6=@empty, 0x0, 0x0, 0x2, 0x80, 0x1, 0x8d, 0xdf}}, 0xe8) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000140)={0x20}, 0x1) [ 1529.830283][T23648] FAULT_INJECTION: forcing a failure. [ 1529.830283][T23648] name failslab, interval 1, probability 0, space 0, times 0 [ 1529.878705][T23648] CPU: 1 PID: 23648 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1529.887429][T23648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1529.898358][T23648] Call Trace: [ 1529.901666][T23648] dump_stack+0x11d/0x187 [ 1529.906020][T23648] should_fail.cold+0x5/0xf [ 1529.910696][T23648] __should_failslab+0x82/0xb0 [ 1529.915479][T23648] should_failslab+0x5/0xf [ 1529.919903][T23648] __kmalloc+0x54/0x640 [ 1529.924070][T23648] ? __x64_sys_memfd_create+0xda/0x370 [ 1529.929633][T23648] ? vfs_write+0x10b/0x380 [ 1529.934068][T23648] ? fput_many+0xe2/0x130 [ 1529.938514][T23648] ? strnlen_user+0x1a8/0x220 [ 1529.943208][T23648] __x64_sys_memfd_create+0xda/0x370 [ 1529.948503][T23648] ? debug_smp_processor_id+0x3f/0x129 [ 1529.954051][T23648] do_syscall_64+0xc7/0x390 [ 1529.958577][T23648] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1529.964501][T23648] RIP: 0033:0x45c849 [ 1529.964574][T23648] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:10:22 executing program 4 (fault-call:4 fault-nth:2): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1529.964590][T23648] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1529.964688][T23648] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c849 [ 1529.964699][T23648] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 1529.964709][T23648] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1529.964718][T23648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 14:10:22 executing program 4 (fault-call:4 fault-nth:3): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:22 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1529.964727][T23648] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000000 [ 1529.976156][T23653] FAULT_INJECTION: forcing a failure. [ 1529.976156][T23653] name failslab, interval 1, probability 0, space 0, times 0 [ 1529.976177][T23653] CPU: 1 PID: 23653 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1529.976225][T23653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1529.976240][T23653] Call Trace: [ 1529.976269][T23653] dump_stack+0x11d/0x187 [ 1529.976295][T23653] should_fail.cold+0x5/0xf [ 1529.976328][T23653] __should_failslab+0x82/0xb0 [ 1529.976391][T23653] should_failslab+0x5/0xf [ 1529.976410][T23653] kmem_cache_alloc+0x23/0x5e0 14:10:22 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1529.976427][T23653] ? proc_cwd_link+0x160/0x160 [ 1529.976443][T23653] ? _kstrtoull+0xfc/0x130 [ 1529.976468][T23653] ? shmem_destroy_inode+0x60/0x60 [ 1529.976489][T23653] shmem_alloc_inode+0x2e/0x60 14:10:22 executing program 4 (fault-call:4 fault-nth:4): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1529.976507][T23653] ? shmem_destroy_inode+0x60/0x60 [ 1529.976522][T23653] alloc_inode+0x42/0x130 [ 1529.976541][T23653] new_inode_pseudo+0x32/0xe0 [ 1529.976558][T23653] ? proc_cwd_link+0x160/0x160 14:10:22 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:10:22 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1529.976651][T23653] new_inode+0x25/0x50 [ 1529.976668][T23653] shmem_get_inode+0x85/0x490 [ 1529.976695][T23653] __shmem_file_setup.part.0+0x6e/0x1e0 [ 1529.976718][T23653] shmem_file_setup+0x77/0xa0 14:10:23 executing program 4 (fault-call:4 fault-nth:5): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1529.976740][T23653] __x64_sys_memfd_create+0x205/0x370 14:10:23 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1529.976767][T23653] ? debug_smp_processor_id+0x3f/0x129 [ 1529.976795][T23653] do_syscall_64+0xc7/0x390 [ 1529.976860][T23653] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1529.976877][T23653] RIP: 0033:0x45c849 [ 1529.976898][T23653] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:10:23 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1529.976907][T23653] RSP: 002b:00007fab7ff0ba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1529.976922][T23653] RAX: ffffffffffffffda RBX: 00007fab7ff0c6d4 RCX: 000000000045c849 14:10:23 executing program 4 (fault-call:4 fault-nth:6): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1529.976963][T23653] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 1529.976972][T23653] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000001 [ 1529.976980][T23653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1529.976989][T23653] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000001 [ 1530.161342][T23657] FAULT_INJECTION: forcing a failure. [ 1530.161342][T23657] name failslab, interval 1, probability 0, space 0, times 0 [ 1530.161365][T23657] CPU: 1 PID: 23657 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1530.161374][T23657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1530.161379][T23657] Call Trace: [ 1530.161406][T23657] dump_stack+0x11d/0x187 [ 1530.161431][T23657] should_fail.cold+0x5/0xf [ 1530.161457][T23657] __should_failslab+0x82/0xb0 [ 1530.161473][T23657] should_failslab+0x5/0xf [ 1530.161491][T23657] kmem_cache_alloc+0x23/0x5e0 [ 1530.161523][T23657] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1530.161541][T23657] ? __write_once_size+0x45/0xd0 [ 1530.161563][T23657] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1530.161587][T23657] __d_alloc+0x51/0x4a0 [ 1530.161615][T23657] d_alloc_pseudo+0x23/0x60 [ 1530.161709][T23657] alloc_file_pseudo+0x95/0x1b0 [ 1530.161741][T23657] __shmem_file_setup.part.0+0xc8/0x1e0 [ 1530.161766][T23657] shmem_file_setup+0x77/0xa0 [ 1530.161790][T23657] __x64_sys_memfd_create+0x205/0x370 [ 1530.161811][T23657] ? debug_smp_processor_id+0x3f/0x129 [ 1530.161893][T23657] do_syscall_64+0xc7/0x390 [ 1530.161921][T23657] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1530.161934][T23657] RIP: 0033:0x45c849 [ 1530.161955][T23657] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1530.161965][T23657] RSP: 002b:00007fab7ff2ca68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1530.161982][T23657] RAX: ffffffffffffffda RBX: 00007fab7ff2d6d4 RCX: 000000000045c849 [ 1530.161991][T23657] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 1530.162001][T23657] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1530.162012][T23657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1530.162022][T23657] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000002 [ 1530.430399][T23660] FAULT_INJECTION: forcing a failure. [ 1530.430399][T23660] name failslab, interval 1, probability 0, space 0, times 0 [ 1530.430422][T23660] CPU: 1 PID: 23660 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1530.430432][T23660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1530.430437][T23660] Call Trace: [ 1530.430469][T23660] dump_stack+0x11d/0x187 [ 1530.430532][T23660] should_fail.cold+0x5/0xf [ 1530.430562][T23660] __should_failslab+0x82/0xb0 [ 1530.430580][T23660] should_failslab+0x5/0xf [ 1530.430599][T23660] kmem_cache_alloc+0x23/0x5e0 [ 1530.430618][T23660] ? proc_cwd_link+0x160/0x160 [ 1530.430634][T23660] ? _kstrtoull+0xfc/0x130 [ 1530.430739][T23660] ? shmem_destroy_inode+0x60/0x60 [ 1530.430763][T23660] shmem_alloc_inode+0x2e/0x60 [ 1530.430780][T23660] ? shmem_destroy_inode+0x60/0x60 [ 1530.430795][T23660] alloc_inode+0x42/0x130 [ 1530.430814][T23660] new_inode_pseudo+0x32/0xe0 [ 1530.430830][T23660] ? proc_cwd_link+0x160/0x160 [ 1530.430854][T23660] new_inode+0x25/0x50 [ 1530.430877][T23660] shmem_get_inode+0x85/0x490 [ 1530.430964][T23660] __shmem_file_setup.part.0+0x6e/0x1e0 [ 1530.431057][T23660] shmem_file_setup+0x77/0xa0 [ 1530.431082][T23660] __x64_sys_memfd_create+0x205/0x370 [ 1530.431178][T23660] ? debug_smp_processor_id+0x3f/0x129 [ 1530.431203][T23660] do_syscall_64+0xc7/0x390 [ 1530.431228][T23660] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1530.431241][T23660] RIP: 0033:0x45c849 [ 1530.431263][T23660] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1530.431280][T23660] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1530.431299][T23660] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c849 [ 1530.431310][T23660] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 1530.431321][T23660] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1530.431332][T23660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1530.431344][T23660] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000001 [ 1530.450786][T23661] FAULT_INJECTION: forcing a failure. [ 1530.450786][T23661] name failslab, interval 1, probability 0, space 0, times 0 [ 1530.450808][T23661] CPU: 1 PID: 23661 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1530.450825][T23661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1530.450830][T23661] Call Trace: [ 1530.450861][T23661] dump_stack+0x11d/0x187 [ 1530.450886][T23661] should_fail.cold+0x5/0xf [ 1530.450914][T23661] __should_failslab+0x82/0xb0 [ 1530.450933][T23661] should_failslab+0x5/0xf [ 1530.450951][T23661] kmem_cache_alloc+0x23/0x5e0 [ 1530.451043][T23661] ? memcg_kmem_put_cache+0x77/0xc0 [ 1530.451066][T23661] ? kmem_cache_alloc+0x1e2/0x5e0 [ 1530.451090][T23661] __alloc_file+0x49/0x200 [ 1530.451140][T23661] alloc_empty_file+0x8b/0x180 [ 1530.451161][T23661] alloc_file+0x4e/0x2b0 [ 1530.451184][T23661] alloc_file_pseudo+0x121/0x1b0 [ 1530.451210][T23661] __shmem_file_setup.part.0+0xc8/0x1e0 [ 1530.451234][T23661] shmem_file_setup+0x77/0xa0 [ 1530.451257][T23661] __x64_sys_memfd_create+0x205/0x370 [ 1530.451284][T23661] ? debug_smp_processor_id+0x3f/0x129 [ 1530.451340][T23661] do_syscall_64+0xc7/0x390 [ 1530.451366][T23661] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1530.451380][T23661] RIP: 0033:0x45c849 [ 1530.451403][T23661] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1530.451413][T23661] RSP: 002b:00007fab7ff2ca68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1530.451432][T23661] RAX: ffffffffffffffda RBX: 00007fab7ff2d6d4 RCX: 000000000045c849 [ 1530.451464][T23661] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 1530.451475][T23661] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1530.451486][T23661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1530.451497][T23661] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000003 [ 1530.621257][T23665] FAULT_INJECTION: forcing a failure. [ 1530.621257][T23665] name failslab, interval 1, probability 0, space 0, times 0 [ 1530.621280][T23665] CPU: 0 PID: 23665 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1530.621289][T23665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1530.621294][T23665] Call Trace: [ 1530.621323][T23665] dump_stack+0x11d/0x187 [ 1530.621392][T23665] should_fail.cold+0x5/0xf [ 1530.621420][T23665] __should_failslab+0x82/0xb0 [ 1530.621438][T23665] should_failslab+0x5/0xf [ 1530.621466][T23665] kmem_cache_alloc+0x23/0x5e0 [ 1530.621488][T23665] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1530.621505][T23665] ? __write_once_size+0x45/0xd0 [ 1530.621524][T23665] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1530.621546][T23665] __d_alloc+0x51/0x4a0 [ 1530.621573][T23665] d_alloc_pseudo+0x23/0x60 [ 1530.621635][T23665] alloc_file_pseudo+0x95/0x1b0 [ 1530.621663][T23665] __shmem_file_setup.part.0+0xc8/0x1e0 [ 1530.621687][T23665] shmem_file_setup+0x77/0xa0 [ 1530.621710][T23665] __x64_sys_memfd_create+0x205/0x370 [ 1530.621763][T23665] ? debug_smp_processor_id+0x3f/0x129 [ 1530.621816][T23665] do_syscall_64+0xc7/0x390 [ 1530.621840][T23665] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1530.621853][T23665] RIP: 0033:0x45c849 [ 1530.621875][T23665] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1530.621885][T23665] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1530.621902][T23665] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c849 [ 1530.621913][T23665] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 1530.621923][T23665] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1530.621997][T23665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1530.622008][T23665] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000002 [ 1530.712158][T23667] FAULT_INJECTION: forcing a failure. [ 1530.712158][T23667] name failslab, interval 1, probability 0, space 0, times 0 [ 1530.712180][T23667] CPU: 0 PID: 23667 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1530.712189][T23667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1530.712194][T23667] Call Trace: [ 1530.712223][T23667] dump_stack+0x11d/0x187 [ 1530.712247][T23667] should_fail.cold+0x5/0xf [ 1530.712336][T23667] __should_failslab+0x82/0xb0 [ 1530.712426][T23667] should_failslab+0x5/0xf [ 1530.712443][T23667] kmem_cache_alloc+0x23/0x5e0 [ 1530.712462][T23667] ? kmem_cache_alloc+0x1e2/0x5e0 [ 1530.712482][T23667] ? memcg_kmem_put_cache+0x77/0xc0 [ 1530.712507][T23667] security_file_alloc+0x44/0x110 [ 1530.712526][T23667] __alloc_file+0x9f/0x200 [ 1530.712548][T23667] alloc_empty_file+0x8b/0x180 [ 1530.712569][T23667] alloc_file+0x4e/0x2b0 [ 1530.712651][T23667] alloc_file_pseudo+0x121/0x1b0 [ 1530.712678][T23667] __shmem_file_setup.part.0+0xc8/0x1e0 [ 1530.712702][T23667] shmem_file_setup+0x77/0xa0 [ 1530.712804][T23667] __x64_sys_memfd_create+0x205/0x370 [ 1530.712824][T23667] ? debug_smp_processor_id+0x3f/0x129 [ 1530.712862][T23667] do_syscall_64+0xc7/0x390 [ 1530.712887][T23667] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1530.712901][T23667] RIP: 0033:0x45c849 [ 1530.712954][T23667] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1530.712964][T23667] RSP: 002b:00007fab7ff2ca68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1530.712982][T23667] RAX: ffffffffffffffda RBX: 00007fab7ff2d6d4 RCX: 000000000045c849 [ 1530.712992][T23667] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 1530.713003][T23667] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1530.713013][T23667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1530.713023][T23667] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000004 [ 1530.836585][T23673] FAULT_INJECTION: forcing a failure. [ 1530.836585][T23673] name failslab, interval 1, probability 0, space 0, times 0 [ 1530.836610][T23673] CPU: 1 PID: 23673 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1530.836619][T23673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1530.836624][T23673] Call Trace: [ 1530.836651][T23673] dump_stack+0x11d/0x187 [ 1530.836677][T23673] should_fail.cold+0x5/0xf [ 1530.836708][T23673] __should_failslab+0x82/0xb0 [ 1530.836724][T23673] should_failslab+0x5/0xf [ 1530.836747][T23673] kmem_cache_alloc+0x23/0x5e0 [ 1530.836816][T23673] ? memcg_kmem_put_cache+0x77/0xc0 [ 1530.836925][T23673] ? kmem_cache_alloc+0x1e2/0x5e0 [ 1530.836965][T23673] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1530.836991][T23673] __alloc_file+0x49/0x200 [ 1530.837018][T23673] alloc_empty_file+0x8b/0x180 [ 1530.837040][T23673] alloc_file+0x4e/0x2b0 [ 1530.837066][T23673] alloc_file_pseudo+0x121/0x1b0 [ 1530.837171][T23673] __shmem_file_setup.part.0+0xc8/0x1e0 [ 1530.837197][T23673] shmem_file_setup+0x77/0xa0 [ 1530.837224][T23673] __x64_sys_memfd_create+0x205/0x370 [ 1530.837253][T23673] ? debug_smp_processor_id+0x3f/0x129 [ 1530.837281][T23673] do_syscall_64+0xc7/0x390 [ 1530.837311][T23673] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1530.837331][T23673] RIP: 0033:0x45c849 [ 1530.837381][T23673] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1530.837390][T23673] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1530.837416][T23673] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c849 [ 1530.837431][T23673] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 1530.837441][T23673] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1530.837450][T23673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1530.837460][T23673] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000003 [ 1530.913338][T23676] FAULT_INJECTION: forcing a failure. [ 1530.913338][T23676] name failslab, interval 1, probability 0, space 0, times 0 [ 1530.913359][T23676] CPU: 1 PID: 23676 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1530.913368][T23676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1530.913373][T23676] Call Trace: [ 1530.913466][T23676] dump_stack+0x11d/0x187 [ 1530.913490][T23676] should_fail.cold+0x5/0xf [ 1530.913531][T23676] __should_failslab+0x82/0xb0 [ 1530.913549][T23676] should_failslab+0x5/0xf [ 1530.913565][T23676] __kmalloc+0x54/0x640 [ 1530.913585][T23676] ? tomoyo_realpath_from_path+0x85/0x3d0 [ 1530.913601][T23676] ? should_fail+0x7c/0x2fd [ 1530.913626][T23676] tomoyo_realpath_from_path+0x85/0x3d0 [ 1530.913729][T23676] tomoyo_path_perm+0x14e/0x350 [ 1530.913750][T23676] ? percpu_counter_add_batch+0x10f/0x140 [ 1530.913796][T23676] tomoyo_path_truncate+0x23/0x40 [ 1530.913814][T23676] security_path_truncate+0x97/0xc0 [ 1530.913887][T23676] do_sys_ftruncate+0x284/0x340 [ 1530.913907][T23676] __x64_sys_ftruncate+0x3c/0x50 [ 1530.913929][T23676] do_syscall_64+0xc7/0x390 [ 1530.913964][T23676] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1530.913977][T23676] RIP: 0033:0x45c817 [ 1530.914018][T23676] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1530.914028][T23676] RSP: 002b:00007fab7ff2ca68 EFLAGS: 00000213 ORIG_RAX: 000000000000004d [ 1530.914045][T23676] RAX: ffffffffffffffda RBX: 00007fab7ff2d6d4 RCX: 000000000045c817 [ 1530.914085][T23676] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1530.914094][T23676] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1530.914104][T23676] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000006 [ 1530.914114][T23676] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000005 [ 1530.914179][T23676] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1530.939588][T23676] jfs: Unrecognized mount option "hash" or missing value [ 1531.028784][T23679] FAULT_INJECTION: forcing a failure. [ 1531.028784][T23679] name failslab, interval 1, probability 0, space 0, times 0 [ 1531.028806][T23679] CPU: 0 PID: 23679 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1531.028817][T23679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1531.028822][T23679] Call Trace: [ 1531.028853][T23679] dump_stack+0x11d/0x187 [ 1531.028879][T23679] should_fail.cold+0x5/0xf [ 1531.028970][T23679] __should_failslab+0x82/0xb0 [ 1531.028990][T23679] should_failslab+0x5/0xf [ 1531.029009][T23679] kmem_cache_alloc+0x23/0x5e0 [ 1531.029032][T23679] ? kmem_cache_alloc+0x1e2/0x5e0 [ 1531.029055][T23679] ? memcg_kmem_put_cache+0x77/0xc0 [ 1531.029139][T23679] security_file_alloc+0x44/0x110 [ 1531.029161][T23679] __alloc_file+0x9f/0x200 [ 1531.029184][T23679] alloc_empty_file+0x8b/0x180 [ 1531.029207][T23679] alloc_file+0x4e/0x2b0 [ 1531.029232][T23679] alloc_file_pseudo+0x121/0x1b0 [ 1531.029332][T23679] __shmem_file_setup.part.0+0xc8/0x1e0 [ 1531.029373][T23679] shmem_file_setup+0x77/0xa0 [ 1531.029396][T23679] __x64_sys_memfd_create+0x205/0x370 [ 1531.029416][T23679] ? debug_smp_processor_id+0x3f/0x129 [ 1531.029442][T23679] do_syscall_64+0xc7/0x390 [ 1531.029467][T23679] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1531.029481][T23679] RIP: 0033:0x45c849 [ 1531.029501][T23679] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1531.029510][T23679] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1531.029542][T23679] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c849 [ 1531.029584][T23679] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1941 [ 1531.029594][T23679] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1531.029603][T23679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1531.029613][T23679] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000004 [ 1531.208315][T23681] FAULT_INJECTION: forcing a failure. [ 1531.208315][T23681] name failslab, interval 1, probability 0, space 0, times 0 [ 1531.208336][T23681] CPU: 1 PID: 23681 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1531.208345][T23681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1531.208350][T23681] Call Trace: [ 1531.208381][T23681] dump_stack+0x11d/0x187 [ 1531.208406][T23681] should_fail.cold+0x5/0xf [ 1531.208443][T23681] __should_failslab+0x82/0xb0 [ 1531.208462][T23681] should_failslab+0x5/0xf [ 1531.208479][T23681] __kmalloc+0x54/0x640 [ 1531.208498][T23681] ? tomoyo_realpath_from_path+0x85/0x3d0 [ 1531.208576][T23681] ? should_fail+0x7c/0x2fd [ 1531.208606][T23681] tomoyo_realpath_from_path+0x85/0x3d0 [ 1531.208633][T23681] tomoyo_path_perm+0x14e/0x350 [ 1531.208657][T23681] ? percpu_counter_add_batch+0x10f/0x140 [ 1531.208758][T23681] tomoyo_path_truncate+0x23/0x40 [ 1531.208781][T23681] security_path_truncate+0x97/0xc0 [ 1531.208801][T23681] do_sys_ftruncate+0x284/0x340 [ 1531.208824][T23681] __x64_sys_ftruncate+0x3c/0x50 [ 1531.208849][T23681] do_syscall_64+0xc7/0x390 [ 1531.208876][T23681] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1531.208889][T23681] RIP: 0033:0x45c817 [ 1531.208992][T23681] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1531.209003][T23681] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1531.209021][T23681] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c817 [ 1531.209032][T23681] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 1531.209044][T23681] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1531.209055][T23681] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000003 [ 1531.209065][T23681] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000005 [ 1531.209134][T23681] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1531.398114][T23684] FAULT_INJECTION: forcing a failure. [ 1531.398114][T23684] name failslab, interval 1, probability 0, space 0, times 0 [ 1531.398176][T23684] CPU: 1 PID: 23684 Comm: syz-executor.4 Not tainted 5.6.0-rc1-syzkaller #0 [ 1531.398186][T23684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1531.398190][T23684] Call Trace: [ 1531.398261][T23684] dump_stack+0x11d/0x187 [ 1531.398287][T23684] should_fail.cold+0x5/0xf [ 1531.398314][T23684] __should_failslab+0x82/0xb0 [ 1531.398331][T23684] should_failslab+0x5/0xf [ 1531.398347][T23684] __kmalloc+0x54/0x640 [ 1531.398365][T23684] ? tomoyo_encode2.part.0+0xd0/0x240 [ 1531.398398][T23684] ? memcg_kmem_put_cache+0x77/0xc0 [ 1531.398459][T23684] ? debug_smp_processor_id+0x3f/0x129 [ 1533.299372][T23684] tomoyo_encode2.part.0+0xd0/0x240 [ 1533.299395][T23684] tomoyo_encode+0x32/0x50 [ 1533.299425][T23684] tomoyo_realpath_from_path+0x11e/0x3d0 [ 1533.315636][T23684] tomoyo_path_perm+0x14e/0x350 [ 1533.320580][T23684] ? percpu_counter_add_batch+0x10f/0x140 [ 1533.326396][T23684] tomoyo_path_truncate+0x23/0x40 [ 1533.331436][T23684] security_path_truncate+0x97/0xc0 [ 1533.336727][T23684] do_sys_ftruncate+0x284/0x340 [ 1533.341682][T23684] __x64_sys_ftruncate+0x3c/0x50 [ 1533.346655][T23684] do_syscall_64+0xc7/0x390 [ 1533.351177][T23684] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1533.357088][T23684] RIP: 0033:0x45c817 [ 1533.361093][T23684] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1533.382200][T23684] RSP: 002b:00007fab7ff2ca68 EFLAGS: 00000213 ORIG_RAX: 000000000000004d [ 1533.382238][T23684] RAX: ffffffffffffffda RBX: 00007fab7ff2d6d4 RCX: 000000000045c817 [ 1533.398787][T23684] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1533.406766][T23684] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 14:10:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0x800000000000000, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x10000, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) 14:10:25 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1533.415786][T23684] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000006 [ 1533.423784][T23684] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000006 [ 1533.435524][T23684] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1533.483528][T23684] jfs: Unrecognized mount option "hash" or missing value [ 1533.525209][T23688] FAULT_INJECTION: forcing a failure. [ 1533.525209][T23688] name failslab, interval 1, probability 0, space 0, times 0 [ 1533.547109][T23688] CPU: 1 PID: 23688 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1533.556292][T23688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1533.567041][T23688] Call Trace: [ 1533.570351][T23688] dump_stack+0x11d/0x187 [ 1533.576914][T23688] should_fail.cold+0x5/0xf [ 1533.581466][T23688] __should_failslab+0x82/0xb0 [ 1533.586416][T23688] should_failslab+0x5/0xf [ 1533.592757][T23688] __kmalloc+0x54/0x640 [ 1533.596929][T23688] ? tomoyo_encode2.part.0+0xd0/0x240 [ 1533.602461][T23688] ? memcg_kmem_put_cache+0x77/0xc0 [ 1533.610562][T23688] ? debug_smp_processor_id+0x3f/0x129 [ 1533.616041][T23688] tomoyo_encode2.part.0+0xd0/0x240 [ 1533.621269][T23688] tomoyo_encode+0x32/0x50 14:10:25 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1533.625745][T23688] tomoyo_realpath_from_path+0x11e/0x3d0 [ 1533.633317][T23688] tomoyo_path_perm+0x14e/0x350 [ 1533.633340][T23688] ? percpu_counter_add_batch+0x10f/0x140 [ 1533.633436][T23688] tomoyo_path_truncate+0x23/0x40 14:10:25 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1533.633504][T23688] security_path_truncate+0x97/0xc0 [ 1533.633522][T23688] do_sys_ftruncate+0x284/0x340 [ 1533.633543][T23688] __x64_sys_ftruncate+0x3c/0x50 [ 1533.633566][T23688] do_syscall_64+0xc7/0x390 [ 1533.633592][T23688] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1533.633647][T23688] RIP: 0033:0x45c817 14:10:26 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1533.633668][T23688] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1533.633677][T23688] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1533.633694][T23688] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c817 [ 1533.633704][T23688] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 1533.633715][T23688] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000001 [ 1533.633725][T23688] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000003 14:10:26 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1533.633734][T23688] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000006 14:10:26 executing program 5 (fault-call:0 fault-nth:8): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1533.672544][T23688] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1533.903649][T23695] jfs: Unrecognized mount option "hash" or missing value [ 1534.029815][T23698] FAULT_INJECTION: forcing a failure. [ 1534.029815][T23698] name failslab, interval 1, probability 0, space 0, times 0 [ 1534.029843][T23698] CPU: 1 PID: 23698 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1534.029853][T23698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1534.029870][T23698] Call Trace: [ 1534.029912][T23698] dump_stack+0x11d/0x187 [ 1534.029939][T23698] should_fail.cold+0x5/0xf [ 1534.030000][T23698] __should_failslab+0x82/0xb0 [ 1534.030035][T23698] should_failslab+0x5/0xf [ 1534.030068][T23698] kmem_cache_alloc+0x23/0x5e0 [ 1534.030104][T23698] ? ima_inode_post_setattr+0x11c/0x160 [ 1534.030127][T23698] ? evm_inode_post_setattr+0x59/0x77 [ 1534.030147][T23698] getname_flags+0x8e/0x380 [ 1534.030172][T23698] getname+0x20/0x30 [ 1534.030234][T23698] do_sys_openat2+0x38e/0x620 [ 1534.030309][T23698] do_sys_open+0xa2/0x110 [ 1534.030336][T23698] __x64_sys_open+0x50/0x60 [ 1534.030359][T23698] do_syscall_64+0xc7/0x390 [ 1534.030383][T23698] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1534.030395][T23698] RIP: 0033:0x4165e1 [ 1534.030461][T23698] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1534.030471][T23698] RSP: 002b:00007f3d0323ca60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1534.030487][T23698] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 00000000004165e1 [ 1534.030498][T23698] RDX: 00007f3d0323cb0a RSI: 0000000000000002 RDI: 00007f3d0323cb00 [ 1534.030508][T23698] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1534.030517][T23698] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 1534.030525][T23698] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000007 [ 1534.188711][T23700] jfs: Unrecognized mount option "hash" or missing value [ 1534.269835][T23703] FAULT_INJECTION: forcing a failure. [ 1534.269835][T23703] name failslab, interval 1, probability 0, space 0, times 0 [ 1534.442926][T23703] CPU: 0 PID: 23703 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1534.453109][T23703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1534.463722][T23703] Call Trace: [ 1534.467658][T23703] dump_stack+0x11d/0x187 [ 1534.472006][T23703] should_fail.cold+0x5/0xf [ 1534.477116][T23703] __should_failslab+0x82/0xb0 [ 1534.481993][T23703] should_failslab+0x5/0xf [ 1534.486454][T23703] kmem_cache_alloc+0x23/0x5e0 [ 1534.491243][T23703] ? format_decode+0x19c/0xaa0 [ 1534.496038][T23703] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1534.501949][T23703] __alloc_file+0x49/0x200 [ 1534.506381][T23703] alloc_empty_file+0x8b/0x180 [ 1534.511158][T23703] path_openat+0x72/0x2f70 [ 1534.515584][T23703] ? strcmp+0x57/0x70 [ 1534.519583][T23703] ? tomoyo_path_matches_pattern+0x93/0x140 [ 1534.525556][T23703] ? debug_smp_processor_id+0x3f/0x129 [ 1534.531054][T23703] ? ___cache_free+0x2c/0x320 [ 1534.535815][T23703] do_filp_open+0x11e/0x1b0 [ 1534.540346][T23703] ? expand_files+0x2e7/0x400 [ 1534.545079][T23703] ? __virt_addr_valid+0x120/0x180 [ 1534.550229][T23703] ? __read_once_size.constprop.0+0xd/0x20 [ 1534.556231][T23703] ? _find_next_bit.constprop.0+0x126/0x160 [ 1534.562283][T23703] ? __read_once_size+0x2f/0xd0 [ 1534.567253][T23703] ? _raw_spin_unlock+0x38/0x60 [ 1534.572116][T23703] ? __alloc_fd+0x2f3/0x3b0 [ 1534.576809][T23703] do_sys_openat2+0x4f5/0x620 [ 1534.581511][T23703] do_sys_open+0xa2/0x110 [ 1534.585861][T23703] __x64_sys_open+0x50/0x60 [ 1534.591363][T23703] do_syscall_64+0xc7/0x390 [ 1534.595969][T23703] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1534.601872][T23703] RIP: 0033:0x4165e1 [ 1534.605780][T23703] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1534.627828][T23703] RSP: 002b:00007f3d0323ca60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1534.636254][T23703] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 00000000004165e1 [ 1534.644289][T23703] RDX: 00007f3d0323cb0a RSI: 0000000000000002 RDI: 00007f3d0323cb00 [ 1534.652379][T23703] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1534.661465][T23703] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 1534.669482][T23703] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000008 [ 1534.688945][T23705] jfs: Unrecognized mount option "hash" or missing value 14:10:27 executing program 5 (fault-call:0 fault-nth:9): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r2) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000140)={0xf800, 0x38, 0x1f, 0x200, 0x13, "24b5c59923d5fb2a"}) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r1, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGPKT(r4, 0x80045438, &(0x7f0000000100)) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x404280, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:10:27 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1534.824817][T23712] FAULT_INJECTION: forcing a failure. [ 1534.824817][T23712] name failslab, interval 1, probability 0, space 0, times 0 [ 1534.887214][T23712] CPU: 0 PID: 23712 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1534.895943][T23712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1534.905998][T23712] Call Trace: [ 1534.909361][T23712] dump_stack+0x11d/0x187 [ 1534.913710][T23712] should_fail.cold+0x5/0xf [ 1534.919188][T23712] __should_failslab+0x82/0xb0 [ 1534.923981][T23712] should_failslab+0x5/0xf [ 1534.928412][T23712] kmem_cache_alloc+0x23/0x5e0 [ 1534.933362][T23712] ? kmem_cache_alloc+0x1e2/0x5e0 [ 1534.938398][T23712] ? format_decode+0x19c/0xaa0 [ 1534.943277][T23712] security_file_alloc+0x44/0x110 [ 1534.949282][T23712] __alloc_file+0x9f/0x200 [ 1534.953714][T23712] alloc_empty_file+0x8b/0x180 [ 1534.958561][T23712] path_openat+0x72/0x2f70 [ 1534.963060][T23712] ? strcmp+0x57/0x70 [ 1534.967062][T23712] ? tomoyo_path_matches_pattern+0x93/0x140 [ 1534.973118][T23712] ? debug_smp_processor_id+0x3f/0x129 [ 1534.978621][T23712] ? ___cache_free+0x2c/0x320 [ 1534.983442][T23712] do_filp_open+0x11e/0x1b0 [ 1534.988018][T23712] ? expand_files+0x2e7/0x400 [ 1534.993665][T23712] ? __virt_addr_valid+0x120/0x180 [ 1534.998795][T23712] ? __read_once_size.constprop.0+0xd/0x20 [ 1535.004723][T23712] ? _find_next_bit.constprop.0+0x126/0x160 [ 1535.010636][T23712] ? __read_once_size+0x2f/0xd0 [ 1535.016571][T23712] ? _raw_spin_unlock+0x38/0x60 [ 1535.021436][T23712] ? __alloc_fd+0x2f3/0x3b0 [ 1535.025972][T23712] do_sys_openat2+0x4f5/0x620 [ 1535.030761][T23712] do_sys_open+0xa2/0x110 [ 1535.035173][T23712] __x64_sys_open+0x50/0x60 [ 1535.039705][T23712] do_syscall_64+0xc7/0x390 [ 1535.044752][T23712] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1535.051123][T23712] RIP: 0033:0x4165e1 [ 1535.055035][T23712] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1535.075094][T23712] RSP: 002b:00007f3d0323ca60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1535.083613][T23712] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 00000000004165e1 [ 1535.092622][T23712] RDX: 00007f3d0323cb0a RSI: 0000000000000002 RDI: 00007f3d0323cb00 [ 1535.100608][T23712] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1535.108590][T23712] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 1535.116569][T23712] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000009 14:10:27 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1535.139646][T23714] jfs: Unrecognized mount option "hash" or missing value 14:10:27 executing program 5 (fault-call:0 fault-nth:10): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) [ 1535.311493][T23721] jfs: Unrecognized mount option "hash" or missing value [ 1535.322394][T23724] FAULT_INJECTION: forcing a failure. [ 1535.322394][T23724] name failslab, interval 1, probability 0, space 0, times 0 [ 1535.338830][T23724] CPU: 1 PID: 23724 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1535.347530][T23724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1535.358170][T23724] Call Trace: [ 1535.362380][T23724] dump_stack+0x11d/0x187 [ 1535.367074][T23724] should_fail.cold+0x5/0xf [ 1535.371721][T23724] __should_failslab+0x82/0xb0 [ 1535.376577][T23724] should_failslab+0x5/0xf [ 1535.381031][T23724] __kmalloc+0x54/0x640 [ 1535.385292][T23724] ? tomoyo_realpath_from_path+0x85/0x3d0 [ 1535.391054][T23724] ? ima_match_policy+0x643/0xac0 [ 1535.396095][T23724] tomoyo_realpath_from_path+0x85/0x3d0 [ 1535.401672][T23724] tomoyo_check_open_permission+0x1dc/0x2d0 [ 1535.409594][T23724] tomoyo_file_open+0x6c/0x90 [ 1535.415925][T23724] security_file_open+0x5f/0x1f0 [ 1535.415951][T23724] do_dentry_open+0x212/0x970 [ 1535.415977][T23724] ? inode_permission+0x98/0x360 [ 1535.415996][T23724] vfs_open+0x62/0x80 [ 1535.416036][T23724] path_openat+0xdbf/0x2f70 [ 1535.416146][T23724] ? debug_smp_processor_id+0x3f/0x129 [ 1535.416190][T23724] ? ___cache_free+0x2c/0x320 [ 1535.450340][T23724] do_filp_open+0x11e/0x1b0 [ 1535.450379][T23724] ? __read_once_size+0x2f/0xd0 [ 1535.450398][T23724] ? _raw_spin_unlock+0x38/0x60 [ 1535.450414][T23724] ? __alloc_fd+0x2f3/0x3b0 [ 1535.450446][T23724] do_sys_openat2+0x4f5/0x620 [ 1535.450473][T23724] do_sys_open+0xa2/0x110 [ 1535.450496][T23724] __x64_sys_open+0x50/0x60 [ 1535.450585][T23724] do_syscall_64+0xc7/0x390 [ 1535.450610][T23724] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1535.450629][T23724] RIP: 0033:0x4165e1 [ 1535.450653][T23724] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1535.450663][T23724] RSP: 002b:00007f3d0323ca60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1535.450679][T23724] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 00000000004165e1 [ 1535.450689][T23724] RDX: 00007f3d0323cb0a RSI: 0000000000000002 RDI: 00007f3d0323cb00 [ 1535.450698][T23724] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1535.450708][T23724] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 1535.450718][T23724] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000000a [ 1535.456473][T23724] ERROR: Out of memory at tomoyo_realpath_from_path. 14:10:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x9, 0x0, 0x50d, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vivid(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x2) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_QUERYSTD(r3, 0x8008563f, &(0x7f0000000100)) fallocate(r0, 0x10, 0xfffffffffffffffe, 0x7fffffff) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r4, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:10:27 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1535.821491][T23733] jfs: Unrecognized mount option "hash" or missing value 14:10:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$UHID_INPUT(r4, &(0x7f0000000100)={0x8, {"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", 0x1000}}, 0x1006) fchmodat(r1, &(0x7f00000000c0)='./file0\x00', 0x12) [ 1535.925802][T23735] jfs: Unrecognized mount option "hash" or missing value 14:10:28 executing program 5 (fault-call:0 fault-nth:11): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:28 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1536.109994][T23744] FAULT_INJECTION: forcing a failure. [ 1536.109994][T23744] name failslab, interval 1, probability 0, space 0, times 0 14:10:28 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4000000000000, 0x2000000000}, 0x0, 0x0, 0x0, 0x0, 0x5a3f}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x8e0f) r4 = socket$netlink(0x10, 0x3, 0x0) dup2(r4, r1) syz_open_dev$tty20(0xc, 0x4, 0x1) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000000c0)) fcntl$setflags(r0, 0x2, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r5) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x40a800, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r6, 0x541c, &(0x7f00000001c0)) ioctl$RTC_PLL_SET(r5, 0x40207012, &(0x7f0000000040)={0x5, 0x5, 0x1, 0x3, 0x5, 0x6, 0x7}) [ 1536.201921][T23744] CPU: 1 PID: 23744 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1536.210627][T23744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1536.220865][T23744] Call Trace: [ 1536.224214][T23744] dump_stack+0x11d/0x187 [ 1536.228564][T23744] should_fail.cold+0x5/0xf [ 1536.233085][T23744] __should_failslab+0x82/0xb0 [ 1536.237900][T23744] should_failslab+0x5/0xf [ 1536.242347][T23744] __kmalloc+0x54/0x640 [ 1536.246522][T23744] ? tomoyo_realpath_from_path+0x85/0x3d0 [ 1536.252263][T23744] ? ima_match_policy+0x643/0xac0 [ 1536.257482][T23744] tomoyo_realpath_from_path+0x85/0x3d0 [ 1536.263105][T23744] tomoyo_check_open_permission+0x1dc/0x2d0 [ 1536.269053][T23744] tomoyo_file_open+0x6c/0x90 [ 1536.273787][T23744] security_file_open+0x5f/0x1f0 [ 1536.278872][T23744] do_dentry_open+0x212/0x970 [ 1536.283563][T23744] ? inode_permission+0x98/0x360 [ 1536.288510][T23744] vfs_open+0x62/0x80 [ 1536.292521][T23744] path_openat+0xdbf/0x2f70 [ 1536.297088][T23744] ? debug_smp_processor_id+0x3f/0x129 [ 1536.302581][T23744] ? ___cache_free+0x2c/0x320 [ 1536.307477][T23744] do_filp_open+0x11e/0x1b0 [ 1536.312003][T23744] ? __read_once_size+0x2f/0xd0 [ 1536.316870][T23744] ? _raw_spin_unlock+0x38/0x60 [ 1536.321744][T23744] ? __alloc_fd+0x2f3/0x3b0 [ 1536.326284][T23744] do_sys_openat2+0x4f5/0x620 [ 1536.330977][T23744] do_sys_open+0xa2/0x110 [ 1536.335360][T23744] __x64_sys_open+0x50/0x60 [ 1536.342492][T23744] do_syscall_64+0xc7/0x390 [ 1536.347091][T23744] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1536.353302][T23744] RIP: 0033:0x4165e1 [ 1536.357208][T23744] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1536.376822][T23744] RSP: 002b:00007f3d0323ca60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1536.385244][T23744] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 00000000004165e1 [ 1536.394767][T23744] RDX: 00007f3d0323cb0a RSI: 0000000000000002 RDI: 00007f3d0323cb00 [ 1536.403484][T23744] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1536.411646][T23744] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 1536.419627][T23744] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000000b 14:10:28 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1536.487696][T23746] jfs: Unrecognized mount option "hash" or missing value [ 1536.593750][T23744] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1536.627563][T23753] jfs: Unrecognized mount option "hash" or missing value 14:10:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x7, 0x400000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x7a, &(0x7f0000000080)={r4, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r4, 0x1, 0x2, 0x5, 0xb26a, 0xb0}, &(0x7f0000000180)=0x14) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r6) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r6, 0x80045400, &(0x7f00000000c0)) 14:10:28 executing program 5 (fault-call:0 fault-nth:12): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:29 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1536.928985][T23759] jfs: Unrecognized mount option "hash" or missing value [ 1537.045520][T23763] jfs: Unrecognized mount option "hash" or missing value [ 1537.086976][T23766] FAULT_INJECTION: forcing a failure. [ 1537.086976][T23766] name failslab, interval 1, probability 0, space 0, times 0 [ 1537.166555][T23766] CPU: 0 PID: 23766 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1537.176748][T23766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1537.186834][T23766] Call Trace: [ 1537.190167][T23766] dump_stack+0x11d/0x187 [ 1537.194521][T23766] should_fail.cold+0x5/0xf [ 1537.199220][T23766] __should_failslab+0x82/0xb0 [ 1537.204591][T23766] should_failslab+0x5/0xf [ 1537.209990][T23766] __kmalloc+0x54/0x640 [ 1537.214773][T23766] ? tomoyo_realpath_from_path+0x85/0x3d0 [ 1537.221388][T23766] tomoyo_realpath_from_path+0x85/0x3d0 [ 1537.226984][T23766] tomoyo_path_number_perm+0xff/0x360 [ 1537.232498][T23766] ? __fget_files+0xa2/0x1c0 [ 1537.238444][T23766] tomoyo_file_ioctl+0x28/0x40 [ 1537.243224][T23766] security_file_ioctl+0x69/0xa0 [ 1537.248406][T23766] ksys_ioctl+0x5a/0x150 [ 1537.254539][T23766] __x64_sys_ioctl+0x47/0x60 [ 1537.259461][T23766] do_syscall_64+0xc7/0x390 [ 1537.263986][T23766] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1537.269977][T23766] RIP: 0033:0x45c6b7 [ 1537.273905][T23766] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1537.293889][T23766] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1537.302955][T23766] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c6b7 14:10:29 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1537.311649][T23766] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1537.320912][T23766] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1537.328947][T23766] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1537.338465][T23766] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000000c [ 1537.358047][T23766] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1537.369851][T23768] jfs: Unrecognized mount option "hash" or missing value [ 1537.487549][T23773] jfs: Unrecognized mount option "hash" or missing value 14:10:29 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:29 executing program 5 (fault-call:0 fault-nth:13): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:29 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1537.768816][T23776] jfs: Unrecognized mount option "hash" or missing value [ 1537.774242][T23780] FAULT_INJECTION: forcing a failure. [ 1537.774242][T23780] name failslab, interval 1, probability 0, space 0, times 0 [ 1537.808993][T23780] CPU: 0 PID: 23780 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1537.818333][T23780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1537.829895][T23780] Call Trace: [ 1537.833311][T23780] dump_stack+0x11d/0x187 [ 1537.837652][T23780] should_fail.cold+0x5/0xf [ 1537.842251][T23780] __should_failslab+0x82/0xb0 [ 1537.848934][T23780] should_failslab+0x5/0xf [ 1537.853369][T23780] __kmalloc+0x54/0x640 [ 1537.857605][T23780] ? tomoyo_encode2.part.0+0xd0/0x240 [ 1537.863068][T23780] tomoyo_encode2.part.0+0xd0/0x240 [ 1537.868294][T23780] tomoyo_encode+0x32/0x50 [ 1537.872719][T23780] tomoyo_realpath_from_path+0x11e/0x3d0 [ 1537.879352][T23780] tomoyo_path_number_perm+0xff/0x360 [ 1537.884786][T23780] ? __fget_files+0xa2/0x1c0 [ 1537.889400][T23780] tomoyo_file_ioctl+0x28/0x40 [ 1537.894224][T23780] security_file_ioctl+0x69/0xa0 [ 1537.899283][T23780] ksys_ioctl+0x5a/0x150 [ 1537.904843][T23780] __x64_sys_ioctl+0x47/0x60 [ 1537.909448][T23780] do_syscall_64+0xc7/0x390 [ 1537.913972][T23780] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1537.920738][T23780] RIP: 0033:0x45c6b7 [ 1537.924671][T23780] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1537.946196][T23780] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1537.954620][T23780] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c6b7 [ 1537.962663][T23780] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1537.970749][T23780] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1537.979683][T23780] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1537.987661][T23780] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000000d [ 1538.045569][T23782] jfs: Unrecognized mount option "hash" or missing value [ 1538.086457][T23780] ERROR: Out of memory at tomoyo_realpath_from_path. 14:10:30 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:30 executing program 5 (fault-call:0 fault-nth:14): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1538.357814][T23786] jfs: Unrecognized mount option "hash" or missing value [ 1538.379788][T23789] FAULT_INJECTION: forcing a failure. [ 1538.379788][T23789] name failslab, interval 1, probability 0, space 0, times 0 [ 1538.426428][T23789] CPU: 0 PID: 23789 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1538.435581][T23789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1538.445639][T23789] Call Trace: [ 1538.448959][T23789] dump_stack+0x11d/0x187 [ 1538.453433][T23789] should_fail.cold+0x5/0xf [ 1538.457964][T23789] ? loop_info64_to_compat+0x420/0x420 [ 1538.463442][T23789] __should_failslab+0x82/0xb0 [ 1538.469171][T23789] should_failslab+0x5/0xf [ 1538.473594][T23789] kmem_cache_alloc_trace+0x26/0x5f0 [ 1538.478919][T23789] ? get_disk_and_module+0xb0/0xb0 [ 1538.484216][T23789] ? get_disk_and_module+0x85/0xb0 [ 1538.489338][T23789] ? exact_lock+0x24/0x40 [ 1538.493727][T23789] ? module_put+0xe/0x30 [ 1538.498166][T23789] ? loop_info64_to_compat+0x420/0x420 [ 1538.503638][T23789] __kthread_create_on_node+0x9f/0x2b0 [ 1538.509112][T23789] ? kobject_put+0x9b/0x1d0 [ 1538.513630][T23789] ? loop_info64_to_compat+0x420/0x420 [ 1538.519131][T23789] kthread_create_on_node+0x72/0xa0 [ 1538.524344][T23789] ? __write_once_size.constprop.0+0xd/0x20 [ 1538.530267][T23789] loop_set_fd+0x250/0xa70 [ 1538.534842][T23789] lo_ioctl+0x18c/0xc80 [ 1538.539023][T23789] ? blkdev_common_ioctl+0x86/0xea0 [ 1538.544370][T23789] ? loop_set_fd+0xa70/0xa70 [ 1538.549064][T23789] blkdev_ioctl+0x1a1/0x420 [ 1538.553581][T23789] block_ioctl+0x91/0xb0 [ 1538.558010][T23789] ? blkdev_fallocate+0x2e0/0x2e0 [ 1538.563049][T23789] ksys_ioctl+0x101/0x150 [ 1538.567404][T23789] __x64_sys_ioctl+0x47/0x60 [ 1538.572013][T23789] do_syscall_64+0xc7/0x390 [ 1538.576536][T23789] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1538.582434][T23789] RIP: 0033:0x45c6b7 [ 1538.586388][T23789] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1538.606456][T23789] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1538.614928][T23789] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c6b7 [ 1538.622903][T23789] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1538.632005][T23789] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1538.640004][T23789] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1538.647979][T23789] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000000e 14:10:31 executing program 5 (fault-call:0 fault-nth:15): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:31 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1538.920989][T23792] jfs: Unrecognized mount option "hash" or missing value [ 1538.995227][T23796] FAULT_INJECTION: forcing a failure. [ 1538.995227][T23796] name failslab, interval 1, probability 0, space 0, times 0 [ 1539.026513][T23796] CPU: 0 PID: 23796 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1539.035257][T23796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1539.046286][T23796] Call Trace: [ 1539.049592][T23796] dump_stack+0x11d/0x187 [ 1539.053958][T23796] should_fail.cold+0x5/0xf [ 1539.058519][T23796] __should_failslab+0x82/0xb0 [ 1539.063316][T23796] should_failslab+0x5/0xf [ 1539.067792][T23796] kmem_cache_alloc+0x23/0x5e0 [ 1539.072639][T23796] ? __schedule+0x30e/0x690 [ 1539.077162][T23796] __kernfs_new_node+0x89/0x3d0 [ 1539.082035][T23796] ? _find_next_bit.constprop.0+0x126/0x160 [ 1539.088044][T23796] ? __update_load_avg_cfs_rq+0x271/0x2f0 [ 1539.093842][T23796] ? __rcu_read_lock+0x3c/0x50 [ 1539.098621][T23796] kernfs_new_node+0x76/0xd0 [ 1539.103227][T23796] kernfs_create_dir_ns+0x52/0xe0 [ 1539.108291][T23796] internal_create_group+0x567/0x6e0 [ 1539.113640][T23796] sysfs_create_group+0x26/0x40 [ 1539.118585][T23796] loop_set_fd+0x73a/0xa70 [ 1539.123071][T23796] lo_ioctl+0x18c/0xc80 [ 1539.127237][T23796] ? blkdev_common_ioctl+0x86/0xea0 [ 1539.132470][T23796] ? loop_set_fd+0xa70/0xa70 [ 1539.137062][T23796] blkdev_ioctl+0x1a1/0x420 [ 1539.141648][T23796] block_ioctl+0x91/0xb0 [ 1539.145910][T23796] ? blkdev_fallocate+0x2e0/0x2e0 [ 1539.150949][T23796] ksys_ioctl+0x101/0x150 [ 1539.155291][T23796] __x64_sys_ioctl+0x47/0x60 [ 1539.159986][T23796] do_syscall_64+0xc7/0x390 [ 1539.164503][T23796] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1539.170400][T23796] RIP: 0033:0x45c6b7 [ 1539.174397][T23796] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1539.194032][T23796] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1539.202451][T23796] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c6b7 [ 1539.210426][T23796] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1539.218400][T23796] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1539.226375][T23796] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1539.234354][T23796] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000000f 14:10:31 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:31 executing program 5 (fault-call:0 fault-nth:16): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1539.448056][T23800] jfs: Unrecognized mount option "hash" or missing value [ 1539.557516][T23803] jfs: Unrecognized mount option "hash" or missing value [ 1539.646508][T23805] FAULT_INJECTION: forcing a failure. [ 1539.646508][T23805] name failslab, interval 1, probability 0, space 0, times 0 [ 1539.659347][T23805] CPU: 0 PID: 23805 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1539.668286][T23805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1539.679298][T23805] Call Trace: [ 1539.682666][T23805] dump_stack+0x11d/0x187 [ 1539.687023][T23805] should_fail.cold+0x5/0xf [ 1539.691582][T23805] __should_failslab+0x82/0xb0 [ 1539.696711][T23805] should_failslab+0x5/0xf [ 1539.701148][T23805] kmem_cache_alloc+0x23/0x5e0 [ 1539.706174][T23805] ? get_disk_and_module+0xb0/0xb0 [ 1539.711309][T23805] ? get_disk_and_module+0x85/0xb0 [ 1539.716448][T23805] radix_tree_node_alloc.constprop.0+0x153/0x210 [ 1539.722880][T23805] idr_get_free+0x3b3/0x640 [ 1539.727463][T23805] idr_alloc_u32+0xf0/0x1b0 [ 1539.731989][T23805] ? memcg_kmem_put_cache+0x77/0xc0 [ 1539.737255][T23805] ? debug_smp_processor_id+0x3f/0x129 [ 1539.743691][T23805] idr_alloc_cyclic+0xba/0x1b0 [ 1539.748531][T23805] __kernfs_new_node+0xcc/0x3d0 [ 1539.753768][T23805] ? __this_cpu_preempt_check+0x3c/0x130 [ 1539.759440][T23805] ? cpuset_read_unlock+0xb3/0xf0 [ 1539.764489][T23805] ? debug_smp_processor_id+0x3f/0x129 [ 1539.770046][T23805] ? ___cache_free+0x2c/0x320 [ 1539.774912][T23805] ? sched_clock_cpu+0x10/0xd0 [ 1539.779701][T23805] ? task_rq_lock+0x3e/0x90 [ 1539.786819][T23805] kernfs_new_node+0x76/0xd0 [ 1539.791822][T23805] kernfs_create_dir_ns+0x52/0xe0 [ 1539.797037][T23805] internal_create_group+0x567/0x6e0 [ 1539.802441][T23805] sysfs_create_group+0x26/0x40 [ 1539.807329][T23805] loop_set_fd+0x73a/0xa70 [ 1539.814100][T23805] lo_ioctl+0x18c/0xc80 [ 1539.818361][T23805] ? blkdev_common_ioctl+0x86/0xea0 [ 1539.823601][T23805] ? loop_set_fd+0xa70/0xa70 [ 1539.828210][T23805] blkdev_ioctl+0x1a1/0x420 [ 1539.833027][T23805] block_ioctl+0x91/0xb0 [ 1539.837303][T23805] ? blkdev_fallocate+0x2e0/0x2e0 [ 1539.842718][T23805] ksys_ioctl+0x101/0x150 [ 1539.849250][T23805] __x64_sys_ioctl+0x47/0x60 [ 1539.853959][T23805] do_syscall_64+0xc7/0x390 [ 1539.859346][T23805] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1539.866225][T23805] RIP: 0033:0x45c6b7 [ 1539.870198][T23805] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:10:31 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1539.890380][T23805] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1539.899070][T23805] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c6b7 [ 1539.907225][T23805] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1539.916196][T23805] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1539.926682][T23805] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1539.934711][T23805] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000010 14:10:32 executing program 5 (fault-call:0 fault-nth:17): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1540.065856][T23810] jfs: Unrecognized mount option "hash" or missing value [ 1540.173592][T23813] jfs: Unrecognized mount option "hash" or missing value 14:10:32 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1540.215814][T23815] FAULT_INJECTION: forcing a failure. [ 1540.215814][T23815] name failslab, interval 1, probability 0, space 0, times 0 [ 1540.255077][T23815] CPU: 0 PID: 23815 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1540.263787][T23815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1540.273848][T23815] Call Trace: [ 1540.277188][T23815] dump_stack+0x11d/0x187 [ 1540.281538][T23815] should_fail.cold+0x5/0xf [ 1540.286347][T23815] __should_failslab+0x82/0xb0 [ 1540.292194][T23815] should_failslab+0x5/0xf [ 1540.296915][T23815] kmem_cache_alloc+0x23/0x5e0 [ 1540.301974][T23815] ? idr_alloc_cyclic+0x10f/0x1b0 [ 1540.307017][T23815] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1540.313021][T23815] __kernfs_new_node+0x89/0x3d0 [ 1540.318381][T23815] ? kernfs_next_descendant_post+0xbe/0x130 [ 1540.324427][T23815] ? mutex_unlock+0xe/0x40 [ 1540.328944][T23815] ? kernfs_activate+0x13c/0x170 [ 1540.334729][T23815] kernfs_new_node+0x76/0xd0 [ 1540.339606][T23815] __kernfs_create_file+0x5b/0x1c0 [ 1540.345991][T23815] sysfs_add_file_mode_ns+0x163/0x310 [ 1540.352195][T23815] internal_create_group+0x237/0x6e0 [ 1540.358946][T23815] sysfs_create_group+0x26/0x40 [ 1540.363866][T23815] loop_set_fd+0x73a/0xa70 [ 1540.368306][T23815] lo_ioctl+0x18c/0xc80 [ 1540.372483][T23815] ? blkdev_common_ioctl+0x86/0xea0 [ 1540.379669][T23815] ? loop_set_fd+0xa70/0xa70 [ 1540.384530][T23815] blkdev_ioctl+0x1a1/0x420 [ 1540.389691][T23815] block_ioctl+0x91/0xb0 [ 1540.394452][T23815] ? blkdev_fallocate+0x2e0/0x2e0 [ 1540.404464][T23815] ksys_ioctl+0x101/0x150 [ 1540.413437][T23815] __x64_sys_ioctl+0x47/0x60 [ 1540.418055][T23815] do_syscall_64+0xc7/0x390 [ 1540.422588][T23815] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1540.428502][T23815] RIP: 0033:0x45c6b7 [ 1540.432497][T23815] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1540.454382][T23815] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1540.462918][T23815] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c6b7 [ 1540.471500][T23815] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1540.479572][T23815] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1540.488084][T23815] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1540.496083][T23815] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000011 14:10:32 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:32 executing program 5 (fault-call:0 fault-nth:18): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1540.733732][T23820] jfs: Unrecognized mount option "hash" or missing value [ 1540.856590][T23823] FAULT_INJECTION: forcing a failure. [ 1540.856590][T23823] name failslab, interval 1, probability 0, space 0, times 0 [ 1540.936512][T23823] CPU: 1 PID: 23823 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1540.946166][T23823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1540.956381][T23823] Call Trace: [ 1540.959684][T23823] dump_stack+0x11d/0x187 [ 1540.965033][T23823] should_fail.cold+0x5/0xf [ 1540.969575][T23823] __should_failslab+0x82/0xb0 [ 1540.974362][T23823] should_failslab+0x5/0xf [ 1540.978790][T23823] kmem_cache_alloc+0x23/0x5e0 [ 1540.983600][T23823] ? idr_alloc_cyclic+0x10f/0x1b0 [ 1540.988679][T23823] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1540.994578][T23823] __kernfs_new_node+0x89/0x3d0 [ 1540.999465][T23823] ? kernfs_next_descendant_post+0xbe/0x130 [ 1541.005460][T23823] ? mutex_unlock+0xe/0x40 [ 1541.009986][T23823] ? kernfs_activate+0x13c/0x170 [ 1541.014949][T23823] kernfs_new_node+0x76/0xd0 [ 1541.019599][T23823] __kernfs_create_file+0x5b/0x1c0 [ 1541.024785][T23823] sysfs_add_file_mode_ns+0x163/0x310 [ 1541.030179][T23823] internal_create_group+0x237/0x6e0 [ 1541.035515][T23823] sysfs_create_group+0x26/0x40 [ 1541.040380][T23823] loop_set_fd+0x73a/0xa70 [ 1541.044820][T23823] lo_ioctl+0x18c/0xc80 [ 1541.049955][T23823] ? blkdev_common_ioctl+0x86/0xea0 [ 1541.055173][T23823] ? loop_set_fd+0xa70/0xa70 [ 1541.059772][T23823] blkdev_ioctl+0x1a1/0x420 [ 1541.065250][T23823] block_ioctl+0x91/0xb0 [ 1541.069584][T23823] ? blkdev_fallocate+0x2e0/0x2e0 [ 1541.075155][T23823] ksys_ioctl+0x101/0x150 [ 1541.079506][T23823] __x64_sys_ioctl+0x47/0x60 [ 1541.084200][T23823] do_syscall_64+0xc7/0x390 [ 1541.088735][T23823] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1541.094669][T23823] RIP: 0033:0x45c6b7 [ 1541.098572][T23823] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1541.119051][T23823] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1541.127778][T23823] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c6b7 [ 1541.135759][T23823] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1541.143786][T23823] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1541.152201][T23823] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1541.160178][T23823] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000012 [ 1541.196296][T23825] jfs: Unrecognized mount option "hash" or missing value 14:10:33 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:33 executing program 5 (fault-call:0 fault-nth:19): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1541.440002][T23828] jfs: Unrecognized mount option "hash" or missing value [ 1541.503728][T23831] FAULT_INJECTION: forcing a failure. [ 1541.503728][T23831] name failslab, interval 1, probability 0, space 0, times 0 [ 1541.523387][T23831] CPU: 0 PID: 23831 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1541.532079][T23831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1541.542146][T23831] Call Trace: [ 1541.545460][T23831] dump_stack+0x11d/0x187 [ 1541.549818][T23831] should_fail.cold+0x5/0xf [ 1541.554368][T23831] __should_failslab+0x82/0xb0 [ 1541.567587][T23831] should_failslab+0x5/0xf [ 1541.572016][T23831] kmem_cache_alloc+0x23/0x5e0 [ 1541.576807][T23831] ? idr_alloc_cyclic+0x10f/0x1b0 [ 1541.581900][T23831] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1541.587815][T23831] __kernfs_new_node+0x89/0x3d0 [ 1541.592699][T23831] ? kernfs_next_descendant_post+0xbe/0x130 [ 1541.598604][T23831] ? mutex_unlock+0xe/0x40 [ 1541.603207][T23831] ? kernfs_activate+0x13c/0x170 [ 1541.608160][T23831] kernfs_new_node+0x76/0xd0 [ 1541.612766][T23831] __kernfs_create_file+0x5b/0x1c0 [ 1541.617903][T23831] sysfs_add_file_mode_ns+0x163/0x310 [ 1541.623291][T23831] internal_create_group+0x237/0x6e0 [ 1541.628676][T23831] sysfs_create_group+0x26/0x40 [ 1541.633583][T23831] loop_set_fd+0x73a/0xa70 [ 1541.638018][T23831] lo_ioctl+0x18c/0xc80 [ 1541.642180][T23831] ? blkdev_common_ioctl+0x86/0xea0 [ 1541.647499][T23831] ? loop_set_fd+0xa70/0xa70 [ 1541.652180][T23831] blkdev_ioctl+0x1a1/0x420 [ 1541.656745][T23831] block_ioctl+0x91/0xb0 [ 1541.661034][T23831] ? blkdev_fallocate+0x2e0/0x2e0 [ 1541.666145][T23831] ksys_ioctl+0x101/0x150 [ 1541.670602][T23831] __x64_sys_ioctl+0x47/0x60 [ 1541.675270][T23831] do_syscall_64+0xc7/0x390 [ 1541.679811][T23831] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1541.685981][T23831] RIP: 0033:0x45c6b7 [ 1541.689900][T23831] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1541.709522][T23831] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1541.717961][T23831] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c6b7 [ 1541.726076][T23831] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1541.734065][T23831] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1541.742033][T23831] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1541.750010][T23831] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000013 [ 1541.844538][T23835] jfs: Unrecognized mount option "hash" or missing value 14:10:34 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:10:34 executing program 5 (fault-call:0 fault-nth:20): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:34 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1542.093280][T23840] FAULT_INJECTION: forcing a failure. [ 1542.093280][T23840] name failslab, interval 1, probability 0, space 0, times 0 [ 1542.117233][T23840] CPU: 1 PID: 23840 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1542.125953][T23840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1542.138038][T23840] Call Trace: [ 1542.141374][T23840] dump_stack+0x11d/0x187 [ 1542.145767][T23840] should_fail.cold+0x5/0xf [ 1542.150302][T23840] __should_failslab+0x82/0xb0 [ 1542.155080][T23840] should_failslab+0x5/0xf [ 1542.160256][T23840] kmem_cache_alloc+0x23/0x5e0 [ 1542.165128][T23840] ? idr_alloc_cyclic+0x10f/0x1b0 [ 1542.170172][T23840] ? __rb_rotate_set_parents+0x96/0xe0 [ 1542.175929][T23840] __kernfs_new_node+0x89/0x3d0 [ 1542.181002][T23840] ? kernfs_next_descendant_post+0xbe/0x130 [ 1542.187123][T23840] ? mutex_unlock+0xe/0x40 [ 1542.191831][T23840] ? kernfs_activate+0x13c/0x170 [ 1542.196820][T23840] kernfs_new_node+0x76/0xd0 [ 1542.202593][T23840] __kernfs_create_file+0x5b/0x1c0 [ 1542.207749][T23840] sysfs_add_file_mode_ns+0x163/0x310 [ 1542.214159][T23840] internal_create_group+0x237/0x6e0 [ 1542.219555][T23840] sysfs_create_group+0x26/0x40 [ 1542.224420][T23840] loop_set_fd+0x73a/0xa70 [ 1542.229023][T23840] lo_ioctl+0x18c/0xc80 [ 1542.233374][T23840] ? blkdev_common_ioctl+0x86/0xea0 [ 1542.238597][T23840] ? loop_set_fd+0xa70/0xa70 [ 1542.243295][T23840] blkdev_ioctl+0x1a1/0x420 [ 1542.247910][T23840] block_ioctl+0x91/0xb0 [ 1542.255061][T23840] ? blkdev_fallocate+0x2e0/0x2e0 [ 1542.261332][T23840] ksys_ioctl+0x101/0x150 [ 1542.265785][T23840] __x64_sys_ioctl+0x47/0x60 [ 1542.270577][T23840] do_syscall_64+0xc7/0x390 [ 1542.275539][T23840] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1542.282157][T23840] RIP: 0033:0x45c6b7 [ 1542.286086][T23840] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1542.306300][T23840] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1542.314945][T23840] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c6b7 [ 1542.323536][T23840] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1542.331789][T23840] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1542.340874][T23840] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1542.348885][T23840] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000014 [ 1542.440159][T23843] jfs: Unrecognized mount option "hash" or missing value 14:10:34 executing program 5 (fault-call:0 fault-nth:21): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video37\x00', 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x64, r2, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @rand_addr="5914959587197445b62d629aa071563a"}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @dev={0xac, 0x14, 0x14, 0x16}}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @rand_addr="dfbf3f46482e995baafd03a6fa7489a3"}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0xc0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) socket$caif_seqpacket(0x25, 0x5, 0x3) [ 1542.586820][T23846] jfs: Unrecognized mount option "hash" or missing value [ 1542.661355][T23850] FAULT_INJECTION: forcing a failure. [ 1542.661355][T23850] name failslab, interval 1, probability 0, space 0, times 0 [ 1542.728493][T23850] CPU: 0 PID: 23850 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1542.737205][T23850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1542.747277][T23850] Call Trace: [ 1542.750702][T23850] dump_stack+0x11d/0x187 [ 1542.755054][T23850] should_fail.cold+0x5/0xf [ 1542.759698][T23850] __should_failslab+0x82/0xb0 [ 1542.765087][T23850] should_failslab+0x5/0xf [ 1542.770233][T23850] kmem_cache_alloc+0x23/0x5e0 [ 1542.775204][T23850] ? idr_alloc_cyclic+0x10f/0x1b0 [ 1542.780420][T23850] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1542.787161][T23850] __kernfs_new_node+0x89/0x3d0 [ 1542.792137][T23850] ? kernfs_next_descendant_post+0xbe/0x130 [ 1542.798059][T23850] ? mutex_unlock+0xe/0x40 [ 1542.802503][T23850] ? kernfs_activate+0x13c/0x170 [ 1542.807730][T23850] kernfs_new_node+0x76/0xd0 [ 1542.812335][T23850] __kernfs_create_file+0x5b/0x1c0 [ 1542.817585][T23850] sysfs_add_file_mode_ns+0x163/0x310 [ 1542.823394][T23850] internal_create_group+0x237/0x6e0 [ 1542.828702][T23850] sysfs_create_group+0x26/0x40 [ 1542.834439][T23850] loop_set_fd+0x73a/0xa70 [ 1542.839748][T23850] lo_ioctl+0x18c/0xc80 [ 1542.844039][T23850] ? blkdev_common_ioctl+0x86/0xea0 [ 1542.849468][T23850] ? loop_set_fd+0xa70/0xa70 [ 1542.854095][T23850] blkdev_ioctl+0x1a1/0x420 [ 1542.858680][T23850] block_ioctl+0x91/0xb0 [ 1542.863559][T23850] ? blkdev_fallocate+0x2e0/0x2e0 [ 1542.869685][T23850] ksys_ioctl+0x101/0x150 [ 1542.874141][T23850] __x64_sys_ioctl+0x47/0x60 [ 1542.878743][T23850] do_syscall_64+0xc7/0x390 [ 1542.883366][T23850] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1542.889441][T23850] RIP: 0033:0x45c6b7 [ 1542.893355][T23850] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1542.914143][T23850] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1542.923025][T23850] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c6b7 [ 1542.931527][T23850] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1542.939671][T23850] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1542.947940][T23850] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1542.956485][T23850] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000015 14:10:35 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:35 executing program 5 (fault-call:0 fault-nth:22): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:35 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xbc0f000000000000, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1543.088811][T23853] jfs: Unrecognized mount option "hash" or missing value [ 1543.245483][T23858] jfs: Unrecognized mount option "hash" or missing value [ 1543.266785][T23860] FAULT_INJECTION: forcing a failure. [ 1543.266785][T23860] name failslab, interval 1, probability 0, space 0, times 0 [ 1543.309264][T23860] CPU: 1 PID: 23860 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1543.319597][T23860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1543.330151][T23860] Call Trace: [ 1543.335377][T23860] dump_stack+0x11d/0x187 [ 1543.340515][T23860] should_fail.cold+0x5/0xf [ 1543.345759][T23860] __should_failslab+0x82/0xb0 [ 1543.350625][T23860] should_failslab+0x5/0xf [ 1543.355072][T23860] kmem_cache_alloc+0x23/0x5e0 [ 1543.359889][T23860] ? idr_alloc_cyclic+0x10f/0x1b0 [ 1543.365094][T23860] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1543.372068][T23860] __kernfs_new_node+0x89/0x3d0 [ 1543.376954][T23860] ? kernfs_next_descendant_post+0xbe/0x130 [ 1543.383474][T23860] ? mutex_unlock+0xe/0x40 [ 1543.388081][T23860] ? kernfs_activate+0x13c/0x170 [ 1543.393210][T23860] kernfs_new_node+0x76/0xd0 [ 1543.397818][T23860] __kernfs_create_file+0x5b/0x1c0 [ 1543.402986][T23860] sysfs_add_file_mode_ns+0x163/0x310 [ 1543.409608][T23860] internal_create_group+0x237/0x6e0 [ 1543.415106][T23860] sysfs_create_group+0x26/0x40 [ 1543.420233][T23860] loop_set_fd+0x73a/0xa70 [ 1543.425228][T23860] lo_ioctl+0x18c/0xc80 [ 1543.429408][T23860] ? blkdev_common_ioctl+0x86/0xea0 [ 1543.434822][T23860] ? loop_set_fd+0xa70/0xa70 [ 1543.439601][T23860] blkdev_ioctl+0x1a1/0x420 [ 1543.444123][T23860] block_ioctl+0x91/0xb0 [ 1543.448395][T23860] ? blkdev_fallocate+0x2e0/0x2e0 [ 1543.454300][T23860] ksys_ioctl+0x101/0x150 [ 1543.458905][T23860] __x64_sys_ioctl+0x47/0x60 [ 1543.463539][T23860] do_syscall_64+0xc7/0x390 [ 1543.468450][T23860] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1543.474808][T23860] RIP: 0033:0x45c6b7 [ 1543.478714][T23860] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1543.499284][T23860] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1543.508190][T23860] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c6b7 [ 1543.516349][T23860] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1543.524352][T23860] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1543.532791][T23860] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1543.540855][T23860] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000016 14:10:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f00000000c0)={0x1, 0x2, 0x8}) 14:10:35 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:36 executing program 5 (fault-call:0 fault-nth:23): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1543.799068][T23866] jfs: Unrecognized mount option "hash" or missing value [ 1543.914418][T23869] FAULT_INJECTION: forcing a failure. [ 1543.914418][T23869] name failslab, interval 1, probability 0, space 0, times 0 14:10:36 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:36 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1544.286663][T23869] CPU: 0 PID: 23869 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1544.296510][T23869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1544.307373][T23869] Call Trace: [ 1544.310944][T23869] dump_stack+0x11d/0x187 [ 1544.315556][T23869] should_fail.cold+0x5/0xf [ 1544.320078][T23869] __should_failslab+0x82/0xb0 [ 1544.325720][T23869] should_failslab+0x5/0xf [ 1544.330333][T23869] kmem_cache_alloc_trace+0x26/0x5f0 [ 1544.335850][T23869] ? sysfs_add_file_mode_ns+0x163/0x310 [ 1544.341445][T23869] ? kernfs_put+0x26e/0x360 [ 1544.346454][T23869] ? sysfs_add_file_mode_ns+0x190/0x310 [ 1544.352037][T23869] ? dev_uevent_filter+0x80/0x80 [ 1544.357080][T23869] kobject_uevent_env+0x183/0xc70 [ 1544.362613][T23869] kobject_uevent+0x23/0x40 [ 1544.367139][T23869] loop_set_fd+0x77b/0xa70 [ 1544.371639][T23869] lo_ioctl+0x18c/0xc80 [ 1544.375919][T23869] ? blkdev_common_ioctl+0x86/0xea0 [ 1544.381502][T23869] ? loop_set_fd+0xa70/0xa70 [ 1544.386386][T23869] blkdev_ioctl+0x1a1/0x420 [ 1544.390916][T23869] block_ioctl+0x91/0xb0 [ 1544.395492][T23869] ? blkdev_fallocate+0x2e0/0x2e0 [ 1544.400642][T23869] ksys_ioctl+0x101/0x150 [ 1544.405330][T23869] __x64_sys_ioctl+0x47/0x60 [ 1544.410200][T23869] do_syscall_64+0xc7/0x390 [ 1544.414764][T23869] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1544.420750][T23869] RIP: 0033:0x45c6b7 [ 1544.424668][T23869] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1544.446833][T23869] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1544.456321][T23869] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c6b7 [ 1544.464431][T23869] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1544.472417][T23869] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1544.480407][T23869] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1544.488482][T23869] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000017 [ 1544.656636][T23877] jfs: Unrecognized mount option "hash" or missing value 14:10:36 executing program 5 (fault-call:0 fault-nth:24): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1544.763269][T23879] jfs: Unrecognized mount option "hash" or missing value [ 1544.851396][T23882] FAULT_INJECTION: forcing a failure. [ 1544.851396][T23882] name failslab, interval 1, probability 0, space 0, times 0 [ 1544.866432][T23882] CPU: 0 PID: 23882 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1544.875554][T23882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1544.887912][T23882] Call Trace: [ 1544.891376][T23882] dump_stack+0x11d/0x187 [ 1544.895860][T23882] should_fail.cold+0x5/0xf [ 1544.900425][T23882] __should_failslab+0x82/0xb0 [ 1544.905196][T23882] should_failslab+0x5/0xf [ 1544.910089][T23882] __kmalloc+0x54/0x640 [ 1544.914268][T23882] ? kobject_get_path+0x9b/0x110 [ 1544.923993][T23882] ? debug_smp_processor_id+0x3f/0x129 [ 1544.929569][T23882] ? kmem_cache_alloc_trace+0x1e1/0x5f0 [ 1544.935159][T23882] ? sysfs_add_file_mode_ns+0x163/0x310 [ 1544.940800][T23882] kobject_get_path+0x9b/0x110 [ 1544.945580][T23882] kobject_uevent_env+0x1a8/0xc70 [ 1544.950711][T23882] kobject_uevent+0x23/0x40 [ 1544.955692][T23882] loop_set_fd+0x77b/0xa70 [ 1544.960216][T23882] lo_ioctl+0x18c/0xc80 [ 1544.964520][T23882] ? blkdev_common_ioctl+0x86/0xea0 [ 1544.973041][T23882] ? loop_set_fd+0xa70/0xa70 [ 1544.987766][T23882] blkdev_ioctl+0x1a1/0x420 [ 1544.992308][T23882] block_ioctl+0x91/0xb0 [ 1544.996567][T23882] ? blkdev_fallocate+0x2e0/0x2e0 [ 1545.001615][T23882] ksys_ioctl+0x101/0x150 [ 1545.005958][T23882] __x64_sys_ioctl+0x47/0x60 [ 1545.010567][T23882] do_syscall_64+0xc7/0x390 [ 1545.015212][T23882] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1545.021209][T23882] RIP: 0033:0x45c6b7 [ 1545.025868][T23882] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1545.046274][T23882] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1545.054771][T23882] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c6b7 [ 1545.062747][T23882] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1545.071448][T23882] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1545.079925][T23882] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1545.088080][T23882] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000018 14:10:37 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1545.239089][T23885] jfs: Unrecognized mount option "hash" or missing value 14:10:37 executing program 5 (fault-call:0 fault-nth:25): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1545.343444][T23887] jfs: Unrecognized mount option "hash" or missing value [ 1545.416891][T23890] FAULT_INJECTION: forcing a failure. [ 1545.416891][T23890] name failslab, interval 1, probability 0, space 0, times 0 [ 1545.468584][T23890] CPU: 1 PID: 23890 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1545.477372][T23890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1545.488559][T23890] Call Trace: [ 1545.491872][T23890] dump_stack+0x11d/0x187 [ 1545.496272][T23890] should_fail.cold+0x5/0xf [ 1545.501177][T23890] __should_failslab+0x82/0xb0 [ 1545.506730][T23890] should_failslab+0x5/0xf [ 1545.512120][T23890] kmem_cache_alloc_node+0x35/0x680 [ 1545.518488][T23890] __alloc_skb+0x8d/0x360 [ 1545.522857][T23890] alloc_uevent_skb+0x66/0x130 [ 1545.528563][T23890] kobject_uevent_env+0x74a/0xc70 [ 1545.533724][T23890] kobject_uevent+0x23/0x40 [ 1545.538246][T23890] loop_set_fd+0x77b/0xa70 [ 1545.543469][T23890] lo_ioctl+0x18c/0xc80 [ 1545.547867][T23890] ? blkdev_common_ioctl+0x86/0xea0 [ 1545.553082][T23890] ? loop_set_fd+0xa70/0xa70 [ 1545.557687][T23890] blkdev_ioctl+0x1a1/0x420 [ 1545.563117][T23890] block_ioctl+0x91/0xb0 [ 1545.567374][T23890] ? blkdev_fallocate+0x2e0/0x2e0 [ 1545.573147][T23890] ksys_ioctl+0x101/0x150 [ 1545.577516][T23890] __x64_sys_ioctl+0x47/0x60 [ 1545.582583][T23890] do_syscall_64+0xc7/0x390 [ 1545.587192][T23890] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1545.593301][T23890] RIP: 0033:0x45c6b7 [ 1545.597216][T23890] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1545.621720][T23890] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1545.630218][T23890] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c6b7 [ 1545.638194][T23890] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1545.646174][T23890] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1545.654150][T23890] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 14:10:37 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1545.663505][T23890] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000019 14:10:38 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf9fdffff00000000, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1545.976799][T23897] jfs: Unrecognized mount option "hash" or missing value 14:10:38 executing program 5 (fault-call:0 fault-nth:26): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1546.078152][T23899] jfs: Unrecognized mount option "hash" or missing value [ 1546.167144][T23902] FAULT_INJECTION: forcing a failure. [ 1546.167144][T23902] name failslab, interval 1, probability 0, space 0, times 0 [ 1546.218737][T23902] CPU: 1 PID: 23902 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1546.227527][T23902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1546.237606][T23902] Call Trace: [ 1546.240945][T23902] dump_stack+0x11d/0x187 [ 1546.245728][T23902] should_fail.cold+0x5/0xf [ 1546.250254][T23902] __should_failslab+0x82/0xb0 [ 1546.255070][T23902] should_failslab+0x5/0xf [ 1546.259499][T23902] kmem_cache_alloc_node_trace+0x37/0x610 [ 1546.265259][T23902] ? memcg_kmem_put_cache+0x77/0xc0 [ 1546.270473][T23902] ? debug_smp_processor_id+0x3f/0x129 [ 1546.275947][T23902] ? kmem_cache_alloc_node+0x1bb/0x680 [ 1546.281489][T23902] __kmalloc_reserve.isra.0+0x43/0xd0 [ 1546.286877][T23902] __alloc_skb+0xbe/0x360 [ 1546.291245][T23902] alloc_uevent_skb+0x66/0x130 [ 1546.296022][T23902] kobject_uevent_env+0x74a/0xc70 [ 1546.301101][T23902] kobject_uevent+0x23/0x40 [ 1546.306569][T23902] loop_set_fd+0x77b/0xa70 [ 1546.311043][T23902] lo_ioctl+0x18c/0xc80 [ 1546.315204][T23902] ? blkdev_common_ioctl+0x86/0xea0 [ 1546.320446][T23902] ? loop_set_fd+0xa70/0xa70 [ 1546.325050][T23902] blkdev_ioctl+0x1a1/0x420 [ 1546.329574][T23902] block_ioctl+0x91/0xb0 [ 1546.333924][T23902] ? blkdev_fallocate+0x2e0/0x2e0 [ 1546.338978][T23902] ksys_ioctl+0x101/0x150 [ 1546.343373][T23902] __x64_sys_ioctl+0x47/0x60 [ 1546.347974][T23902] do_syscall_64+0xc7/0x390 [ 1546.352529][T23902] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1546.358588][T23902] RIP: 0033:0x45c6b7 [ 1546.362583][T23902] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1546.382196][T23902] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1546.390692][T23902] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c6b7 [ 1546.398701][T23902] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1546.406685][T23902] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1546.416423][T23902] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1546.424758][T23902] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000001a 14:10:38 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:39 executing program 5 (fault-call:0 fault-nth:27): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1546.769000][T23905] jfs: Unrecognized mount option "hash" or missing value [ 1546.879215][T23910] FAULT_INJECTION: forcing a failure. [ 1546.879215][T23910] name failslab, interval 1, probability 0, space 0, times 0 [ 1546.920142][T23910] CPU: 1 PID: 23910 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1546.928852][T23910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1546.938906][T23910] Call Trace: [ 1546.942271][T23910] dump_stack+0x11d/0x187 [ 1546.946616][T23910] should_fail.cold+0x5/0xf [ 1546.951153][T23910] __should_failslab+0x82/0xb0 [ 1546.955918][T23910] should_failslab+0x5/0xf [ 1546.960343][T23910] kmem_cache_alloc+0x23/0x5e0 [ 1546.965132][T23910] skb_clone+0xf4/0x280 [ 1546.969340][T23910] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1546.975329][T23910] netlink_broadcast_filtered+0x709/0x9a0 [ 1546.981167][T23910] netlink_broadcast+0x3f/0x60 [ 1546.985948][T23910] kobject_uevent_env+0x711/0xc70 [ 1546.990995][T23910] kobject_uevent+0x23/0x40 [ 1546.995663][T23910] loop_set_fd+0x77b/0xa70 [ 1547.000104][T23910] lo_ioctl+0x18c/0xc80 [ 1547.005142][T23910] ? blkdev_common_ioctl+0x86/0xea0 [ 1547.010360][T23910] ? loop_set_fd+0xa70/0xa70 [ 1547.014949][T23910] blkdev_ioctl+0x1a1/0x420 [ 1547.019471][T23910] block_ioctl+0x91/0xb0 [ 1547.023726][T23910] ? blkdev_fallocate+0x2e0/0x2e0 [ 1547.028851][T23910] ksys_ioctl+0x101/0x150 [ 1547.033248][T23910] __x64_sys_ioctl+0x47/0x60 [ 1547.037932][T23910] do_syscall_64+0xc7/0x390 [ 1547.042448][T23910] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1547.048339][T23910] RIP: 0033:0x45c6b7 [ 1547.052249][T23910] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1547.071858][T23910] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1547.080286][T23910] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045c6b7 [ 1547.088266][T23910] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1547.096239][T23910] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1547.105178][T23910] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1547.113316][T23910] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000001b 14:10:39 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:39 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1547.483847][T23915] jfs: Unrecognized mount option "hash" or missing value 14:10:39 executing program 5 (fault-call:0 fault-nth:28): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1547.596923][T23918] jfs: Unrecognized mount option "hash" or missing value [ 1547.604763][T23921] FAULT_INJECTION: forcing a failure. [ 1547.604763][T23921] name failslab, interval 1, probability 0, space 0, times 0 [ 1547.621713][T23921] CPU: 0 PID: 23921 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1547.630404][T23921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1547.640741][T23921] Call Trace: [ 1547.644153][T23921] dump_stack+0x11d/0x187 [ 1547.648505][T23921] should_fail.cold+0x5/0xf [ 1547.653029][T23921] __should_failslab+0x82/0xb0 [ 1547.657819][T23921] should_failslab+0x5/0xf [ 1547.662641][T23921] kmem_cache_alloc+0x23/0x5e0 [ 1547.667518][T23921] ? __d_lookup+0x2a8/0x3d0 [ 1547.672049][T23921] __d_alloc+0x51/0x4a0 [ 1547.676398][T23921] d_alloc+0x48/0x170 [ 1547.680401][T23921] __lookup_hash+0x98/0x110 [ 1547.684917][T23921] filename_create+0x104/0x2d0 [ 1547.689749][T23921] do_mkdirat+0x65/0x200 [ 1547.694070][T23921] __x64_sys_mkdir+0x3d/0x50 [ 1547.699288][T23921] do_syscall_64+0xc7/0x390 [ 1547.703953][T23921] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1547.709868][T23921] RIP: 0033:0x45bc67 [ 1547.713775][T23921] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1547.733629][T23921] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1547.742115][T23921] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045bc67 [ 1547.750094][T23921] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 1547.758555][T23921] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1547.766624][T23921] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1547.774968][T23921] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000001c 14:10:40 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:40 executing program 5 (fault-call:0 fault-nth:29): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1548.024439][T23926] FAULT_INJECTION: forcing a failure. [ 1548.024439][T23926] name failslab, interval 1, probability 0, space 0, times 0 [ 1548.043125][T23925] jfs: Unrecognized mount option "hash" or missing value [ 1548.065470][T23926] CPU: 0 PID: 23926 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1548.075932][T23926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1548.086795][T23926] Call Trace: [ 1548.090115][T23926] dump_stack+0x11d/0x187 [ 1548.095450][T23926] should_fail.cold+0x5/0xf [ 1548.100335][T23926] __should_failslab+0x82/0xb0 [ 1548.105675][T23926] should_failslab+0x5/0xf [ 1548.110488][T23926] kmem_cache_alloc+0x23/0x5e0 [ 1548.115619][T23926] ? __d_lookup+0x2a8/0x3d0 [ 1548.120140][T23926] __d_alloc+0x51/0x4a0 [ 1548.124344][T23926] d_alloc+0x48/0x170 [ 1548.129103][T23926] __lookup_hash+0x98/0x110 [ 1548.134056][T23926] filename_create+0x104/0x2d0 [ 1548.138922][T23926] do_mkdirat+0x65/0x200 [ 1548.143533][T23926] __x64_sys_mkdir+0x3d/0x50 [ 1548.148569][T23926] do_syscall_64+0xc7/0x390 [ 1548.153086][T23926] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1548.158985][T23926] RIP: 0033:0x45bc67 [ 1548.162889][T23926] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1548.188317][T23926] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1548.196738][T23926] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045bc67 [ 1548.206059][T23926] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 1548.214124][T23926] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1548.222676][T23926] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1548.232322][T23926] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000001d [ 1548.334186][T23931] jfs: Unrecognized mount option "hash" or missing value 14:10:40 executing program 5 (fault-call:0 fault-nth:30): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:40 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:40 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1548.539195][T23934] FAULT_INJECTION: forcing a failure. [ 1548.539195][T23934] name failslab, interval 1, probability 0, space 0, times 0 [ 1548.580137][T23934] CPU: 1 PID: 23934 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1548.589272][T23934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1548.601084][T23934] Call Trace: [ 1548.604450][T23934] dump_stack+0x11d/0x187 [ 1548.608825][T23934] should_fail.cold+0x5/0xf [ 1548.608891][T23938] jfs: Unrecognized mount option "hash" or missing value [ 1548.614180][T23934] __should_failslab+0x82/0xb0 [ 1548.614295][T23934] should_failslab+0x5/0xf [ 1548.631634][T23934] __kmalloc+0x54/0x640 [ 1548.635998][T23934] ? tomoyo_realpath_from_path+0x85/0x3d0 [ 1548.641763][T23934] tomoyo_realpath_from_path+0x85/0x3d0 [ 1548.647460][T23934] tomoyo_path_number_perm+0xff/0x360 [ 1548.653294][T23934] ? __write_once_size+0x2f/0xd0 [ 1548.658902][T23934] ? putname+0xbd/0xe0 [ 1548.663080][T23934] tomoyo_path_mkdir+0x6b/0xa0 [ 1548.667898][T23934] security_path_mkdir+0xb0/0xe0 [ 1548.673299][T23934] do_mkdirat+0xf3/0x200 [ 1548.677642][T23934] __x64_sys_mkdir+0x3d/0x50 [ 1548.682961][T23934] do_syscall_64+0xc7/0x390 [ 1548.687870][T23934] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1548.694134][T23934] RIP: 0033:0x45bc67 [ 1548.701466][T23934] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1548.726158][T23934] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1548.736310][T23934] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045bc67 [ 1548.744751][T23934] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 1548.754053][T23934] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1548.762762][T23934] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1548.771654][T23934] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000001e [ 1548.855494][T23941] jfs: Unrecognized mount option "hash" or missing value [ 1548.976465][T23934] ERROR: Out of memory at tomoyo_realpath_from_path. 14:10:41 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfbc, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:41 executing program 5 (fault-call:0 fault-nth:31): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1549.158775][T23944] jfs: Unrecognized mount option "hash" or missing value [ 1549.221515][T23947] FAULT_INJECTION: forcing a failure. [ 1549.221515][T23947] name failslab, interval 1, probability 0, space 0, times 0 [ 1549.244828][T23947] CPU: 0 PID: 23947 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1549.253617][T23947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1549.263945][T23947] Call Trace: [ 1549.267741][T23947] dump_stack+0x11d/0x187 [ 1549.273050][T23947] should_fail.cold+0x5/0xf [ 1549.277875][T23947] __should_failslab+0x82/0xb0 [ 1549.283252][T23947] should_failslab+0x5/0xf [ 1549.287672][T23947] __kmalloc+0x54/0x640 [ 1549.291891][T23947] ? tomoyo_encode2.part.0+0xd0/0x240 [ 1549.297462][T23947] tomoyo_encode2.part.0+0xd0/0x240 [ 1549.302783][T23947] tomoyo_encode+0x32/0x50 [ 1549.307222][T23947] tomoyo_realpath_from_path+0x11e/0x3d0 [ 1549.312866][T23947] tomoyo_path_number_perm+0xff/0x360 [ 1549.318284][T23947] ? __write_once_size+0x2f/0xd0 [ 1549.323362][T23947] ? putname+0xbd/0xe0 [ 1549.327445][T23947] tomoyo_path_mkdir+0x6b/0xa0 [ 1549.332239][T23947] security_path_mkdir+0xb0/0xe0 [ 1549.337186][T23947] do_mkdirat+0xf3/0x200 [ 1549.341585][T23947] __x64_sys_mkdir+0x3d/0x50 [ 1549.346277][T23947] do_syscall_64+0xc7/0x390 [ 1549.350801][T23947] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1549.356715][T23947] RIP: 0033:0x45bc67 [ 1549.360617][T23947] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1549.381275][T23947] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1549.389726][T23947] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045bc67 [ 1549.397715][T23947] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 1549.406649][T23947] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1549.414625][T23947] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1549.422604][T23947] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000001f [ 1549.440055][T23947] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1549.443191][T23949] jfs: Unrecognized mount option "hash" or missing value 14:10:41 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:41 executing program 5 (fault-call:0 fault-nth:32): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1549.720130][T23957] FAULT_INJECTION: forcing a failure. [ 1549.720130][T23957] name failslab, interval 1, probability 0, space 0, times 0 [ 1549.733879][T23955] jfs: Unrecognized mount option "hash" or missing value [ 1549.793561][T23957] CPU: 1 PID: 23957 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1549.802265][T23957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1549.812412][T23957] Call Trace: [ 1549.815723][T23957] dump_stack+0x11d/0x187 [ 1549.820066][T23957] should_fail.cold+0x5/0xf [ 1549.824589][T23957] __should_failslab+0x82/0xb0 [ 1549.830353][T23957] should_failslab+0x5/0xf [ 1549.834869][T23957] kmem_cache_alloc+0x23/0x5e0 [ 1549.839644][T23957] ? debug_smp_processor_id+0x3f/0x129 [ 1549.845292][T23957] ? ext4_free_in_core_inode+0x40/0x40 [ 1549.850763][T23957] ext4_alloc_inode+0x43/0x350 [ 1549.855566][T23957] ? ext4_free_in_core_inode+0x40/0x40 [ 1549.861026][T23957] alloc_inode+0x42/0x130 [ 1549.865385][T23957] new_inode_pseudo+0x32/0xe0 [ 1549.870073][T23957] new_inode+0x25/0x50 [ 1549.874174][T23957] __ext4_new_inode+0x22c/0x2f30 [ 1549.879151][T23957] ext4_mkdir+0x272/0x820 [ 1549.883576][T23957] vfs_mkdir+0x281/0x390 [ 1549.887830][T23957] do_mkdirat+0x1b5/0x200 [ 1549.892165][T23957] __x64_sys_mkdir+0x3d/0x50 [ 1549.896783][T23957] do_syscall_64+0xc7/0x390 [ 1549.901304][T23957] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1549.907198][T23957] RIP: 0033:0x45bc67 [ 1549.911149][T23957] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1549.930927][T23957] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1549.939353][T23957] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045bc67 [ 1549.947332][T23957] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 1549.955426][T23957] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1549.963481][T23957] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1549.971452][T23957] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000020 14:10:42 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xff00000000000000, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1550.057669][T23959] jfs: Unrecognized mount option "hash" or missing value 14:10:42 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1f00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:42 executing program 5 (fault-call:0 fault-nth:33): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1550.308964][T23964] jfs: Unrecognized mount option "hash" or missing value [ 1550.336698][T23967] FAULT_INJECTION: forcing a failure. [ 1550.336698][T23967] name failslab, interval 1, probability 0, space 0, times 0 [ 1550.350042][T23967] CPU: 0 PID: 23967 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1550.360726][T23967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1550.371746][T23967] Call Trace: [ 1550.375069][T23967] dump_stack+0x11d/0x187 [ 1550.382468][T23967] should_fail.cold+0x5/0xf [ 1550.387041][T23967] __should_failslab+0x82/0xb0 [ 1550.391826][T23967] should_failslab+0x5/0xf [ 1550.396282][T23967] kmem_cache_alloc+0x23/0x5e0 [ 1550.401417][T23967] __es_insert_extent+0x1ee/0x870 [ 1550.406798][T23967] ? __es_tree_search.isra.0+0x144/0x170 [ 1550.412637][T23967] ext4_es_insert_extent+0x1c0/0x5d0 [ 1550.419592][T23967] ? _raw_read_unlock+0x21/0x40 [ 1550.424831][T23967] ext4_ext_put_gap_in_cache+0xb2/0xf0 [ 1550.430919][T23967] ext4_ext_map_blocks+0x1071/0x20f0 [ 1550.440004][T23967] ? percpu_counter_add_batch+0x10f/0x140 [ 1550.446224][T23967] ? _raw_read_unlock+0x21/0x40 [ 1550.451967][T23967] ? ext4_es_lookup_extent+0x231/0x570 [ 1550.457440][T23967] ext4_map_blocks+0x7a8/0xcf0 [ 1550.462277][T23967] ? __read_once_size+0xb7/0x100 [ 1550.467396][T23967] ext4_getblk+0x82/0x380 [ 1550.472002][T23967] ext4_bread+0x47/0x200 [ 1550.476458][T23967] ext4_append+0xc0/0x1e0 [ 1550.481682][T23967] ext4_mkdir+0x401/0x820 [ 1550.486066][T23967] vfs_mkdir+0x281/0x390 [ 1550.490335][T23967] do_mkdirat+0x1b5/0x200 [ 1550.494791][T23967] __x64_sys_mkdir+0x3d/0x50 [ 1550.499397][T23967] do_syscall_64+0xc7/0x390 [ 1550.504005][T23967] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1550.510169][T23967] RIP: 0033:0x45bc67 [ 1550.514421][T23967] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1550.536777][T23967] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1550.545578][T23967] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045bc67 [ 1550.554720][T23967] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 1550.563281][T23967] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1550.571697][T23967] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1550.580222][T23967] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000021 [ 1550.659966][T23969] jfs: Unrecognized mount option "hash" or missing value 14:10:42 executing program 5 (fault-call:0 fault-nth:34): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1550.850200][T23972] FAULT_INJECTION: forcing a failure. [ 1550.850200][T23972] name failslab, interval 1, probability 0, space 0, times 0 [ 1550.864291][T23972] CPU: 1 PID: 23972 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1550.873079][T23972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1550.883721][T23972] Call Trace: [ 1550.887073][T23972] dump_stack+0x11d/0x187 [ 1550.891525][T23972] should_fail.cold+0x5/0xf [ 1550.896412][T23972] __should_failslab+0x82/0xb0 [ 1550.902090][T23972] should_failslab+0x5/0xf [ 1550.906525][T23972] kmem_cache_alloc+0x23/0x5e0 [ 1550.911569][T23972] __es_insert_extent+0x1ee/0x870 [ 1550.917412][T23972] ? __es_tree_search.isra.0+0x144/0x170 [ 1550.923157][T23972] ext4_es_insert_extent+0x1c0/0x5d0 [ 1550.928458][T23972] ? _raw_read_unlock+0x21/0x40 [ 1550.934050][T23972] ext4_ext_put_gap_in_cache+0xb2/0xf0 [ 1550.939563][T23972] ext4_ext_map_blocks+0x1071/0x20f0 [ 1550.945421][T23972] ? percpu_counter_add_batch+0x10f/0x140 [ 1550.951718][T23972] ? _raw_read_unlock+0x21/0x40 [ 1550.958510][T23972] ? ext4_es_lookup_extent+0x231/0x570 [ 1550.963998][T23972] ext4_map_blocks+0x7a8/0xcf0 [ 1550.968801][T23972] ? __read_once_size+0xb7/0x100 [ 1550.973767][T23972] ext4_getblk+0x82/0x380 [ 1550.978132][T23972] ext4_bread+0x47/0x200 [ 1550.982397][T23972] ext4_append+0xc0/0x1e0 [ 1550.986942][T23972] ext4_mkdir+0x401/0x820 [ 1550.992537][T23972] vfs_mkdir+0x281/0x390 [ 1550.996813][T23972] do_mkdirat+0x1b5/0x200 [ 1551.001749][T23972] __x64_sys_mkdir+0x3d/0x50 [ 1551.006986][T23972] do_syscall_64+0xc7/0x390 [ 1551.011860][T23972] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1551.017797][T23972] RIP: 0033:0x45bc67 [ 1551.021971][T23972] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1551.042125][T23972] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1551.050552][T23972] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045bc67 [ 1551.058545][T23972] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 1551.068186][T23972] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1551.076634][T23972] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1551.085422][T23972] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000022 14:10:43 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:43 executing program 5 (fault-call:0 fault-nth:35): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1551.279690][T23977] jfs: Unrecognized mount option "hash" or missing value 14:10:43 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xff0f000000000000, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1551.416835][T23980] jfs: Unrecognized mount option "hash" or missing value 14:10:43 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x478000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000040)={0x0}) r1 = creat(&(0x7f0000000080)='./file0\x00', 0xd5) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000540)={0x3, 0x0, 0x4, 0xa, 0xd8, &(0x7f0000000140)}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0, 0x4}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000000100)={r2}) 14:10:43 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1551.598071][T23986] FAULT_INJECTION: forcing a failure. [ 1551.598071][T23986] name failslab, interval 1, probability 0, space 0, times 0 [ 1551.626470][T23986] CPU: 0 PID: 23986 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1551.635179][T23986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1551.645240][T23986] Call Trace: [ 1551.648555][T23986] dump_stack+0x11d/0x187 [ 1551.652930][T23986] should_fail.cold+0x5/0xf [ 1551.657460][T23986] __should_failslab+0x82/0xb0 [ 1551.662323][T23986] should_failslab+0x5/0xf [ 1551.666860][T23986] __kmalloc+0x54/0x640 [ 1551.671138][T23986] ? ext4_find_extent+0x52a/0x5e0 [ 1551.676441][T23986] ? _raw_read_unlock+0x21/0x40 [ 1551.681328][T23986] ? debug_smp_processor_id+0x3f/0x129 [ 1551.686906][T23986] ext4_find_extent+0x52a/0x5e0 [ 1551.691788][T23986] ext4_ext_map_blocks+0xcd/0x20f0 [ 1551.696933][T23986] ? percpu_counter_add_batch+0x10f/0x140 [ 1551.702678][T23986] ? _raw_read_unlock+0x21/0x40 [ 1551.707609][T23986] ? ext4_es_lookup_extent+0x231/0x570 [ 1551.713094][T23986] ext4_map_blocks+0x230/0xcf0 [ 1551.717987][T23986] ? __read_once_size+0xb7/0x100 [ 1551.723039][T23986] ext4_getblk+0x82/0x380 [ 1551.727386][T23986] ext4_bread+0x47/0x200 [ 1551.731787][T23986] ext4_append+0xc0/0x1e0 [ 1551.736154][T23986] ext4_mkdir+0x401/0x820 [ 1551.740601][T23986] vfs_mkdir+0x281/0x390 [ 1551.744867][T23986] do_mkdirat+0x1b5/0x200 [ 1551.749223][T23986] __x64_sys_mkdir+0x3d/0x50 [ 1551.753832][T23986] do_syscall_64+0xc7/0x390 [ 1551.758377][T23986] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1551.764300][T23986] RIP: 0033:0x45bc67 [ 1551.768279][T23986] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1551.787896][T23986] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 14:10:43 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$IPSET_CMD_TEST(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0xc4, 0xb, 0x6, 0x801, 0x0, 0x0, {0xa, 0x0, 0x6}, [@IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @local}}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x80000000}, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x9}, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x5}, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x8}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x7}]}, @IPSET_ATTR_DATA={0x5c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x7}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x7}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @empty}}, @IPSET_ATTR_COMMENT={0x8, 0x1a, '.&-\x00'}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x14}, @IPSET_ATTR_IFACE={0x14, 0x17, 'tunl0\x00'}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x814}, 0x4000000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000040)={0x0}) r2 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r2, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) ioctl(r2, 0x9, &(0x7f0000000080)="bb8d6e5e607e7dbdcf720153f1f9f6a95cb380d6d7c5c15106701d3aa704c109621f26e30613b54235a571039a1da715a57dc9b63e2fc79d8832cf04fee2d4b3f7fd1ca74b6616ff67a2b6adc69f13bf0a0aece5568f499ec3a565e5b493d080e1f67341cefda4a71eca720a44f2b18c6ccda1d18d45401c") [ 1551.796339][T23986] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045bc67 [ 1551.804408][T23986] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 1551.812396][T23986] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1551.820457][T23986] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1551.828439][T23986] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000023 [ 1551.885427][T23990] jfs: Unrecognized mount option "hash" or missing value 14:10:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00', 0x7, 0x4, 0x3c8, 0x1f8, 0xe8, 0x1f8, 0x2e0, 0x2e0, 0x2e0, 0x4, &(0x7f0000000080), {[{{@arp={@multicast2, @local, 0xffffffff, 0xffffff00, 0xc, 0x8, {@mac=@random="17705f6d4b05", {[0x0, 0x0, 0x0, 0xff, 0xff]}}, {@empty, {[0xff, 0xff, 0x0, 0xff]}}, 0xd788, 0x8, 0x200, 0xff, 0x80, 0x2, 'veth0_to_hsr\x00', 'ip6gre0\x00', {}, {}, 0x0, 0x201}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x2, 0x2}}}, {{@arp={@loopback, @multicast1, 0x0, 0xff000000, 0x1, 0x4, {@empty, {[0x0, 0x0, 0xff, 0x0, 0xff, 0xff]}}, {@empty, {[0xff, 0xff, 0x0, 0xff, 0xff, 0xff]}}, 0x71, 0xffe6, 0x8, 0x14, 0x81, 0x2, '\x00', 'ip6erspan0\x00', {0xff}}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @remote, @local, 0x7}}}, {{@arp={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0xffffffff, 0xff, 0x6, 0xb, {@mac=@local, {[0xff, 0x0, 0xff, 0xff, 0xff, 0xff]}}, {@mac=@multicast, {[0xff, 0x0, 0xff, 0xff, 0xff, 0xff]}}, 0x20, 0x8000, 0x8000, 0xffff, 0x8, 0x0, 'team0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0x1}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x5, 0xe000}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r1, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x18, 0x1412, 0x200, 0x70bd2a, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x4) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000040)={0x0}) 14:10:44 executing program 5 (fault-call:0 fault-nth:36): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1552.027394][T23994] jfs: Unrecognized mount option "hash" or missing value [ 1552.138543][T23999] x_tables: duplicate underflow at hook 1 [ 1552.171764][T23998] FAULT_INJECTION: forcing a failure. [ 1552.171764][T23998] name failslab, interval 1, probability 0, space 0, times 0 [ 1552.246027][T23998] CPU: 1 PID: 23998 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1552.254920][T23998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1552.265000][T23998] Call Trace: [ 1552.268310][T23998] dump_stack+0x11d/0x187 [ 1552.272756][T23998] should_fail.cold+0x5/0xf [ 1552.277280][T23998] __should_failslab+0x82/0xb0 [ 1552.282051][T23998] should_failslab+0x5/0xf [ 1552.286471][T23998] kmem_cache_alloc+0x23/0x5e0 [ 1552.292207][T23998] ? _raw_spin_unlock+0x38/0x60 [ 1552.297064][T23998] ? __mark_inode_dirty+0x26e/0x940 [ 1552.302291][T23998] ext4_mb_new_blocks+0x347/0x1ea0 [ 1552.307416][T23998] ? _raw_read_unlock+0x21/0x40 [ 1552.312378][T23998] ? debug_smp_processor_id+0x3f/0x129 [ 1552.318033][T23998] ? ext4_cache_extents+0x1d7/0x1f0 [ 1552.323298][T23998] ? ext4_ext_search_right+0x1d7/0x5d0 [ 1552.328774][T23998] ? ext4_inode_to_goal_block+0x197/0x1f0 [ 1552.334519][T23998] ext4_ext_map_blocks+0x1a5c/0x20f0 [ 1552.340529][T23998] ? ext4_ext_remove_space+0x371/0x2bf0 [ 1552.346165][T23998] ext4_map_blocks+0x230/0xcf0 [ 1552.350934][T23998] ? __read_once_size+0xb7/0x100 [ 1552.355893][T23998] ext4_getblk+0x82/0x380 [ 1552.360244][T23998] ext4_bread+0x47/0x200 [ 1552.364493][T23998] ext4_append+0xc0/0x1e0 [ 1552.368835][T23998] ext4_mkdir+0x401/0x820 [ 1552.373253][T23998] vfs_mkdir+0x281/0x390 [ 1552.377511][T23998] do_mkdirat+0x1b5/0x200 [ 1552.381850][T23998] __x64_sys_mkdir+0x3d/0x50 [ 1552.386459][T23998] do_syscall_64+0xc7/0x390 [ 1552.390980][T23998] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1552.396889][T23998] RIP: 0033:0x45bc67 [ 1552.400864][T23998] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1552.421342][T23998] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1552.431591][T23998] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045bc67 14:10:44 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1552.439668][T23998] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 1552.448601][T23998] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1552.456575][T23998] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1552.465009][T23998] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000024 14:10:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x28, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14}]}, 0x28}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x40088d0) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r3, 0xc01064b5, &(0x7f0000000040)={0x0}) [ 1552.591442][T24004] jfs: Unrecognized mount option "hash" or missing value 14:10:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSBRK(r0, 0x5427) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r1, 0x541e, &(0x7f0000000300)={0x4, 0x4, 0x10000, 0xfffffff9, 0x9f91, 0x4, 0x9, 0x10001, 0x0, 0x1, 0x1, 0x3, 0x9, 0x1ff, &(0x7f0000000280)=""/84, 0x3, 0x0, 0x100}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r5, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x7a, &(0x7f0000000080)={r8, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000140)={r8, @in={{0x2, 0x4e22, @loopback}}, 0x6, 0x7ff, 0x8, 0xfffffe00, 0x4}, &(0x7f0000000200)=0x98) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f00000000c0)={0x0, 0x0, 0x3ff}) [ 1552.723895][T24008] jfs: Unrecognized mount option "hash" or missing value 14:10:45 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:10:45 executing program 5 (fault-call:0 fault-nth:37): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:45 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000240)={0x2, 0x81, 0x5, 0x95, 0x0, 0x9, 0x7f}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000040)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}]}, &(0x7f0000000180)=0x10) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000002c0)=@assoc_value={0x0}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x7a, &(0x7f0000000080)={r5, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180)={r5, 0x34}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYRES32=r6, @ANYBLOB="02001c4b08078cf0128316558dd100420db84fccb51ef4e5859159cba209a40cd4719e84c4c4b2d1adfbbc85483fa82e89ecd6bbc2caf67b9d93dabc67d0c7c2eb4a1fa4f61c3514ca0d6c2d9d0d50f6a730ad28b484a3956ca9de7cfcc453186ac78cfb186d94d8749d4241e4513865bc0d7a0d4ae9a034b900a60f07206d7fdc21c727ed1c3c839d80c908a56e0000"], 0x18) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000000c0)={0x9, 0xc, 0x4, 0x70000, 0xffff7fff, {0x77359400}, {0x4, 0xc, 0x7f, 0x9, 0xb3, 0x82, "ca043079"}, 0x7, 0x2, @offset=0x6, 0x6, 0x0, r3}) getsockopt$TIPC_CONN_TIMEOUT(r7, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000000)=0x2) r8 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x200, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r8, 0xc01064b5, &(0x7f0000000040)={0x0}) socket$nl_audit(0x10, 0x3, 0x9) [ 1552.918113][T24016] FAULT_INJECTION: forcing a failure. [ 1552.918113][T24016] name failslab, interval 1, probability 0, space 0, times 0 [ 1552.931830][T24016] CPU: 0 PID: 24016 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1552.940561][T24016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1552.950615][T24016] Call Trace: [ 1552.953952][T24016] dump_stack+0x11d/0x187 [ 1552.958296][T24016] should_fail.cold+0x5/0xf [ 1552.962816][T24016] __should_failslab+0x82/0xb0 [ 1552.967591][T24016] should_failslab+0x5/0xf [ 1552.972100][T24016] kmem_cache_alloc+0x23/0x5e0 [ 1552.977836][T24016] ? ext4_es_can_be_merged+0xef/0x1b0 [ 1552.983218][T24016] __es_insert_extent+0x1ee/0x870 [ 1552.988337][T24016] ext4_es_insert_extent+0x1c0/0x5d0 [ 1552.993652][T24016] ext4_map_blocks+0x3ca/0xcf0 [ 1552.998432][T24016] ext4_getblk+0x82/0x380 [ 1553.002777][T24016] ext4_bread+0x47/0x200 [ 1553.007988][T24016] ext4_append+0xc0/0x1e0 [ 1553.012329][T24016] ext4_mkdir+0x401/0x820 [ 1553.016689][T24016] vfs_mkdir+0x281/0x390 [ 1553.020941][T24016] do_mkdirat+0x1b5/0x200 [ 1553.025326][T24016] __x64_sys_mkdir+0x3d/0x50 [ 1553.030090][T24016] do_syscall_64+0xc7/0x390 [ 1553.034661][T24016] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1553.040552][T24016] RIP: 0033:0x45bc67 [ 1553.044498][T24016] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:10:45 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1553.065117][T24016] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1553.074059][T24016] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045bc67 [ 1553.082033][T24016] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 1553.090028][T24016] RBP: 000000000076bf00 R08: 0000000000000000 R09: 000000000000000a [ 1553.098966][T24016] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 1553.107899][T24016] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000025 [ 1553.127093][T24021] jfs: Unrecognized mount option "hash" or missing value [ 1553.219141][T24023] jfs: Unrecognized mount option "hash" or missing value 14:10:45 executing program 2: r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f00000000c0)=0x10) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79, 0x0, [0x6, 0x2, 0xfff, 0x5]}) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6}, 0x0) r3 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r3}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r5) r6 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r6}, 0x0) sendmsg$netlink(r0, &(0x7f00000095c0)={&(0x7f0000000200)=@kern={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000009500)=[{&(0x7f0000000240)={0x1014, 0x16, 0x100, 0x70bd25, 0x25dfdbfe, "", [@typed={0x1004, 0x5d, 0x0, 0x0, @binary="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"}]}, 0x1014}, {&(0x7f0000001300)={0x1324, 0x20, 0x300, 0x70bd2b, 0x25dfdbfd, "", [@nested={0x11bb, 0x6c, 0x0, 0x1, [@typed={0x8, 0xd, 0x0, 0x0, @uid}, @generic="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", @generic="bbc3a2f0ef99e3f08bea7b00e3dc42867eea1b49ea463dc7d6a3fdbcb6412a5be24bd8d259791e22c44c0d66719e8e8df0c4c12a4ac48d76966a985dbac0d88e0445c0e462b97873f85a3084e664abc8a502c23144d9213783a4d12667f02f8ce3730cf6adc01136d12bcb234664382ba34aff2c7378517b77a1089f57615fa7417e8b00e402e4448bc7f2de7c7df63d933bd88d2a21e6c3", @generic="20aeac8e7d24893d12154b60dbe2d0520206bf0fb9e0667f24bd904da1bd4f050a664ed996771f3ec7116a8e84de052b8a7d88f5451efae8bb7334563266d25b9d1fa579e2f62c557cfc4ea22dd6eca5d78375f30c6625228c29cbe811830f36992ff9cf1da3d23dd328b87344eb68d7f1e216b5744aebe087d4fa14de3562d04a06d86965b00a64bcb4a5c801e8a114a3fbdd2c88bc2eb8c56d037e74f0162b376977076cbad75f68d9ce37dd773829b5c73b903db1ee206227", @generic="167d1b70df8a1dee8bd10342230818a1575ecd51b39133a1ec8810f5e37b5f5c5550fabc728851b77dc03ae9b3cb474c4a41d16d35e49ba6ac597673ade354100c7daad2e50478e2c1e82b0df19c55a36530f97bfbafacd48f23f74660"]}, @typed={0x6, 0x86, 0x0, 0x0, @binary="799a"}, @typed={0x14, 0x36, 0x0, 0x0, @ipv6=@mcast1}, @generic="ac8f293202a4b206b01fc228e570b28490679fe478677ddcb3daf54198cd769968d4a317fcb4c4dfe49f223b897a63bd4ed8d1a609", @typed={0x4, 0x14}, @typed={0x8, 0x4b, 0x0, 0x0, @pid}, @typed={0x8, 0x8, 0x0, 0x0, @u32=0x80000000}, @nested={0xed, 0x1e, 0x0, 0x1, [@generic="776a95fbf7b9b4b9ea3d6c13db5e23e83485aeac96d975a0261af1ea32f6344e6c406b4fd0ad5402e49bff4e0d49ae1e76402980db9088c8017971a1160fd04ff111e0bbcf6f88ea30af49c544dfd587e8e504c0a345569c90c301099004228e4ae75df0281a9bdf4415baeb44c0281737412fc3e018d6154992440d8e5b8c711d6801d8b65a4b1d8d750c23e68e7dcdbcec3313f9a18b4e6fdee929b2665e85f837f917330ede1518cac8aa0cfca4ae1ac8d42093178096dc1b851df461c4d92287e35365571d91a2313255f7d0461e29f0cfd23b4cdb1781cdafa64a58005fe7d36be8ae33a1f60c"]}]}, 0x1324}, {&(0x7f0000002640)={0x4434, 0x3d, 0x0, 0x70bd2b, 0x25dfdbfc, "", [@typed={0xc, 0x42, 0x0, 0x0, @u64=0x6}, @generic="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", @nested={0x95, 0x82, 0x0, 0x1, [@generic="18e011f8ebfc1cf8a30315d0d7ee4ee303720c3d2772476f1cd95ac252f10e0d31da9e6c07cc08ebbb998334ee1bf35e83de5b76c89bb6c13d7eb3f6d0cdf511042efef3b9bfbdb35e1c488b4a76c55c4ab400d85f9d3a69b7891c3badddd06fa29eb7cd517d144be1dd5889bdee33711fec0fecf2339dfe2bfba56e5b9c39d345a51fdfb9939895f166cbf51e82318668"]}, @nested={0x2104, 0x64, 0x0, 0x1, [@generic="3d5b6c88b596f15b", @typed={0x1004, 0x79, 0x0, 0x0, @binary="14f7a1de687dc9bba7a9ef00a3ee5c42ce68a7bbb2b388d50a2add5a0cfff548cd547539c4db360f332ad485f9ecee12d8d7181a9d59e9c7f1b47e9e5368d3ae416b63ea5824f1c51b7c5b19bed845356f5fb4b3d018cfb3c52a25bc46425331a97c8a28c5ea453bc40aaab8d42f32e71921a9b5b2c09276adb1cd4262770b79850fe65fc0bb79ba67085456c90abaaa23cb2f8838c8d58663f6f82c4195b8dca1634bc6ece8456d590c1510548865161727630d41f8ee3664a999bf5f5486c6fe69659bae54e8bc5ce2d91e434cd6e34e5208fa1827b175e1d3973c22790f6eac27dd5b2e5b91922dce07ab29f334644d898173e088d6285dde804a8ec2cc2d46f963fa2e60e098b01ea34ff6fa2b6573a372a1115c46d356d03a641432d98ec1a7b139d20c5a8b7816e9ad934f661065ff185989710d42dcd8f8965f3adb55f188865888af0da7b7f72a420aafbeebff1e90a0dc441eef18f00ee16f6aa1c166407f3d3b98f9f2340d6b6d543748bb27f9306b3096f0173270ed039dadb3443c3ee3aebde95d2136982760d20b8e690d9bafcdff6d43601524311f4871a07c491ba8c26213127617f40fd83d3a81b4f999064fdcbdc033bc3d0f881c92b0d75d87433c67034bdf4572da745dcb5b53cfe925ff1ee34204b0ba66b779ba15719a108f87ae0ef77f6bf3d7c63b1532ce2b5f86faa4baa607578919bcab0152d19fb6410a901c36b4f8cd801f015b134a4192db4052b81ecfcb213e905ee3ec5f0271cf6e4780b8e30d2a16e084f4eb6c2656981704c72bddbcff7ea95d1994de5f13dad614acbfaa5232e035f2ccc391ece2e4ef18c324d75e17055e8a5573d3e3a0fdf81da500c69908f0b1d0cbad70290dfc32f1c36e041d1268786c497f160f9c32f54767a6244206f6e7f08cbf8c1b55598107a7b14ed6b4377bc8a6b9cfd4718607f1f1335fdc713eeff88ea60fdcfdce78db32c6d7a03cb1551a916b2a3183c1cc3922f8843e67f5e4b74f79c9f9073cf6fdf979f89113b43deb6944e162b649e6ba989daa0c04112fc23465383dca98c84f84945a75631f195cf3f2d332772673e3e92700146d996d4510176af902c382037e529a5d928ce073882111b3a72d89943b747ab2a53f81dc34c63bb10a6ce795f9f599b6a56738599362979404b1c773965a59abc4aaa79c917de268e187bb5eebd51d88d37d6ef7bff90a8b4fdc1250f85bd4f60166fb59b5bae77655420e5564795696d46c04e4a9596e17da47cf3e4b4ee71a07c0fcc7d25ae51627f5bc6655a983fc3a9c5522cce1b114a2ade231144e694500f6422a8792b9ee6512624c10e14c4fea52ad5a994f0d505b3a0911d425fbe40ca9058c634c932462eff26329392af52c6a93916b93b608ddb6fae05a1bb091b873874879d2527c11834954fef8b2cf3d235aa162b1ae53e58cfbdc61faac4f843c5d54dda7eb6d39c60330a31de43d23f6b6fff5e875f13d3e2b854e5d970c3806eaabcfdbf0fbd8a74c6cd73f2534185db93cf1a6614c41921af58c78618d8e6ba24e8c628ef71afe55811a9db2e3c58155a9ee631c99a9ec17d7959fcdea09f37ec90a093b9c668f2fcb6ec827f53492c4de4515bd5846c38a8f0e488681acb4f1f8cf1680c5aff24b976a280be699b01d155bb1baf9f0fd0a6926fffbb6dc6f8f22e55ecd94f891c5a655ecad804b5f80989e5a755aeb5e30074cd67a54409c22790809791b4c8d2ccd7fd8430e4d84164f0c7a5c2f565737590a4d7b31ec145b2051f7af0b625ebda192a8f164c8333c2d0249a7c40219743a875dd4240d2d1be848718dab225d682ea3399be800da57eebf08d96f2e06002529285b4b3308ae0679bfe17d2d333c25ff47eeaac075f254f0b03da645bf62e40a824b2945481feda22ae32be40ae19e8ae6edc4aca8c895405f95061d8de13fa91ab11f7d32c666c1585c1f5d2cef96292ffc5f77e96707eb1cbde3caef246a40e87acd34b66ef9a581c7c8c42d598384a8fe2ce8e50e855b67aa84767766e1f1c3d4cf91404daf933e199b80ab5cf53e4487cf334b664e1cefe91d710be1be0129e2afe646b8365385d1cb9cfab49481a36d4fc14480ccd3772154621ccc771b67f34acf494be8a9f290842513be8c028e49b5ce41362802030c51b9448fd2f0fbeef15b0b5ec4c0bc380dd76565841cd3adbf76bb88b53755c2e9e62c6f3c549e1ea7920566ba3b532c3b5f2169295f541e88b5c69a199930c8be3328149640afd8a71e47be6b27432d4f2a8e1360dcbc51884d9fea829f507ec8b8e0e643993635720109fca53d2ccdcfcd20be855c8d58d5153431bb4e364a9a5e88b23ef4c13b3566629536e2dc18958a165cfbaa651d922aedf260a007cd085adf23e5fbe6358d978a349ae8e95ec483ccf9807fa3a69950e6ea3b12afd7c3879883f1940b2f91c3b2157157578c4faca0d75086291e1641ab25fe4c10de178f2789c2dd08241a03b23d50e2543cd047aeb336a0264d8cfbec5ea79a63eb8182307ce48bfe4426245d641c86cf9705e27eeae5be9d7b3a50dca3fc1e3516236b076db25b9628ed5c993590bfb1700e7712f9ee1598ad6b2ca854733597828392967a7477da850a9c11e7ec11483b2a1df0caa63f3114a1da5b75c1b5ce0830689ec99bbeb1e15fb6688832f32dfba026200f897d351f364d58f8bcad169cfcd5cd46e7aeb8d88bdec43aab7b30b378ce9aaeb185e36cfcab58b686e720835d54edfa667ef58f63db49db958a8433b2123c7daecce9abe135602075fa7def7c52640ba29b31c323cc174dab946fcf34ef772fac21916ba77a2ab9008e143a563fd10b173800f653ccb0a5cb7f13d8a345e8aa0e6adb340cff123798b78dd8b248ad8fa5fa75f6dfcd489cf1e5b3ff6c2ddf25ba2813ce77718bab800c6fed0810c43dec0ea04c62810813f682f001b31e209cee55c8e6e931dc660807e006d32b438a155609e27cb47791fe65c51ba89650227c02c090534cd339e9ef1d99f56eadc2baa22e226fac381f357deddcdf95ce23e56f6b71571b3e1ec088b516e1cd965d63289bdcb23cb413330fda51fb1d3ef6a53bcc418e5279ddd3db43efe7a0e230ee615e8a8b4369c4ddca146fadec684ed723cf7edc03c5cb7ae5084dec93f98017e4025caceb31065da1c74cbc9d10ea6830f307d957fed39ce1de092dbda1b6236e5cc7d10910609cdda6aac56c9bcdb57d56932041bf1046d34d1b338268cea5f49f68cc9734ac208215515b7f412e0f49a00e47c6b783aea1bd778704b0d1bac658a4912a87fc03d798bf99a9e814c3152db78e0ea6075f06610891daa8e279f679e2e99b6f2c485c43b14d81de7a2a3ba396de69131e2c6250479dd81235ae7b46e7b5b1b0efc0b987227c74599281581d68734c50353e6b941148e602807e7c9758cdf150cedd71f9c48df3c78573fbd507085b902748ca915de49297b26d80c0d6dda03965ef1c176d0dd86b89701f750064e6b82b7aacd245d84cb6030c88042f34458bf7bfa7e1a9740da282fd4c0438a904e4edb4743ec32189e3f89821097ee69d92a94ecd9556d7c76b533b06da58722ac09648bc6004ffb267024bab0cba6e6a1c549aca06ff2e6f00179a8ea0819e2cb8a9a69d7192a4c08be4c9410cc4db5e1362181d70f266fe345df24c31ff1fbbe3878a1812effe6bb5ff4dc30c80833eb4728672df044e7984b64d542a86e2fbd308e4d635f6f9fa1184749f32836326050404df62bd747cfdcd5ec249be59415d30fb2fa6903340b145a021a580e97c5f46b82e6c47306882f1d64663808aaa5759d5bd77ccefd17ddcdb7cde52bb80ed8f8c0ee63af334b514b42e111422b0da22550cb60cdcba9a262b9e42e5ad9d05eea86789b2dba76f9c7278fa5c4b72634b8075bec2760a6b05aa9829b6745d1817fd8ec53ae060808933646297d05f7b658592bd7df7baf85ab59a90669cdcee9e615d2c0ef067003e251b29e8be33359739a317f39328ef17fb9cea4c6dd032164b6dea2d2fb5abf414bc49e61cd931af44f7279eaf08b557cb4e130308301c7f6531c3d85c9a386a7da4562cc1434efa46d48e1286b7482aabedbdf61e16a8f38afa2791753a2920cd14ae79491baab4a6c157e9c1244db893b667dae8e03d610893ee40391b55745bcdd9348f9083be4d1937fe22d84afce750294d1cf9d7a0b6196ec54dce4ba8187f12bcbbce9e19f2dd558312066a6490fb16c7c6d3a09adbdd2f3280364c1c7e4907b631fdd243593d79d198de28ed1909d1c84d9b4140bd793a4cb63d8fde01809f3212058460e28febaacc7813ee0af43b403809c56a819c00ca556243687a2b9af54c5507684b33a2055aa76a0dc7294a5d2d4a2bf53f1b4c8b0035aaed6300d5935151bee68a89310cb712ad43151d3b2f83ae83807dda4efe651b5cf15da6a7852dc9c7643cc635c28bc39c8315895ec597de97e9c44dd4bd8286cee2b84b6f5c22d7bf4e91fb8ccc52001ff262d9d989d75c7ec2d216b3bde8f6823f04c5b58696cb68c8791b82edabef1ba237674e5d7244030a302c1d8578a78f985111d60b48ef02bb76ec0f67c05e53c0484b0276e2c0d3a3f9549ac90010d3c826d9b96f0823039bc9816d6373317ced3d24caf03290448a72c685a9391bcffe347c895b72a5f516fe35452a1d341a6a5be0d25bb2ff95116ec8c9dedf828dc71c1c095df1122c1b7737a8dd85f0886e07bd1047925143b0d0d4e57dacca43dc85c28695d09195ac6afddec2966b3b55858db74af16969bb7450c3126c379ce1a878b50b8efe1308133a5746b85e76118bee0c44611b6728c169d4262a8c02c19e3f721df9cd75d18cdc4067e5729eca7fa398dc2c55ed0abc7b29bb81fdf533aeabbff563090cc2baf9b563c69d4d4d8e17c9beb7b24bcdfa3cf4df87e35998478e940fa0c13e49debf3fa43cc0d13a850e08f522f1e38cb69e7e85a2e97f20d5f6c44b918c757964503d5cee4dc8677f8db4a14f46840c2fb8c2a77ec8a5d7ba17585981b54f91a4aac4a7818417b64e5dc9a5554a45ac306cfa92f969dd33e96e9c8d2a511887efc34cdbe449e61dc333e3cf3091ac07f8a66a2913d10c07b70f73424565959ced49a57e5cd5b85ce6568ad33111d25325a5499500254a3dd625bfc94f75ca4b4a60fa908b7f25a7d5e3b8ed15546995a41305ada8fcc7f03c26e359996884b25c646e2fcd9599caebe99da06725c2b5edd868409c905f02ca5537e92eea3b7894ed87e1ce2f410a51eada43a3e68a899d08f81a7f238eabf4369df6887e1788932fff7fa223666f22a5532bee38aa0396b27cc22b0aa38a86f46b2bcce23f7587426ad086c2dbe1faae809ca70f4f4790180e2652708dcd2c35144a6db70ffe28b1a56d969a6bdd3f0974ca9d84c07fbec2303c4e101c68c8256912955705bb983fd4baf14c29257eece47f4efef411db898d4cebb8120cf77ca2ecf3342d7689660add5a8fbe4a2b8100a6d289f0086372f2df9a2bd3ecd86fb2fd782728d0896acf67ca1b90a51da88171c9e4873914133ed912184742c3df40aaff4270e0cd4df08a9d316acfae4d6e75abdd19548741e21bfa10721f8c717e6d31fdd12db3cb9bfeacd8e6e58f829f285397a6b0c85700f4186b10e98207f66942b7ee9dc4f54eb179f5341a99017aff12efa6d9f168562a0ba5e505ae94c24cf8640a37e0d71a6235c9d4222d1ed19780b9edfcf1b1feecce7bf68a8cbaa4e3a6b4d20940457cd4"}, @generic="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", @generic="73dd7ecdb0fae01120fe602fbab7ccde2b27ec9b0d6163b6932ae6c0a10b3f5966cfa288c3d095c60ad0209a00acdc5d5ceb0a5769952bfaa148eaf54fe663c5b23acb1677ef932da85a0e38b90450bacf72327736231ff214e208bcd2686ff6d36d7fc2a8523385f1c514ddfedcd9279e5623f989b6966c891f4b7bcd54a6250dfcadea121b70e32534ecdde012ff1c0e340e4d9e4c10513dce24cf4b1cf568acf5d1a5f090092a66a01b872e525d4ff02508abcbc9caa91c1be9e10011fb056c283b897628586a906abd57dd739b07654e6f16c8f0bb9180305d7762f9ddd570970ff66f02e889", @typed={0xc, 0x32, 0x0, 0x0, @u64=0x9}]}, @nested={0x1119, 0x2, 0x0, 0x1, [@generic="8e1b896c249cc2dae3795ce46f8cfd6dc9934e3e8c0a8b186c29ce88805cad048f230c36d77b9da2b3ee78c1cb58574f98d4cb5a72494c7716765f644bf25f06c1aa2b30356cce46a5c3182e808d693fb15017891cecbb6486058302f257971a1498cf94b7f74694fa53b823e2314c6b7834c91add09c90028813728a254a8441479c5", @generic="4b8aaa83bfb75bb61de943fa06052b47e83690590d", @generic="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", @generic="31ee6cb1a0446fd93e3dda20055764773092e72dced1b2f10da641a96d03ec74ca4059fd9b22fb6060cc558d3f6bc474b0db9c5b65ae10e946a0d78212b150ae58c7e70362ff66c81f3f71d68bad3241635315093317c4feb5c7459126ab76a7deb93ac3c716283c0d56c6d80335da435473227b61cb7870beeedb2f1a"]}, @nested={0xa0, 0x64, 0x0, 0x1, [@generic="9b524f9457388d9771ac35ce6b54bb888fb5fda423c8627d0190d8581cc438b78b2afa3573d40a8d78c9566de3623505b52d620874c2ed0c770edee6624f67aa667a05ad667e84144af86da57663a9df8200a92eaf443e1470785134981f2af2261c876da8405120a64b79a8c52c12bb5589104844118440aaf03c1bef5968bc", @generic="39e3a5a14c7b1d7c93e2c7425427c7ba2f6263ec8608453f3c561efb"]}, @typed={0x33, 0x1b, 0x0, 0x0, @binary="d0952d38cd07f2d4b6d6667f54a3ca2e03ef2bf824af5c479b63707fa228561d0ab71d00b1f0086f339902342db6b8"}, @typed={0x8b, 0x50, 0x0, 0x0, @binary="66a8da0be170263913cd78f5857a0815a8ef9efbad0750cf2a879a5430b5136c82ae6eb9056fee22b570caeb9a7f3b30abe0649309a06b94cfc3605893569da3abf60c73255257b7a37999723054c6c3fc8e78ada58652d09b15971c0e9b8271fba3d28dee04e6e3c1fe736cccd99e1aed06ab101234bb2e5a9f5d9a717d8745e49f35b28ce4f2"}]}, 0x4434}, {&(0x7f0000006a80)={0x10, 0x1f, 0x200, 0x70bd25, 0x25dfdbfd}, 0x10}, {&(0x7f0000006ac0)={0x4c, 0x2a, 0x10, 0x70bd2c, 0x25dfdbff, "", [@typed={0x8, 0x8b, 0x0, 0x0, @ipv4=@empty}, @nested={0x33, 0x87, 0x0, 0x1, [@generic="779211481103a6d848a2e14ab44d04", @typed={0x8, 0x51, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x14, 0x45, 0x0, 0x0, @ipv6=@mcast2}, @typed={0x4, 0x2b}]}]}, 0x4c}, {&(0x7f0000009600)={0xfffffffffffffd36, 0x1b, 0x1, 0x70bd2b, 0x25dfdbfb, "", [@nested={0xf7, 0x40, 0x0, 0x1, [@typed={0x8, 0x8b, 0x0, 0x0, @u32=0x2}, @typed={0x8, 0x3f, 0x0, 0x0, @pid=r3}, @generic="7a3d3bd955da3ae4f52fef36aa16fee8db579abfe4eda925b8c27b3da58f34be91b46a23a746c6402e7f33835825a2df", @generic="45c8c7a5ee31820dfe6027911e048a8d7dd0508e81f2e65159bceb526c318aa3ea14a5e324ad0a5a8ec752f93d69f594dc73ec29e27713e88f1c57bc0921fbade9356d9e7c0a52e59be47b6d1398949450002628cdf01cc599975b497d53f78d8c88fd6b9605783d9ef9dd1abcf9b63b081a6f6eb295602435d0ce30e7ad37a56aa99383a5756d9ba2706ed936f1f1b2e8a88dcea12cc37ab7a8fbcaa945e8bb4b180399955f748d544657706fdc19a3dff2fe"]}, @typed={0x8, 0x13, 0x0, 0x0, @u32=0x32400000}, @generic="50c7e0e56399f4270a6e12d140a73b2c3b8e176f16b0d9a1e372df78058ada1246b0ef3bac49e013c8464726d368571f726230f8c36a4f0bfb18491720b25a6426b2ad084ab9c845ad5ee2170519b3425af5c8f160626ae8389dfe00ba695725e8e43a83b99cd96bd5e06bcbec8a416f706f1cc767f73e491e35682a4dadb0ce45913a3b2371ed0db38039bf66bd038834b7ab023f44d3b5dba8794a21a61e1eb3e8199f6a6f00b29a1c1863c932a34510b855aea08b33741b6db9365b875a2d57d5fd663b9e0fb3f5df2778a50566cffa3f4ec2d5537df4e95601f7b1742f33fff09ce4bff7007f68b8468ab45a110cec6fee0634ef423f32175faee5436c6dd2db2e500dff9c7ae03d5c8d9fa3b652395f4c68e3e3e68fc3375275ca494c9b0ae0e4d7c7280182cfd7abf71ba75e412db640fccc974966bfa212503e01f5e6651ee2613a822ee99de74a2ee63c32a54983f985bf9c76fce24c5f81d98afa57d5f51877d62aaf8be35fdd1b080e49d34ac3b014b679660cab8a1f8eedbd9beb09e79c64220c26f99a25bfc3211c7c01e7070b3078a7f63ac2ad1894d7a7eda521c00da979da9953997f68751376a309bb7cafc3603736800f426a6a0ceb496cbe750fbd0f513a4fb98844fe5023ae15f4ddc1a0f04e30075c8bc35e6ddc7b5d0cf81d5c0790e54dad6ed71333dcedc1fe232b27f0aa4dfcc438da36606315aa46206f67a389448ca46d87dfc7c563573b03b9c70eebcb4f6a49cae56c340e06370e6c8a3657345e7182e7354b00a27412c43b821c102f6e60749b8690ad877a24cb5151877ef716844388c4f688a22eef6dc4ea87b84725798b5ffeae2043836c29685c1fb4c3816af51e9f2815b635e5ec642f27afcc93fdc3d7e2a6e321908339fe5d5d978d2f52f2b0f3f644dd0e4d3ae060cf71172212e43ce0767b81a2b4950f55e940eda498a5c41ead8bea489beab26d0be3c3d1f0987f23de6b9c8cedf500685f3aa20c617a0d57f54e5bb9dbda3d76b44e9b588422b391ac00f2f4a72e18e511dd5ce387964a291b7165b014b8fb5da0da46c0f526b9f9b952faa1a918c29596f15ce819dd9ba46804a925629ccf10f2d7fd5ffa5da3e36721f3bb2c3969f5651d9ec02e91c26febd304094585d041deb44b1db5737a98a97b33a264aea9fa7a1d8f9727a7ff50e0a1ba74ea13d28641cabd2a2ee4f16e0763f575091dbed1e924332863d618fea264737ce3b9924c3f064387b8bc6be8e975b0c116c9c32c5729319b6aa9baf38a04254e46c336cbf4a6fe4dd26542eef4ec2a422c309b1be3fd5bb4095c12231da820cb26ad1acff2603dd0f0f7269ea8a7e2bf3db3618897bb6ea730ceb48831283ee64f9e09b7e1c6474e968108fb14913964a1783f6082db47367d44e5d4ae2802d9fbb25e908c08171e91a02a21d109168670226174383a2de0405e9ccc705d5bb61e58dc23cdcd726c2a8448a78fb270679b715adf622c27b7e83f5cf4061537e798eed959449524fb4bf1ef304c6630100162e2d8d2c401f98c8c86ad74973c32c68fd69aa5c81954cf01de60b4f64b01955a7a750f85576197b6c3b9336bba3178c3e5ccbdb5739d722dbc8533b16aab8a4f44c8a37464b50a9ff2b7e88be9c386524ce03c86989210062f4ba0127f4a1a9814bd49ecbd83905a293977971a1ab0f01a23d32a23d53f695bc144602b8df58f0a3a83b5e1a8c50f974eb35fddc7aca2e28938644e6c6b08b15b6c52b8c11f4efb674f6ff59a404774ff40f19f879e81d80ed29afe591aba255b4f2fcbb66e0b0848d179acb0c356bed8acbc51b270238f6c57fc0b1e79bf817b370ce949ac1fc03b5e6fd9d3e638dc3df6eb6c4c41d9e80f2dfd84acda9bd008f4f90ade16b1d3eb37a079ac92951b0ba1b11645c8fcc082b21884f72045863f006e39e54b89256d8b02b033316ba547645d1bae9d646a6c4d0de551bf3b992ada2626e76ae2b84ae95b75a22f349da75837bab0315b91227cef921a2884389c321c2e4e712f4dc6fdcc1ebf390f5710ed5a86695dec1e55880716ec6782c8319d6d0c23386ec20447065386ab5868fe25b7dd0e4687db4a40c73d9a6430f780c46421f49170cf3ab269ffb91526fb3c5f91a1ff845619f00d4dbcc7ff833568eb6a34ccb83a9cbc0b2e4f08b62ddd430470faf26489dbfaa80e499ca8eaf4677f8e7b8f66d2ab2727c6a33cec2d48b3a376f239e7b6d6a201a5bd7054ef33f0ce2f4f0dc4803a6aeb753302f1bf707e31f7d20690754160f34fbf0a4cbcb6ec15b83887672970f8bce0f9c555bc11f79c5b24573d27acf23afe6edab7791334f9d4c4b720f844cd9974c5cd901b2fa040120ebfd6433cfce00e57c0931f64ea0d8947bc13133364e67de81ea7ae32ac336e4ef4de48caf28e1720eec017700b06385b1bc3d8622edbdf69aea22b3cfc9c579e85e61d3b7fb9bba4c5b467de9baf9062685e8a4f7fbea57c473957e8e00cad27a746dd510bc04afc10bf45719c4ededbbb97991463dccbd14c2229bdadff0685e5bcd35e6fe62f038f7212ee21a330fdf0816ec45fb08ab60fac3f39a7c75d562832495be38b76320e459e88b4065c371288e31d2611f740feb7c8ef74e26eb7ee8e9d8f0c05eacf4ebc161bbfaefdad411199bd13da9fff83600b9563a8676aa9aaf796c8f4c8fe7284d737490386a5d076fe630b6213d1541293b6091f66210691080871ca1e209f686124249a4bf02470aa2f739d5abae956af2a069b24ce10b8d396e67c6b7508632ded321b6c53997d03b556f43e4b5159655fd46822e7f9802e44af3cc03128e93c551723c33f08679f6824db2f5dd3fa510f37d36a4194c4f0adcc6e50bfa5cc72f31afc3afc99d793a44fd8de09352016555ef6d54739a7b6ef9c6bf3b738cfea5a5a1a0c2abd537ed7a5763ab5afe7da1014d8813f44775cb80426ee241b40a3bffd0ce851e89801830e4d8b2f483541dae845a75cbc68a2d32a74cdbf3f81ed31dadf173a6f292b599b3b54f3857c99592030a9ef11cbec936622243ca76d557314f224f7d17b561ebe8e9705eba0cd8adbbff6c08c864da165b020832544468485396f74e587cb73f3e7fe20115fd8e0551b6c518199b20a22c25c6507a60d9b40bed4ab353929cb53c67630cac575248a8e40c491c02af6ef54621903cb6c9a58a92dd907f2c4fbde23018dc24318dd96293282154ca39c483332f0f1f35e3b1cc01b2654a7f754934a576e6653fe1e27884b2edae1a1853367f8ccca4d90225b9752f00b1109e4ca7bd4a159630be7f7b2b89111da8efe91611bff6a16c676c0a53be99dcec7dc76aaa3355e732883cbab338f97c5ea0d4359499cef8ea6dd29c72162f4567d05aff5451ae1693e9a31e164fcf642879b40ca3ee365986bbbfd502e9970808f4c44f0d934e8e6a6fd3a72484c291ad73aaa34c1a64b8a29819038f7094870a473b35cf01e3bee33bb67f3f05e038316d778ddb64cdd287b988f52c8ae621a57c6e5c1c1dfc6133b7144a7297d562cd0f1bf1cc4e8b5a2fcbe281034113a902335580325b72c968276babfca336a10fa36c5fc44a1f623673c77e11956f3bf7b1639a3ed1c47a01e64d7418e2bdf283eded1ffbf5fd29441313a93dce4acde96f77a72b24a262fac658a7d7f4c713956b9218bacfc8a96b9220abaf1c1f8b042b3dac1beeff9bb25fd492be6cfad8e7c934ac76a4802d066428005a8cc662a6a39e522637fbc05e305d4fe0e5a0aab451970a2ac7deacbc399b43d0b2150751a2d117b80edcb40a97f947f8f7211cd3894733215f5748ba6a40922c330e52a9de58736630adc8c6511c73795b372ea43cee7811b30a0281f0e9a7e2d60872eddb112cdd13cc977829bc93841da794faebde809fe694d1b864f63689efaf9ad4b8e7f5722b088822cd87e1ed0c198873288e679874bfb731b07af2933b0bb3583ed1dc41d5500cf03bd58e4329af0a5ca9ed99608f5c2543b5e23abedc46508f391a447308a2447b9cbc07a586da5d7d4854bdc8bb51693ca050eb857863e353434dc22196e40a373504b3d3d070e9c4d8be60cb1afe258f742be64523b77a5e210dea136d19c01ef8dcbcb3482ad08b09da0deef2dcc4c283f9d26ef1a6c138f1094454306e1f6b3ba4b6dce1dfcdf74ac8e2c7aea0492b66a25cf682d41d8a9af3e166874689d0f714f3cb25bf6cf38e03fd1d2529882698ed8e99a890aeff0f3c42d9bfc99dfc250effe7b24a20ec91e7c51b136d4343280ebf7d2b25b099cf2aec23ee650f318c1c2acb5c714d0e7f6c241fe6d3ab204bd11752719313cfbe5e5d798c2392e2e82fba0883633d10dfccbd410fa7e7c68930f219295b5486bb05f9b76ce08fdc580064c2943f135fab3ad692fe52c2105e1dcf48c92fec90c2d897093b74c980984c4d8ebc297386cfa3020c40f92a8e0ea31659330c78ab3862fd428f85000bdcf844d8f3163b583b30f9d010865dd322921a7b0e16144ff2a105229155d79b1b2bd1c726053c2cdb09c4142ce9c9a19be753d2fc7cd3f924e6d4c1c74a52a8f00950c9f16bbbd6cf477a85f6a45cfe08f77f709198661081e02a2508f587c883d8de743a4345008619671aa86c85d79778efb20cb9abd3bdb99fc3f7c767eb4c6ff7b69e37f949d0f25c4b7b272f69822e485dd9bf2b1b66f2c264bdaf99fc4cbf5a6299a03740be366000738ea593cc80129000f64118320ca9c11da71011732cb51fb0ce5630654ba5e05c3ea8f4d28e8a44622f13dc3790bcf1ab86858f98400adb5251a3052f2a610bc8f2b67a0b9aef889a7f81a268abe4d76c5df966538cf64ff84d692288d1d38caea4d8c5ee07b7111f53a574728fb3f2826501fa9f3a4791555b835ca4a079b083fa9277fc06a15a3b19688f6a9d3b5af827110ea65fbb3453e641bcb795b1efcfecd9d6c4d64e84717bc9ecd4b96ae79fb6b345cab5aab7ab62137ffa9fcf1d01ddb80bb25647c02b0b8c4609ca6da788c7c7b18c4e45d181daa0e69c90714e6430e2de8d99668a8aabc2943dc258d3820508267e85e96e1d46a2b91f540ff78e35d632e9cb48f2f3389f368cf1002fda118acaa2cc77c4ea21d2d2fff717bd3e50ea48103299e0457168156b516f84455b703500fd59d6c5af3d83386bb093d546b6c160af928c6e661161538c93ed3f5bd59ea9b59362ebc780517f15fcf48f5414829755962fab4cd424288289307d3e8120c642da4b5032a340bf5922a255447560186e7310c131fc46353bb9b5354d7b2ac449956d73ae9038227ca97c5422a51fb1cca8fe30cc818a2fa4e84174dfe8a6cf19af419abcd4052dde897b6dfd99e5e7d530b8cdbfb21620ffb26072d978d337942d7dd55728575fcdee8a81426963a8d021424e65c3c5dd61623888c6e9e2d7ee5367e6468291ebb8485f87eef3011dfdf67b0673573499498918ed15fe6a1bb84f83464839154fe40bb89c6ff91243827e747e85f5908c9fbb1f84a64c26b807e938184ebb3907b79ceabb74b4f253495b2385f0ba94760ac06e436f42f370bb122c2ca5b6cf97c38d177bd4efa22ecc5594593cefc26e18e70a9baf6587af4c7556fdf18d396fce62d56f162353bf40973c7a640eeae16c4ace38dad41da01349c56264372b70a64772a7ebc786c5a3c22fdcf550f8d4075415ca4d88f8aca80ca13ba9ff1a5bf33186f64d95d6be762ace9540314684d1c10be07fe829103f768604511c56c69ab0365b055164d9e8ee68873dd", @generic="0731fc36f9b9b3adec22ea8d164be17bad401e9ca2204cfdd6075c20aa1319bc087d5ab1fe63699ff09a448d739aa3c144cfdbde9d52cf10c34f47de129bae86590b0e78ae9554c6fc2df1ee3cc6f395a17ee55437411b42f51d49cef61ac8e59c42332c4348da37bb883aeb98f62e4f0ce910bf1ac2cdaa1257b2b80c6aebfb6bad7bf7553769447bd2222212d48a6e098caa1228a9617068af3c70146c84ce180e6b64dc087400ff5fb1614d1a3851e9ae6b67849b220963301cc65cb77e87bd9f1bffecfe3d2c4babcf9bcd78688fe1b4d245bcefa87d161a536d4874ded0641f9fb17d0615ec717c1f74d3916b42f1d665acd83d5fc2df204773206abf79fc2a8eb686d8bec28b1affb47da329c8a60f61c57cfa362ddb17181160d1f963caa0cb412c138752a9910cd19c4440ccf6ad8391fd705049e54839babcdbfb70604050f3c5322cd7ec9fc939fce0cebe6ba1515d6aa144cc0d1b032a08b52e1564ae0ecc8bb9bd8d4ad6baacd066fec90aec803580ae61b1c5789c2229dca7fc50b6eeb2e042ed0f0ef1efc3973665326575db69b94c5a239e5a9a16ac44a27ad9656099f3def40112276a1a41505c2614fb72b2a5cc838dc9705dce7145feb5a6cb343f1d42cc6add89e908da2f77b068f1488f3be6d561f1974aeb724fa7f6ec6b29757ebdb0af92c59d6bebb188638101789fb02d708ee72f71b57db6ec76b1738dab19e0503a4da732a206ebc79f0fd97c218867110930639ab4faccf65e6dacce194cd69a6a3e3777756e4e56e84d2deb44be8c8482bdc422f5ee597529c1758cc9c6c3bf4f3854ba30bcaae7afac511e2c04d52e12aa53148339d16cd6ef68d84b161d4e31eef7a91975e930dc56824ab1ecd8b69494a7f664c0ea220647659d7e98ea4d524b090510bccc9debcc2c948c04af53b05f55cf025e46bcbf3e73ed8aff0d1357509049d7dda0da44f8bfb998db0f20ea1f5cf660350936f9684828b6fb80033f15045cf6c59f950b9fb78b4f01ebecdec19042f572c52be35ee3e99dc7a42a513313ba5dc0fcbdb083977e521fe02e195fce36b1d87080a172ec6555a8242e70ed9890bed0b607d5251cdb11463ceab36b6a6e8e5a8573853e2bd8681fc6945cb5ffff672d625bd71240f28b09f454b08491a5c0e94d1fba07ecdf694ad479f6ffdd38f5865a9b67ff2622640725859e6f7fc8db9b7b24e4da3a08a405c298ba2da9079127629912e5502d54454d4a2a49060909ea6f4dfb7c21c476c5742a6025a17993a801b619b4cbf69befe934339b85c3c1ecb83cfe2c1c1f59bf31873f4f298ecbe22d0428608fd1572b44da207353ba518c0bb63ef2078b4451999c6bc1d909c7c733d341e5e97da9645d31c9b7b22785d36c9be5c18e696b92effbfbcfb153da2bd7f89059394da3ea21c7c9accd2a67a162779716e330723014e24040c9e877023597949de49f0a212bb1f7e14b670104ce6baea15a5cf85313a6c73d547248bed235db7787bb134ef52786f400eb71b6d45848423cb57149baa4e67622fd917272b0a0bc808b8f96bb6260257092b5ac72d14cda8dd23c44575fd346a122cfc7631a33bd565b900c16ccc81ec75e025d1dc107bfb46a792be0b78962c07c775841579a296865830349f7e824489767ec1e2a778e4094bc5eae396c8856b57f6cd368e94f4a49242fee43319263adc89d4f04f49038dbe8757a76c9181c6d303bbde80cc13cb8781c072d3113b73ec9b1e9391ba683681693b2af7dd2bdc3e45171586712561b6d1be59f5a509fb3b220e897360447c44db0fe781859f5a507087ba66f56cf7b0c8150fe019d372a1e81382effdcc59a9a8a256bc6fb3d422ca09ada0b652ca95ee340f167577f4ae50ee9b593bf612582b879465b9aae5dab6e7485dbdfc18ed45177d303b5add3d601f213228d21d534b3c42b50f9b52f626bb448f669b59e19782e0aca3eb4307c543be9595f95be7b56a17382c71d2f8b65b8f4d347b140736e7f903c1b078166c577fc5f8708d1af577d3ff6c55c3e1dc287852a9eb1a59be2e44da8ec503150fb90b7422357ef4ee6c8a970db9af5d42b3662ea45bd8d2135bfa4bfd02126589f89b9642d86b37eed476753d28c4ae7ca6803eee69d1e5700c8e64a02967faf9c8e6f848431afdb9ea224ef84df6b96df2510f7c6d59ff0928b1fec6b14473113beba9977e213cca51ebcbfdba6fef151557a13e95a6efff7bbee227922c315993c7f9b99ce983b4ddf3bc119ab5a76bd067a0fcd0d0410a38043f229c415ff0de50c9bbf1033bee833b814cc9e24d50b9887b0072d2bf65f64bb0d9c60b73431d762ea50c6aef22c1ef6471fb0fdee4f891660e01aa90d717e276782b28fe660bd01370ffd228a2d1265075e1998f4d87518b8df1397676abadd64665812ea9093d45fb770edeaf341b7944a0e1ff9b415c474987ee8fc65b390c738399c52f1ec3e219eaf37b801ec4906804c997e99f724e2cc9209b6c7e42f8c9b69f43705f5e0922f7a5a7d0639346ea0b715eb830577bfcfce56dfc9e2d3b75231a708e5e31aa130a1bd146a08543708d94483eefbca7cd5305a30d4d34fcf771970b0db8b702097517002b1a738c0e03c061486f1a491f1b43cb420ec3a8c61cd5d7a5e543d7e56915bb50e1c989de8cecc1d7ab455626b3b1cb40fe735554bf7bca60e39986476a2c7b51bcb2bb74ade8d57ce0ce2c716fa2492321e864ec769960bd7041dd6c2069c6287b7d9c115e05dfe5ae699e0f89dd2740101151bb431ef99e6ec98a6dab4474b2c960bd71996bb7d9ed98a3e15568a6519fd0cf6487a8b74349d6f230a57f93f9dd83558e567c5020be5c086d3df23a6379229650e02b25ef59656abea9e42603306daf4e8d987b6be8a1f7f43d4163c6154e221bfd208107c3b489a17be1d3ca77352af524705d33e47cd5f5fbdc3f3d40fc824582e31e40da760f80289ae47773c26225bc2013a18df7956bdb6a971ca98f13a565feca3a3f67629c3a190db5745dbbe6bcc633da06f4b0354f581ed402d0804b130ffdfdc354dcc447e08c2d2cba710fb4ae90dfb884d81bee5a1bf7109eea5da0df426944ea77c96af3571716ee0a0f921df53115114eae3c61640e2cbaa02862bdf6be3668159f12b5cbba8b915e2b9d907fb326e9d9fd305aba6afe8a3a737d0caed5501c3db04c348b6840f452ba74568dafd4bfe4f3db4656bbec43fb70b754d25c00c1ccf83f56951b89d99877ea6f68ad40e4f35be8205ad1b116a414dfac4184a93ead7ef31be097d19e82c2fdfccbc2640afe11900bb82ef383a8be8ef9af6bf7d686c0f9775c4e01d164870f1adcbdb318a2d8b0b3f752ba7c8c18c4ff90630f871a8d11833afaaff0692f26c4a6fa91bb646f7198159bd2afc2eef13d44820ba107ca51209ecf6946411ddf6b4eedaa7b123fc9fafdc95229a1f296bfac5996ca9e4d22fe75366aacacee2e0227b1838df9930d364565eabfb416d579c3da74fd06a7b3f7b245d7b6893d052495a2038c9ec940de06ba3dd0f61da757f1635cad213419bbbc672db9fee86c42898f938c9dad629557bd40b5e0d953d5040df1a21c055da17ed23978655976973a80c59ed156d566a6b52ceb84eb96e40dd776cb529ea05cd324326e884d7087863f1d5d1ff2d7a96d7078a0f31a7ba53005a9563ba391340585a249020f2aef1a5dc7f033c4c323dad570983244a2350a26131dc74cbcd6c737b069cb19b1306b8914f77b47de85494048c20c665fa7dc6aaf1b6ce05145629cd10da4f76f4e7138fee1a70396805defbbeb8bd400edbc1963a9fb3acaae62719bb44f6e12ba613a412c3679a7ca0b2eb58e5212dce84c6728f61a33bc0aebb9c3a69670dd0943dadf3532560fd2cbb51657f1ac4d032258f6d050e6b9dd0b2364aed0babc4837b9e824c90f8e25a2dd0608079fc7aebbde6a0b460890c9ac7eab4ab572e74906292f30405866b1af9b8ce9a0d8076d5560e8db3de40c911122568b17227c16a734b140c882f95ac7d1ae7ce2055a1f5ce64b4b1d5c376301be74db5b6760f95504c58e5a16f9e7efe1d9adc9c9540d3b1b2f94f8631b684f64bf19102cb40ae24b1b1679af7d17b8785e647e9ac5f2b514b7b2667e53bf2d2aeecb950a531b7a4075ad2d0cec0964661089bc23e11eba790f85b2907af2de6fb120728afedd9b6f221672bbfec1f12cee27dd046db31d70c15bb957fce2c4ab2f2ebd78e783e2de228d559bdbd1a6ce69968597ae119b5f7bd6ff83869e9234fb6775d1078bf0ccc419101ad1b7965d5d1691777a6891ce848671fbfe036c1d79b2e625a1ff503f5c63ae533ed62f972e5f518afcab237b2635e80440190777520616b5fcad1f58fd87a48ec2034b4ef34c98ce8a7d79f3e1d274d23eb5c1e58b9d554e57e3aee062e8e87ff19f10526455a4bf3c750746b6d183b7b868ca195a3ef740508e8df0b9f0ebddc9b21d7c5043f4a700b1e259166da52a0c403bfae6e6b1ff125c21d261c7b54e17c13fa5cbd1d600bf83211396a150be30e18f16bf2288e702fb7c8279335a85b445d85ef7f36514cff903be8cf9533f92b609b196b9319e44c93c22783ca397ed36230d7d3b850d20b3fe91f98f7da6d14e6e87dc0e8df4d62f4a9a4112da9613e47e5e20773b86ceb3a56476cf53dab9442932119c84b421eb92d2fabb0029b60932219bcbc5c31dfe56792576a76a6e1a8fe33dc4c02e943085f2b0588be7e71bde1ddf53b263b92ef606394e6e6e5bcd36bffdd3f75506b2276218aae20307e182d7fd933d2cfd03b208fba8e189399e0dcb9d29d89bf842ae26870739fa69680446f2fb170ebda5ff76dbe7e4f86eead473f7676670bda7e69399def0ae74c411da67c8ec1c1e7f327d1d7f23eca1298fa481274946fa0497e691e0c84aa620d368c478ebece44e069c1761a665ee03ba97680810192fa2342ec4f6a8d0474b2e58261543f78109ddf3e4debb07570a6101c90235e8289af4644f168c69a045a48f0188226f0390984a2ff3a35598f2443f7e93022a545a22d77af97b42acba711759fea0e2774f5c543eb402fd0c7aa451404944bd4700cc79068b02733c14d8e989c35c7e402f8ff1d9afdc02868950c9855524b9ffb9ebca1f49594015f21a83d69f4b61bd9880abe89aa6e01673ff0c8ad3b8ef1c5d331e7ca9fc106f69353c1afeb4c5472bcdc45c6f1b8a0370df565d19a113abccfefcfe8076a6fbba39d7b08025f0ee27abc8761eb13f5446b9ad77cd1743ffbd5f955605ff158bc17be3fa25d685cc015b4ec8259870b3603a2da7bbc94c6b724eb09d033f60280b700adb5cbf10db01fb4a8c7a10a5107336154ee8046653b2dc4fcbaa2cd2c886b02ce39f02f56b59be9b15afd4cd5b3f5c63b18a7f355a7013018d7a7967ab61413c22e3a7c2136818afc0de291df8a67c07c08b8cf5bba371c490d24be0333f88119cd55665614592b6088421e3c1aa9cb4f807c8329d8ab9d114b445fff6f4e77140b0dbf37d951e6299632412844f343c205b537d5d507b7b66e8b46ce948959ad850a6d6dd62c6689514045a2aff5c62f0db2d48f5cd1e7e1ce846f295d19ebeba0f7d6a32a1c3383b5ceec264327a37abb7e53ca31589c4736811b920e71ea730a4ea0447b1b65b4e379f38b3898d191dd2c1dec86a27e246021001e8b7b73d28beca76f26ae92a9871fbae5b0c7f677241dd6cc8b19585298d189569325dadee3af412d5862ff9ceff96c", @typed={0x14, 0x4b, 0x0, 0x0, @ipv6=@loopback}, @generic="a7aee2e9810dcad676383511c3a7323d0677b5608a94442fcc7745786dda679ae6059270ea22d04831dff89a766a35bd992fa94314123d2cd8f0065a9e1dc84edd22966299e3d1a66cbd335d4d9c4c809dee23b34560442eb304da06c995c14b5c0dd05568e2ad14dcabca9b4aa2f79e5c0d79da9d5d41d0dfdd7a9ebdce39797407f03e8d6365d596d7885cef81df8facd7be6ab1403eec96d242e7be27194ad04c48ec640c6f729a2c523b1725f1a48382d1fe3a97af983f6618ac032f54a480ea1e8b59807c29808fa863e8441618c2382b81e1446d9c27633e157d7a", @generic="75884e42ff79832bb94748a1ba3dabc7cec12dfc56af57ee3d0352b860fce15129f783c25672aa2a20e65420876245eadeb284c3fdca5e9d2d5c201a93db2940862eb50d405f363c7d96fa21357c71ecee39f3c4d8a317ad6d0dbd96300c02ea219aac124e026c828d8bf00bf81a152391185c9eb28bc5fb14be64752444e3fb54033776749bc150e9866403d777", @nested={0x229, 0xf, 0x0, 0x1, [@generic="e2e6e558c7b5a28f05fbf36bb3a727f337a5fe451157b58eb0bb8d0ddfe9fe6f82266d3ac53e8e1c26367ebd4efd247024281155595b72143f8baf6ac2a6476f340af286b13773170b2aabbfa21c0616937e35547099472fdfe5bb673350b9dc618f44b6c985412051176c823c433f5180719933499d18d29c2bc8fe7ecd4d5c12e390d73c593ed540aca107a5509b6a5968069bd9ef6d", @typed={0x8, 0x72, 0x0, 0x0, @u32=0x4}, @typed={0xc8, 0x30, 0x0, 0x0, @binary="dbeecaa1b2960ef14d252c315e3602c897ef4cb90706c87f1313d2a787e54406cf0c59852979e2afa44ec0551c633d22c091f8c9d7c2c3057b9a6a688901fd3125820ca8624b5ab0b48dcbbaa467389662f43e6a715e58bd585fb2a2bacd5c673158511a1660e54cd21a0d30978b982e4dd5c3c793ef7a4bf1499f5fb44ba632ccd0c3babb632db1d06b96c3ec0102fe77edbed2a0b6694369a76e5c7e9e51110b7face9240d45edf2a988ec9081f980b5504d6fcde4a1386d6d49213cc9274238501124"}, @generic="58aa", @typed={0x8, 0x4e, 0x0, 0x0, @u32=0x3}, @typed={0x14, 0x79, 0x0, 0x0, @ipv6=@remote}, @generic="e5b6b3165c985a405ad98c151a4891c9021e3f14aba98f986c9b8ff73b6ac4eb11d50cda58697b93410c973f9025a6b589ef4a1138a98a65ced48aad106982fe76224758876d55667ba2d93367a433ff46832377e1195a0ec1a1758a3e9834c7262f59523f15e7d1a3d18966c1ce2bf0e0e5cf908329bbdc5e4c91b11c3856b9683a6925c7895d1d008280f8e568109d1a18241e59cededdb78192a88ffc2b24"]}]}, 0x14c4}, {&(0x7f0000008040)={0x100, 0x11, 0x20, 0x70bd25, 0x25dfdbff, "", [@generic="d7749ec79c4be8e5153c94b7753125b4965fc7827351f4fb7b280a3b39aa68a68bd762d393833609bfa6a893433aaa4a94f30ff02d29ec6d6bfaddb7872eaa8ab0bab9f0d7e83a7f3ae66ca6fb49324cb008f48889b971d1827ce283df80cf59617315da8ceca764bea7082a63557e748cb219ab13a8c3088ea37303e6022da110e5e3a3a414364e170fd29ae07bb05f234745d30563a1470726c296f74788f162c2be7237fc9ae28d82a694eb0a481ce1c87edf941faf93f32c61f3a97cbedd3d30c1a5dd60a483c4bf3bfe6e09767e4db3d700b027ceb93a8573da3dd9b51722a5a0a0bdfc2d13f8852d21e185e7a2"]}, 0x100}, {&(0x7f0000008140)={0x1f8, 0x30, 0x200, 0x70bd28, 0x25dfdbfd, "", [@generic="d584136f65f616adc82ce6c306e97c2a4f41ce649b945a3074b06d057a2b60473b908564efcdccaba7aa92bb27681d34a9783397d15bcae9992fc993ad5773d5c7feddc991c36cca686626b09a7fbc7eed95c1f727baf2be450ac618d0e17da7ea72db17eeff0f2d7a1eac9c9417270acc030cd1aafc3fffbb6da37f2c36238da5bfb3788f7a9eb8f4894df7d748ba64a11e5f1b7eead9d129e1d60cf23180fa2e59012f3705a678937ba1c563b29875098a77d4afd539a9b6513ebab56867a3ff962f8a700e05c3365d45c791e3d4b32e79dae38f72ec39ccf7feb5bbce7131674215473bc548bfac5c7b33c5fd", @generic="2482cd2d8ddff3657e8d63d0a65dc294e10e3a1376dc983b119e7a2e16a729ef58040c54ce06b3c7e050041cd5c759e1d0d476f497bf7edfd41603486f34fefdf2c06eabcffe52e89232f636ec9e4300485707d3ea65a3d6ce63c28384cb129c634ac6aea7000082dd984c6531df840060e7b5f2a3e3fdf97eb42ebe5cb8e07a7df61221aea5b7c1be5856e7280b36faf92df93f15f61db6439b4e09dcf0dc7d7ca7eef7c9610b5ef0d37f448851afec2ad8d1ec0166bb540861a66554a596d5bb45a993f6acafa3f6d12039ef64b2211c333adc3d79adac9c536b5cc54e4b47a4aa66d8881dd85d17d8f627b52a198733dd7c2b9799aed0c33e"]}, 0x1f8}, {&(0x7f0000006b40)={0x11bc, 0x1a, 0x100, 0x70bd29, 0x25dfdbfe, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32=0x7}, @generic, @nested={0x20, 0x50, 0x0, 0x1, [@typed={0x14, 0x78, 0x0, 0x0, @ipv6=@loopback}, @typed={0x8, 0x80, 0x0, 0x0, @u32=0x1f}]}, @nested={0x1165, 0x89, 0x0, 0x1, [@generic="3e958eb2be3dd82c35f00c8f72a097b0d2b0bcc554c82d68a09e35e15b2ec6cec5824a4dd357ae66842f5a1ea3f37000e2e5dfee5a4d61547980bf055db4af2e91fe5509fe8f4d80d648a57db2b7db5b4539b16394c97285a16eff01063f45ae22008cdfbfacc51a203287e2fb8f08b1d334a8a22327cd5093653861fa30b52eeddd361c3c351b4f", @generic="7f52f30afa1c3ae177401262ab0fb03fe119cb38e74f5c670468c290a7d031b82718c089a5ce76b6d041db6af65cca75e81cce921364f3079aca709225c9b0b4a9b1d7b597fdb2c1c39c6d75dc72adf8cd2ff8f904820f45b2c820718cba75d48d70e2ab0fe708c7d2abc8481bf41ffb2fefc1ac79338c0c03a1b9179d1eb056f6dfb813d0c2520b6b4af94f77a66407b4b961f99bbc277ec3781ba97d6dbd74fd3a", @typed={0x8, 0x72, 0x0, 0x0, @pid=r6}, @typed={0x0, 0x41, 0x0, 0x0, @uid}, @generic="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"]}, @typed={0x13, 0x18, 0x0, 0x0, @str='/dev/dri/card#\x00'}, @typed={0x8, 0x6f, 0x0, 0x0, @fd=r2}]}, 0x11bc}], 0x9, 0x0, 0x0, 0x280008c5}, 0x84004) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000040)={0x0}) r7 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r7, 0xc0106403, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0]}) 14:10:45 executing program 5 (fault-call:0 fault-nth:38): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:45 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1553.511539][T24029] FAULT_INJECTION: forcing a failure. [ 1553.511539][T24029] name failslab, interval 1, probability 0, space 0, times 0 [ 1553.536486][T24029] CPU: 1 PID: 24029 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1553.545208][T24029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1553.555270][T24029] Call Trace: [ 1553.558586][T24029] dump_stack+0x11d/0x187 [ 1553.562932][T24029] should_fail.cold+0x5/0xf [ 1553.567507][T24029] __should_failslab+0x82/0xb0 [ 1553.572351][T24029] should_failslab+0x5/0xf [ 1553.576773][T24029] __kmalloc_track_caller+0x4c/0x640 [ 1553.583025][T24029] ? strndup_user+0x7f/0xc0 [ 1553.587565][T24029] ? mntput+0x5a/0x80 [ 1553.591564][T24029] memdup_user+0x2c/0xc0 [ 1553.595838][T24029] strndup_user+0x7f/0xc0 [ 1553.600191][T24029] __x64_sys_mount+0x82/0x1a0 [ 1553.605017][T24029] do_syscall_64+0xc7/0x390 [ 1553.609544][T24029] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1553.615540][T24029] RIP: 0033:0x45f29a [ 1553.619573][T24029] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1553.639188][T24029] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1553.647668][T24029] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045f29a [ 1553.655886][T24029] RDX: 00007f3d0323cae0 RSI: 0000000020000040 RDI: 00007f3d0323cb00 [ 1553.663869][T24029] RBP: 000000000076bf00 R08: 00007f3d0323cb40 R09: 00007f3d0323cae0 [ 1553.671841][T24029] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 1553.679829][T24029] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000026 14:10:45 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000040)={0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syncfs(r1) [ 1553.721962][T24032] jfs: Unrecognized mount option "hash" or missing value 14:10:46 executing program 5 (fault-call:0 fault-nth:39): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1553.871910][T24040] jfs: Unrecognized mount option "hash" or missing value 14:10:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000100)={0xc, 0x10001, 0x20}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r2) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f00000000c0)={0xe, 0x4, 0x5}) 14:10:46 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:10:46 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1554.028469][T24045] FAULT_INJECTION: forcing a failure. [ 1554.028469][T24045] name failslab, interval 1, probability 0, space 0, times 0 [ 1554.089867][T24052] jfs: Unrecognized mount option "hash" or missing value [ 1554.192631][T24054] jfs: Unrecognized mount option "hash" or missing value [ 1554.216764][T24045] CPU: 0 PID: 24045 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1554.225459][T24045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1554.235762][T24045] Call Trace: [ 1554.239132][T24045] dump_stack+0x11d/0x187 [ 1554.243476][T24045] should_fail.cold+0x5/0xf [ 1554.248038][T24045] __should_failslab+0x82/0xb0 [ 1554.252808][T24045] should_failslab+0x5/0xf [ 1554.257229][T24045] __kmalloc_track_caller+0x4c/0x640 [ 1554.262531][T24045] ? strndup_user+0x7f/0xc0 [ 1554.267048][T24045] ? __read_once_size.constprop.0+0xd/0x20 [ 1554.272868][T24045] ? constant_test_bit.constprop.0+0x9/0x20 [ 1554.279643][T24045] ? __check_object_size+0x5d/0x337 [ 1554.284848][T24045] ? _copy_from_user+0x93/0xf0 [ 1554.290623][T24045] memdup_user+0x2c/0xc0 [ 1554.294877][T24045] strndup_user+0x7f/0xc0 [ 1554.299218][T24045] __x64_sys_mount+0xcb/0x1a0 [ 1554.303979][T24045] do_syscall_64+0xc7/0x390 [ 1554.308641][T24045] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1554.314547][T24045] RIP: 0033:0x45f29a [ 1554.318458][T24045] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1554.338170][T24045] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1554.346676][T24045] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045f29a [ 1554.354765][T24045] RDX: 00007f3d0323cae0 RSI: 0000000020000040 RDI: 00007f3d0323cb00 [ 1554.362750][T24045] RBP: 000000000076bf00 R08: 00007f3d0323cb40 R09: 00007f3d0323cae0 [ 1554.370725][T24045] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 1554.378764][T24045] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000027 14:10:46 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r3) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f00000001c0)={0x3, 0x55, &(0x7f0000000140)="82d090dff57e6dc88e11c9381afe8e7de8e42eb46678dac30cf40392ca27d16d8f9c895ea07a7a913280cbe681149751d1b28c614a6f4cb7d27e82e1a1b360c6b16c2d6c48f14920f0d59111aed2910d58b0230173"}) r4 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$unix(0x1, 0x1, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) fsconfig$FSCONFIG_SET_PATH(r4, 0x3, &(0x7f00000000c0)='\x00', &(0x7f0000000100)='./file0\x00', r7) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:10:46 executing program 5 (fault-call:0 fault-nth:40): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1554.671300][T24060] jfs: Unrecognized mount option "hash" or missing value [ 1554.783856][T24065] FAULT_INJECTION: forcing a failure. [ 1554.783856][T24065] name failslab, interval 1, probability 0, space 0, times 0 [ 1554.814367][T24067] jfs: Unrecognized mount option "hash" or missing value [ 1554.861986][T24065] CPU: 1 PID: 24065 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1554.870750][T24065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1554.880810][T24065] Call Trace: [ 1554.884214][T24065] dump_stack+0x11d/0x187 [ 1554.888652][T24065] should_fail.cold+0x5/0xf [ 1554.893173][T24065] __should_failslab+0x82/0xb0 [ 1554.898038][T24065] should_failslab+0x5/0xf [ 1554.902468][T24065] kmem_cache_alloc_trace+0x26/0x5f0 [ 1554.907786][T24065] ? __check_object_size+0x5d/0x337 [ 1554.912996][T24065] ? _copy_from_user+0x93/0xf0 [ 1554.917771][T24065] copy_mount_options+0x4a/0x150 [ 1554.922764][T24065] __x64_sys_mount+0xf7/0x1a0 [ 1554.927603][T24065] do_syscall_64+0xc7/0x390 [ 1554.932127][T24065] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1554.938022][T24065] RIP: 0033:0x45f29a [ 1554.941924][T24065] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1554.961573][T24065] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1554.970137][T24065] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045f29a [ 1554.978200][T24065] RDX: 00007f3d0323cae0 RSI: 0000000020000040 RDI: 00007f3d0323cb00 [ 1554.987202][T24065] RBP: 000000000076bf00 R08: 00007f3d0323cb40 R09: 00007f3d0323cae0 [ 1554.995195][T24065] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 1555.004256][T24065] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000028 14:10:47 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000040)) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000040)={0x0}) 14:10:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x22001, 0x0) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, 0x6, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x20044010) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDSKBLED(r4, 0x4b65, 0xfff) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x2, 0x12, r1, 0x10605000) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:10:47 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:47 executing program 5 (fault-call:0 fault-nth:41): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:47 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:10:47 executing program 2: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) [ 1555.299716][T24078] jfs: Unrecognized mount option "hash" or missing value 14:10:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDFONTOP_COPY(r2, 0x4b72, &(0x7f0000000580)={0x3, 0x0, 0xc, 0x1a, 0x1c2, &(0x7f0000000180)}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x8c40, 0x0) getsockopt$SO_J1939_PROMISC(r4, 0x6b, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x4) [ 1555.411171][T24085] FAULT_INJECTION: forcing a failure. [ 1555.411171][T24085] name failslab, interval 1, probability 0, space 0, times 0 [ 1555.449796][T24089] jfs: Unrecognized mount option "hash" or missing value [ 1555.530968][T24085] CPU: 1 PID: 24085 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1555.539694][T24085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1555.549879][T24085] Call Trace: [ 1555.549914][T24085] dump_stack+0x11d/0x187 [ 1555.550018][T24085] should_fail.cold+0x5/0xf [ 1555.550047][T24085] __should_failslab+0x82/0xb0 14:10:47 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:47 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext={0x0, 0x80000000}, 0x6, 0x0, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}, 0x2}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000040)={0x0}) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) close(r4) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r4, 0x4) [ 1555.550067][T24085] should_failslab+0x5/0xf [ 1555.550154][T24085] kmem_cache_alloc+0x23/0x5e0 [ 1555.550228][T24085] ? __list_add_valid+0x5e/0x70 [ 1555.550247][T24085] ? should_fail+0x7c/0x2fd [ 1555.550271][T24085] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1555.550293][T24085] getname_flags+0x8e/0x380 [ 1555.550316][T24085] user_path_at_empty+0x34/0x60 [ 1555.550337][T24085] do_mount+0xc9/0x14d0 [ 1555.550357][T24085] ? _copy_from_user+0x93/0xf0 [ 1555.550383][T24085] __x64_sys_mount+0x12b/0x1a0 [ 1555.550428][T24085] do_syscall_64+0xc7/0x390 [ 1555.550453][T24085] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1555.550468][T24085] RIP: 0033:0x45f29a [ 1555.550491][T24085] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1555.550501][T24085] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1555.550519][T24085] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045f29a [ 1555.550531][T24085] RDX: 00007f3d0323cae0 RSI: 0000000020000040 RDI: 00007f3d0323cb00 14:10:48 executing program 5 (fault-call:0 fault-nth:42): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1555.550543][T24085] RBP: 000000000076bf00 R08: 00007f3d0323cb40 R09: 00007f3d0323cae0 [ 1555.550553][T24085] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 1555.550564][T24085] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000029 [ 1555.770841][T24098] jfs: Unrecognized mount option "hash" or missing value [ 1555.973479][T24103] jfs: Unrecognized mount option "hash" or missing value [ 1555.995554][T24105] FAULT_INJECTION: forcing a failure. [ 1555.995554][T24105] name failslab, interval 1, probability 0, space 0, times 0 [ 1556.039213][T24105] CPU: 1 PID: 24105 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1556.049121][T24105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1556.059180][T24105] Call Trace: [ 1556.062486][T24105] dump_stack+0x11d/0x187 [ 1556.066906][T24105] should_fail.cold+0x5/0xf [ 1556.071461][T24105] __should_failslab+0x82/0xb0 [ 1556.077250][T24105] should_failslab+0x5/0xf [ 1556.081780][T24105] __kmalloc+0x54/0x640 [ 1556.087021][T24105] ? tomoyo_encode2.part.0+0xd0/0x240 [ 1556.092410][T24105] ? __d_lookup_rcu+0x2e8/0x410 [ 1556.097298][T24105] ? __follow_mount_rcu.isra.0+0x242/0x330 [ 1556.103185][T24105] tomoyo_encode2.part.0+0xd0/0x240 [ 1556.108593][T24105] tomoyo_encode+0x32/0x50 [ 1556.113016][T24105] tomoyo_mount_acl+0x7b/0x590 [ 1556.117794][T24105] ? __read_once_size+0x45/0xd0 [ 1556.124485][T24105] ? __rcu_read_unlock+0x66/0x2f0 [ 1556.129581][T24105] ? debug_smp_processor_id+0x3f/0x129 [ 1556.135243][T24105] ? ___cache_free+0x2c/0x320 [ 1556.140104][T24105] ? mntput+0x5a/0x80 [ 1556.144120][T24105] tomoyo_mount_permission+0xe1/0x350 [ 1556.149606][T24105] tomoyo_sb_mount+0x3a/0x50 [ 1556.154280][T24105] security_sb_mount+0x7d/0xb0 [ 1556.159054][T24105] do_mount+0x12b/0x14d0 [ 1556.163303][T24105] ? _copy_from_user+0x93/0xf0 [ 1556.168161][T24105] __x64_sys_mount+0x12b/0x1a0 [ 1556.173894][T24105] do_syscall_64+0xc7/0x390 [ 1556.178413][T24105] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1556.184309][T24105] RIP: 0033:0x45f29a [ 1556.188219][T24105] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1556.208921][T24105] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1556.217352][T24105] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045f29a [ 1556.225341][T24105] RDX: 00007f3d0323cae0 RSI: 0000000020000040 RDI: 00007f3d0323cb00 14:10:48 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f00000000c0)={0x31, 0xb, 0x14, 0x13, 0x0, 0x5, 0x2, 0x12f, 0x1}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000100), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) [ 1556.233343][T24105] RBP: 000000000076bf00 R08: 00007f3d0323cb40 R09: 00007f3d0323cae0 [ 1556.241759][T24105] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 1556.249736][T24105] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000002a 14:10:48 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:48 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x40, 0x4, 0x0, 0x0, 0x40000, 0x104}, 0x0, 0x1, r2, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x20, r4, 0x1, 0x0, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x40004}, 0x0) sendmsg$NBD_CMD_CONNECT(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x2c, r4, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r5, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:10:48 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xa5e8}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) [ 1556.463104][T24113] jfs: Unrecognized mount option "hash" or missing value 14:10:48 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:10:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080027ad7000ffdbdf25030000021400200020dd642df4208a1bffb4cc6a9ae57aa314000000050012000000000008000b00030000001e001d0040000000"], 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x20008045) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000000c0)=0x0) syz_open_procfs$namespace(r5, &(0x7f0000000100)='ns/cgroup\x00') ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:10:48 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r3 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000040)) r4 = socket$inet_smc(0x2b, 0x1, 0x0) splice(r4, &(0x7f0000000300)=0x9, r0, &(0x7f0000000340)=0x164fd9ca, 0x800, 0x2) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000100)={0xba, 0x0, 0x4, 0x40000, 0xfe, {r1, r2/1000+30000}, {0x3, 0x2, 0xf8, 0x80, 0x1, 0x1, "43c1f43e"}, 0x1d8be46e, 0x2, @planes=&(0x7f00000000c0)={0x8, 0x400, @mem_offset=0x7, 0x21ce}, 0x6, 0x0, r3}) r6 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000001c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r5, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x4c, r6, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:vhost_device_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20004000}, 0x20000050) r7 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r7, 0xc01064b5, &(0x7f0000000040)={0x0}) [ 1556.567447][T24123] jfs: Unrecognized mount option "hash" or missing value 14:10:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x100000000000000, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:10:48 executing program 5 (fault-call:0 fault-nth:43): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1556.647624][T24126] JFS: continue= is an invalid error handler 14:10:48 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xbc0f, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1556.753862][T24137] JFS: continue= is an invalid error handler [ 1556.789747][T24139] FAULT_INJECTION: forcing a failure. [ 1556.789747][T24139] name failslab, interval 1, probability 0, space 0, times 0 14:10:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDFONTOP_COPY(r2, 0x4b72, &(0x7f0000000580)={0x3, 0x0, 0xc, 0x1a, 0x1c2, &(0x7f0000000180)}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x8c40, 0x0) getsockopt$SO_J1939_PROMISC(r4, 0x6b, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x4) 14:10:49 executing program 1: r0 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r0}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x8, 0x0, 0x0, 0x81, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000000c0)}}, r0, 0x1, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000002c0)='}', 0x1, 0xffffffffffffffff) keyctl$setperm(0x5, r1, 0x0) r2 = add_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000002c0)='}', 0x1, r1) keyctl$setperm(0x5, r2, 0x0) keyctl$update(0x2, r2, &(0x7f0000000140)="e00816d311f3f9bc84f8aad261853a4b395c7bb19c6ac2677d3c7de920ca913d8007c83adba0d1a6d14948ae38d9af9edcd508a79f89aad597109e219cb6f24cef842717e31fc323170a57afa98922fef49c686de8daef4f9661b2b6e9f6be92dc41b43ea828c54258883eec083f5432c86d48d012e355e4b5fc68042cf9401c9cbca14698386b0ffb595568fcdf53511ad1d0b9c7bb196e730fd71595f03a137568641564e9adc4721e103db16b733b379f37dd0851e795", 0xb8) r3 = syz_open_dev$mice(&(0x7f0000000840)='/dev/input/mice\x00', 0x0, 0x0) accept4$inet6(r3, &(0x7f0000000880)={0xa, 0x0, 0x0, @remote}, &(0x7f00000008c0)=0x1c, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) r7 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r7, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000200)=0x6, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$UFFDIO_COPY(r6, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1}) r8 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r8, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) [ 1556.845123][T24142] jfs: Unrecognized mount option "hash" or missing value 14:10:49 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1556.918520][T24139] CPU: 0 PID: 24139 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1556.927222][T24139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1556.938647][T24139] Call Trace: [ 1556.941960][T24139] dump_stack+0x11d/0x187 [ 1556.946380][T24139] should_fail.cold+0x5/0xf [ 1556.950917][T24139] __should_failslab+0x82/0xb0 [ 1556.955815][T24139] should_failslab+0x5/0xf [ 1556.960239][T24139] __kmalloc+0x54/0x640 [ 1556.964476][T24139] ? tomoyo_encode2.part.0+0xd0/0x240 [ 1556.969907][T24139] tomoyo_encode2.part.0+0xd0/0x240 [ 1556.975334][T24139] tomoyo_encode+0x32/0x50 [ 1556.979806][T24139] tomoyo_realpath_from_path+0x11e/0x3d0 [ 1556.985489][T24139] tomoyo_mount_acl+0xdd/0x590 [ 1556.990353][T24139] ? __read_once_size+0x45/0xd0 [ 1556.995373][T24139] ? __rcu_read_unlock+0x66/0x2f0 [ 1557.000440][T24139] ? debug_smp_processor_id+0x3f/0x129 [ 1557.000463][T24139] ? mntput+0x5a/0x80 [ 1557.000504][T24139] tomoyo_mount_permission+0xe1/0x350 [ 1557.000552][T24139] tomoyo_sb_mount+0x3a/0x50 [ 1557.000576][T24139] security_sb_mount+0x7d/0xb0 [ 1557.000597][T24139] do_mount+0x12b/0x14d0 [ 1557.000615][T24139] ? _copy_from_user+0x93/0xf0 [ 1557.000640][T24139] __x64_sys_mount+0x12b/0x1a0 [ 1557.039898][T24139] do_syscall_64+0xc7/0x390 [ 1557.044427][T24139] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1557.050327][T24139] RIP: 0033:0x45f29a [ 1557.054313][T24139] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1557.054323][T24139] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1557.054341][T24139] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045f29a [ 1557.054352][T24139] RDX: 00007f3d0323cae0 RSI: 0000000020000040 RDI: 00007f3d0323cb00 [ 1557.054362][T24139] RBP: 000000000076bf00 R08: 00007f3d0323cb40 R09: 00007f3d0323cae0 [ 1557.054371][T24139] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 1557.054381][T24139] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000002b [ 1557.060129][T24139] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1557.138508][T24151] jfs: Unrecognized mount option "hash" or missing value [ 1557.145815][T24149] JFS: continue= is an invalid error handler 14:10:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDFONTOP_COPY(r2, 0x4b72, &(0x7f0000000580)={0x3, 0x0, 0xc, 0x1a, 0x1c2, &(0x7f0000000180)}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x8c40, 0x0) getsockopt$SO_J1939_PROMISC(r4, 0x6b, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x4) 14:10:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)={0x14, r2, 0xb03, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x118, r2, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x48, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffffe}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x10000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x48, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb2c0}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x24, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x4091}, 0xc0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:10:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9484, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x6}, 0x8002, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x9, 0x218a00) [ 1557.286743][T24155] JFS: continue= is an invalid error handler 14:10:49 executing program 5 (fault-call:0 fault-nth:44): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:49 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:49 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:10:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSBRK(r0, 0x5427) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r1, 0x541e, &(0x7f0000000300)={0x4, 0x4, 0x10000, 0xfffffff9, 0x9f91, 0x4, 0x9, 0x10001, 0x0, 0x1, 0x1, 0x3, 0x9, 0x1ff, &(0x7f0000000280)=""/84, 0x3, 0x0, 0x100}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r5, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x7a, &(0x7f0000000080)={r8, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000140)={r8, @in={{0x2, 0x4e22, @loopback}}, 0x6, 0x7ff, 0x8, 0xfffffe00, 0x4}, &(0x7f0000000200)=0x98) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f00000000c0)={0x0, 0x0, 0x3ff}) 14:10:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$key(0xf, 0x3, 0x2) clock_gettime(0x0, &(0x7f00000027c0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f00000000c0)=@sco, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000180)=""/196, 0xc4}}, {{&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000002600)=[{&(0x7f0000000300)=""/94, 0x5e}, {&(0x7f0000000380)=""/20, 0x14}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/41, 0x29}, {&(0x7f0000001400)=""/188, 0xbc}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/221, 0xdd}, {&(0x7f00000025c0)=""/7, 0x7}], 0x8, &(0x7f0000002680)=""/149, 0x95}, 0x7fffffff}], 0x2, 0x0, &(0x7f0000002800)={r2, r3+10000000}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r4) ioctl$TIOCCONS(r4, 0x541d) [ 1557.507939][T24167] FAULT_INJECTION: forcing a failure. [ 1557.507939][T24167] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1557.507961][T24167] CPU: 1 PID: 24167 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1557.507971][T24167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1557.507975][T24167] Call Trace: [ 1557.508005][T24167] dump_stack+0x11d/0x187 [ 1557.508030][T24167] should_fail.cold+0x5/0xf [ 1557.508057][T24167] __alloc_pages_nodemask+0xcf/0x310 [ 1557.508085][T24167] cache_grow_begin+0x74/0x590 [ 1557.508110][T24167] __kmalloc+0x561/0x640 [ 1557.508130][T24167] ? tomoyo_realpath_from_path+0x85/0x3d0 14:10:49 executing program 5 (fault-call:0 fault-nth:45): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1557.508212][T24167] ? __d_lookup_rcu+0x2e8/0x410 [ 1557.508244][T24167] ? __follow_mount_rcu.isra.0+0x242/0x330 [ 1557.508268][T24167] tomoyo_realpath_from_path+0x85/0x3d0 [ 1557.508291][T24167] ? tomoyo_fill_path_info+0x164/0x240 [ 1557.508313][T24167] tomoyo_mount_acl+0xdd/0x590 [ 1557.508339][T24167] ? __read_once_size+0x45/0xd0 [ 1557.508362][T24167] ? __rcu_read_unlock+0x66/0x2f0 [ 1557.508384][T24167] ? debug_smp_processor_id+0x3f/0x129 [ 1557.508416][T24167] ? mntput+0x5a/0x80 [ 1557.508456][T24167] tomoyo_mount_permission+0xe1/0x350 [ 1557.508487][T24167] tomoyo_sb_mount+0x3a/0x50 [ 1557.508586][T24167] security_sb_mount+0x7d/0xb0 [ 1557.508607][T24167] do_mount+0x12b/0x14d0 [ 1557.508625][T24167] ? _copy_from_user+0x93/0xf0 [ 1557.508648][T24167] __x64_sys_mount+0x12b/0x1a0 [ 1557.508673][T24167] do_syscall_64+0xc7/0x390 [ 1557.508698][T24167] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1557.508711][T24167] RIP: 0033:0x45f29a [ 1557.508788][T24167] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1557.508798][T24167] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1557.508896][T24167] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045f29a [ 1557.508906][T24167] RDX: 00007f3d0323cae0 RSI: 0000000020000040 RDI: 00007f3d0323cb00 [ 1557.508917][T24167] RBP: 000000000076bf00 R08: 00007f3d0323cb40 R09: 00007f3d0323cae0 [ 1557.508932][T24167] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 1557.508969][T24167] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000002c [ 1557.585065][T24166] jfs: Unrecognized mount option "hash" or missing value [ 1557.629420][T24175] JFS: continue= is an invalid error handler [ 1557.689719][T24181] jfs: Unrecognized mount option "hash" or missing value [ 1557.732249][T24185] FAULT_INJECTION: forcing a failure. [ 1557.732249][T24185] name failslab, interval 1, probability 0, space 0, times 0 [ 1557.884817][T24185] CPU: 0 PID: 24185 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1557.893540][T24185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1557.903605][T24185] Call Trace: [ 1557.906915][T24185] dump_stack+0x11d/0x187 [ 1557.911268][T24185] should_fail.cold+0x5/0xf [ 1557.915792][T24185] __should_failslab+0x82/0xb0 [ 1557.920591][T24185] should_failslab+0x5/0xf [ 1557.925031][T24185] __kmalloc+0x54/0x640 [ 1557.929248][T24185] ? tomoyo_realpath_from_path+0x85/0x3d0 [ 1557.936076][T24185] ? kmem_cache_alloc+0x1e2/0x5e0 [ 1557.941131][T24185] ? strncmp+0x6b/0x80 [ 1557.945310][T24185] tomoyo_realpath_from_path+0x85/0x3d0 [ 1557.951841][T24185] tomoyo_mount_acl+0x245/0x590 [ 1557.956802][T24185] ? __rcu_read_unlock+0x66/0x2f0 [ 1557.961845][T24185] ? mntput+0x5a/0x80 [ 1557.965922][T24185] tomoyo_mount_permission+0xe1/0x350 [ 1557.971452][T24185] tomoyo_sb_mount+0x3a/0x50 [ 1557.976069][T24185] security_sb_mount+0x7d/0xb0 [ 1557.981202][T24185] do_mount+0x12b/0x14d0 [ 1557.985478][T24185] ? _copy_from_user+0x93/0xf0 [ 1557.990270][T24185] __x64_sys_mount+0x12b/0x1a0 [ 1557.996013][T24185] do_syscall_64+0xc7/0x390 [ 1558.001430][T24185] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1558.007330][T24185] RIP: 0033:0x45f29a [ 1558.011248][T24185] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1558.030950][T24185] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1558.039384][T24185] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045f29a [ 1558.047380][T24185] RDX: 00007f3d0323cae0 RSI: 0000000020000040 RDI: 00007f3d0323cb00 [ 1558.055439][T24185] RBP: 000000000076bf00 R08: 00007f3d0323cb40 R09: 00007f3d0323cae0 [ 1558.063497][T24185] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 1558.071475][T24185] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000002d [ 1558.083481][T24185] ERROR: Out of memory at tomoyo_realpath_from_path. 14:10:50 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xff00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:50 executing program 5 (fault-call:0 fault-nth:46): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1558.159992][T24187] JFS: continue= is an invalid error handler 14:10:50 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1558.248618][T24190] jfs: Unrecognized mount option "hash" or missing value [ 1558.324159][T24193] FAULT_INJECTION: forcing a failure. [ 1558.324159][T24193] name failslab, interval 1, probability 0, space 0, times 0 [ 1558.376908][T24195] jfs: Unrecognized mount option "hash" or missing value [ 1558.382736][T24193] CPU: 1 PID: 24193 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1558.392889][T24193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1558.404394][T24193] Call Trace: [ 1558.404425][T24193] dump_stack+0x11d/0x187 14:10:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSBRK(r0, 0x5427) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r1, 0x541e, &(0x7f0000000300)={0x4, 0x4, 0x10000, 0xfffffff9, 0x9f91, 0x4, 0x9, 0x10001, 0x0, 0x1, 0x1, 0x3, 0x9, 0x1ff, &(0x7f0000000280)=""/84, 0x3, 0x0, 0x100}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r5, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x7a, &(0x7f0000000080)={r8, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000140)={r8, @in={{0x2, 0x4e22, @loopback}}, 0x6, 0x7ff, 0x8, 0xfffffe00, 0x4}, &(0x7f0000000200)=0x98) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f00000000c0)={0x0, 0x0, 0x3ff}) [ 1558.404462][T24193] should_fail.cold+0x5/0xf [ 1558.404489][T24193] __should_failslab+0x82/0xb0 [ 1558.404506][T24193] should_failslab+0x5/0xf [ 1558.404522][T24193] __kmalloc+0x54/0x640 [ 1558.404623][T24193] ? tomoyo_realpath_from_path+0x85/0x3d0 14:10:50 executing program 5 (fault-call:0 fault-nth:47): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:50 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xff0f, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1558.404640][T24193] ? kmem_cache_alloc+0x1e2/0x5e0 [ 1558.404675][T24193] ? strncmp+0x6b/0x80 [ 1558.404697][T24193] tomoyo_realpath_from_path+0x85/0x3d0 [ 1558.404721][T24193] tomoyo_mount_acl+0x245/0x590 [ 1558.404744][T24193] ? __rcu_read_unlock+0x66/0x2f0 [ 1558.404768][T24193] ? mntput+0x5a/0x80 [ 1558.404854][T24193] tomoyo_mount_permission+0xe1/0x350 [ 1558.404936][T24193] tomoyo_sb_mount+0x3a/0x50 [ 1558.404958][T24193] security_sb_mount+0x7d/0xb0 [ 1558.404991][T24193] do_mount+0x12b/0x14d0 [ 1558.405010][T24193] ? _copy_from_user+0x93/0xf0 [ 1558.405033][T24193] __x64_sys_mount+0x12b/0x1a0 [ 1558.405058][T24193] do_syscall_64+0xc7/0x390 14:10:51 executing program 5 (fault-call:0 fault-nth:48): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1558.405083][T24193] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1558.405112][T24193] RIP: 0033:0x45f29a 14:10:51 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1558.405133][T24193] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1558.405142][T24193] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1558.405198][T24193] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045f29a [ 1558.405209][T24193] RDX: 00007f3d0323cae0 RSI: 0000000020000040 RDI: 00007f3d0323cb00 14:10:51 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x80040, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1558.405220][T24193] RBP: 000000000076bf00 R08: 00007f3d0323cb40 R09: 00007f3d0323cae0 [ 1558.405230][T24193] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 1558.405240][T24193] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000002e [ 1558.405410][T24193] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1558.518086][T24198] JFS: continue= is an invalid error handler [ 1558.636602][T24206] JFS: continue= is an invalid error handler [ 1558.638761][T24208] FAULT_INJECTION: forcing a failure. [ 1558.638761][T24208] name failslab, interval 1, probability 0, space 0, times 0 [ 1558.638783][T24208] CPU: 1 PID: 24208 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1558.638851][T24208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1558.638856][T24208] Call Trace: [ 1558.638887][T24208] dump_stack+0x11d/0x187 [ 1558.638912][T24208] should_fail.cold+0x5/0xf [ 1558.638948][T24208] __should_failslab+0x82/0xb0 [ 1558.638973][T24208] should_failslab+0x5/0xf [ 1558.639007][T24208] kmem_cache_alloc_trace+0x26/0x5f0 14:10:51 executing program 5 (fault-call:0 fault-nth:49): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1558.639033][T24208] ? apparmor_capable+0x25a/0x470 [ 1558.639054][T24208] ? apparmor_sb_mount+0x1fb/0x610 [ 1558.639074][T24208] ? strncmp+0x6b/0x80 [ 1558.639093][T24208] alloc_fs_context+0x56/0x3f0 [ 1558.639111][T24208] ? try_module_get+0x2b/0x40 [ 1558.639128][T24208] ? _raw_read_unlock+0x21/0x40 [ 1558.639233][T24208] fs_context_for_mount+0x2b/0x40 [ 1558.639249][T24208] do_mount+0xe3e/0x14d0 [ 1558.639267][T24208] ? _copy_from_user+0x93/0xf0 [ 1558.639297][T24208] __x64_sys_mount+0x12b/0x1a0 [ 1558.639346][T24208] do_syscall_64+0xc7/0x390 [ 1558.639376][T24208] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1558.639390][T24208] RIP: 0033:0x45f29a [ 1558.639411][T24208] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1558.639420][T24208] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1558.639437][T24208] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045f29a [ 1558.639446][T24208] RDX: 00007f3d0323cae0 RSI: 0000000020000040 RDI: 00007f3d0323cb00 [ 1558.639462][T24208] RBP: 000000000076bf00 R08: 00007f3d0323cb40 R09: 00007f3d0323cae0 [ 1558.639505][T24208] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 1558.639515][T24208] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 000000000000002f [ 1558.734546][T24210] jfs: Unrecognized mount option "hash" or missing value [ 1558.839900][T24214] jfs: Unrecognized mount option "hash" or missing value [ 1558.936310][T24218] JFS: continue= is an invalid error handler [ 1559.010446][T24219] FAULT_INJECTION: forcing a failure. [ 1559.010446][T24219] name failslab, interval 1, probability 0, space 0, times 0 [ 1559.010467][T24219] CPU: 0 PID: 24219 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1559.010476][T24219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1559.010480][T24219] Call Trace: [ 1559.010509][T24219] dump_stack+0x11d/0x187 [ 1559.010532][T24219] should_fail.cold+0x5/0xf [ 1559.010558][T24219] __should_failslab+0x82/0xb0 [ 1559.010574][T24219] should_failslab+0x5/0xf [ 1559.010591][T24219] kmem_cache_alloc_trace+0x26/0x5f0 [ 1559.010615][T24219] ? apparmor_capable+0x25a/0x470 [ 1559.010692][T24219] ? apparmor_sb_mount+0x1fb/0x610 [ 1559.010711][T24219] ? strncmp+0x6b/0x80 [ 1559.010730][T24219] alloc_fs_context+0x56/0x3f0 [ 1559.010750][T24219] ? try_module_get+0x2b/0x40 [ 1559.010826][T24219] ? _raw_read_unlock+0x21/0x40 [ 1559.010846][T24219] fs_context_for_mount+0x2b/0x40 [ 1559.010861][T24219] do_mount+0xe3e/0x14d0 [ 1559.010877][T24219] ? _copy_from_user+0x93/0xf0 [ 1559.010925][T24219] __x64_sys_mount+0x12b/0x1a0 [ 1559.010949][T24219] do_syscall_64+0xc7/0x390 [ 1559.010972][T24219] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1559.010984][T24219] RIP: 0033:0x45f29a [ 1559.011013][T24219] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1559.011022][T24219] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1559.011039][T24219] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045f29a [ 1559.011074][T24219] RDX: 00007f3d0323cae0 RSI: 0000000020000040 RDI: 00007f3d0323cb00 [ 1559.011084][T24219] RBP: 000000000076bf00 R08: 00007f3d0323cb40 R09: 00007f3d0323cae0 [ 1559.011094][T24219] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 1559.011103][T24219] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000030 [ 1559.078014][T24222] JFS: continue= is an invalid error handler [ 1559.247117][T24226] FAULT_INJECTION: forcing a failure. [ 1559.247117][T24226] name failslab, interval 1, probability 0, space 0, times 0 [ 1559.516498][T24226] CPU: 0 PID: 24226 Comm: syz-executor.5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1559.525948][T24226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1559.536377][T24226] Call Trace: [ 1559.540645][T24226] dump_stack+0x11d/0x187 [ 1559.545539][T24226] should_fail.cold+0x5/0xf [ 1559.550064][T24226] __should_failslab+0x82/0xb0 [ 1559.555188][T24226] should_failslab+0x5/0xf [ 1559.560260][T24226] kmem_cache_alloc_trace+0x26/0x5f0 [ 1559.565810][T24226] ? kmem_cache_alloc_trace+0x1e1/0x5f0 [ 1559.571496][T24226] legacy_init_fs_context+0x38/0x80 [ 1559.576733][T24226] ? generic_parse_monolithic+0x160/0x160 [ 1559.583629][T24226] alloc_fs_context+0x2e3/0x3f0 [ 1559.588594][T24226] fs_context_for_mount+0x2b/0x40 [ 1559.594364][T24226] do_mount+0xe3e/0x14d0 [ 1559.598892][T24226] ? _copy_from_user+0x93/0xf0 [ 1559.603677][T24226] __x64_sys_mount+0x12b/0x1a0 [ 1559.608587][T24226] do_syscall_64+0xc7/0x390 [ 1559.613371][T24226] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1559.619365][T24226] RIP: 0033:0x45f29a [ 1559.623712][T24226] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1559.645906][T24226] RSP: 002b:00007f3d0323ca68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1559.654759][T24226] RAX: ffffffffffffffda RBX: 00007f3d0323d6d4 RCX: 000000000045f29a [ 1559.663575][T24226] RDX: 00007f3d0323cae0 RSI: 0000000020000040 RDI: 00007f3d0323cb00 [ 1559.678220][T24226] RBP: 000000000076bf00 R08: 00007f3d0323cb40 R09: 00007f3d0323cae0 [ 1559.686266][T24226] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 1559.694243][T24226] R13: 0000000000000bde R14: 00000000004cdfe9 R15: 0000000000000031 [ 1559.717773][T24228] jfs: Unrecognized mount option "hash" or missing value 14:10:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSBRK(r0, 0x5427) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r1, 0x541e, &(0x7f0000000300)={0x4, 0x4, 0x10000, 0xfffffff9, 0x9f91, 0x4, 0x9, 0x10001, 0x0, 0x1, 0x1, 0x3, 0x9, 0x1ff, &(0x7f0000000280)=""/84, 0x3, 0x0, 0x100}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r5, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x7a, &(0x7f0000000080)={r8, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000140)={r8, @in={{0x2, 0x4e22, @loopback}}, 0x6, 0x7ff, 0x8, 0xfffffe00, 0x4}, &(0x7f0000000200)=0x98) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f00000000c0)={0x0, 0x0, 0x3ff}) 14:10:52 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:10:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x20, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x20}}, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xd4, r2, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xfbc7}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'hsr0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x650f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xc534}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vxcan1\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0xd4}}, 0x80) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) [ 1559.874335][T24235] jfs: Unrecognized mount option "hash" or missing value [ 1559.930031][T24237] JFS: continue= is an invalid error handler 14:10:52 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x400000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1560.066910][T24242] JFS: continue= is an invalid error handler 14:10:52 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:10:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) [ 1560.313432][T24245] jfs: Unrecognized mount option "hash" or missing value [ 1560.435414][T24251] jfs: Unrecognized mount option "hash" or missing value 14:10:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x1280b, 0x0, 0xfffffffc, 0x0, 0x9, 0x0, 0x2}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x8) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$9p(r4, &(0x7f0000000100)="43d000fdc6dfc54770dd26", 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f00000000c0)) 14:10:52 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1560.494859][T24252] JFS: continue= is an invalid error handler 14:10:52 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1560.600777][T24255] JFS: continue= is an invalid error handler 14:10:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)={0x14, r2, 0xb03, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x118, r2, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x48, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffffe}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x10000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x48, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb2c0}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x24, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x4091}, 0xc0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:10:53 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xa, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:10:53 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1560.816045][T24263] jfs: Unrecognized mount option "hash" or missing value 14:10:53 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f00000000c0)={0x1, 0x2, 0x8}) [ 1560.981238][T24271] jfs: Unrecognized mount option "hash" or missing value [ 1560.991258][T24272] JFS: continue= is an invalid error handler 14:10:53 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:53 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:53 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x7, 0x400000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x7a, &(0x7f0000000080)={r4, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r4, 0x1, 0x2, 0x5, 0xb26a, 0xb0}, &(0x7f0000000180)=0x14) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r6) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r6, 0x80045400, &(0x7f00000000c0)) [ 1561.170349][T24279] JFS: continue= is an invalid error handler 14:10:53 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1561.402514][T24287] jfs: Unrecognized mount option "hash" or missing value 14:10:53 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1561.498624][T24293] JFS: continue= is an invalid error handler [ 1561.560894][T24295] jfs: Unrecognized mount option "hash" or missing value [ 1561.624669][T24298] JFS: continue= is an invalid error handler 14:10:54 executing program 1: semget(0x1, 0x4, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) pidfd_send_signal(0xffffffffffffffff, 0x36, &(0x7f00000000c0)={0xb, 0x9, 0x8000}, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:10:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x7, 0x400000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x7a, &(0x7f0000000080)={r4, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r4, 0x1, 0x2, 0x5, 0xb26a, 0xb0}, &(0x7f0000000180)=0x14) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r6) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r6, 0x80045400, &(0x7f00000000c0)) 14:10:54 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:54 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x48, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:10:54 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1561.936919][T24307] jfs: Unrecognized mount option "hash" or missing value [ 1561.961908][T24310] JFS: continue= is an invalid error handler [ 1562.120809][T24318] jfs: Unrecognized mount option "hash" or missing value [ 1562.129905][T24319] JFS: continue= is an invalid error handler 14:10:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffff7ffffffff}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x4, 0x48000) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x78) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000340)) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r5) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r3, &(0x7f0000000280)={0xa0, 0xffffffffffffffda, 0x8, {{0x3, 0x1, 0x8, 0x5, 0x6, 0x7, {0x4, 0x7fffffff, 0x200003f, 0x8000000, 0x4, 0x7fff, 0x8, 0x0, 0xf92, 0x9, 0xf8, r5, r6, 0x2, 0x3}}, {0x0, 0x18}}}, 0xa0) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r7, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r0, 0xc01064ab, &(0x7f0000000380)={0x2, 0x8529, 0x8}) 14:10:54 executing program 2: semget(0x1, 0x4, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) pidfd_send_signal(0xffffffffffffffff, 0x36, &(0x7f00000000c0)={0xb, 0x9, 0x8000}, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:10:54 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:54 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4c, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:10:54 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:54 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x8000, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r2}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f00000001c0)={0x6, 'veth0_virt_wifi\x00', {0x3ff}, 0x4}) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x8, 0x4a, 0x0, 0x3f, 0x0, 0xff, 0x8, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x5}, 0x42103, 0x7, 0xfffffffb, 0x9, 0x1000, 0x80000001, 0x9}, r2, 0xa, 0xffffffffffffffff, 0x9) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:10:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x7, 0x400000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x7a, &(0x7f0000000080)={r4, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r4, 0x1, 0x2, 0x5, 0xb26a, 0xb0}, &(0x7f0000000180)=0x14) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r6) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r6, 0x80045400, &(0x7f00000000c0)) 14:10:54 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1562.498128][T24332] JFS: continue= is an invalid error handler [ 1562.547835][T24335] jfs: Unrecognized mount option "hash" or missing value [ 1562.619430][T24341] JFS: continue= is an invalid error handler 14:10:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r1 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000040)) flock(r1, 0xc) [ 1562.756593][T24350] jfs: Unrecognized mount option "hash" or missing value 14:10:55 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x60, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:10:55 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:10:55 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) 14:10:55 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1563.139996][T24363] jfs: Unrecognized mount option "hash" or missing value [ 1563.191798][T24373] FAULT_INJECTION: forcing a failure. [ 1563.191798][T24373] name failslab, interval 1, probability 0, space 0, times 0 [ 1563.226424][T24373] CPU: 0 PID: 24373 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1563.235804][T24373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1563.246933][T24373] Call Trace: [ 1563.250600][T24373] dump_stack+0x11d/0x187 [ 1563.254956][T24373] should_fail.cold+0x5/0xf [ 1563.259475][T24373] __should_failslab+0x82/0xb0 [ 1563.264240][T24373] should_failslab+0x5/0xf [ 1563.268663][T24373] __kmalloc+0x54/0x640 [ 1563.272834][T24373] ? tomoyo_realpath_from_path+0x85/0x3d0 [ 1563.278667][T24373] tomoyo_realpath_from_path+0x85/0x3d0 [ 1563.284314][T24373] tomoyo_path_number_perm+0xff/0x360 14:10:55 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xfffffffffffffffd, r2, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r5 = dup2(r4, r3) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r6, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r7 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r7}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x7, 0x20, 0xc0, 0x1, 0x0, 0x1f, 0x40000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xb75, 0x0, @perf_config_ext={0x80000001, 0xfffffffffffffe00}, 0x10001, 0x6, 0x6, 0x2, 0x100000001, 0x80, 0xffe1}, r7, 0x8, 0xffffffffffffffff, 0x1) ioctl$VT_DISALLOCATE(r6, 0x5608) [ 1563.290124][T24373] ? _parse_integer+0x12f/0x150 [ 1563.295773][T24373] ? __fget_files+0xa2/0x1c0 [ 1563.300409][T24373] tomoyo_file_ioctl+0x28/0x40 [ 1563.305413][T24373] security_file_ioctl+0x69/0xa0 [ 1563.311530][T24373] ksys_ioctl+0x5a/0x150 [ 1563.315803][T24373] __x64_sys_ioctl+0x47/0x60 [ 1563.320816][T24373] do_syscall_64+0xc7/0x390 [ 1563.325348][T24373] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1563.331252][T24373] RIP: 0033:0x45c849 [ 1563.335268][T24373] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1563.358445][T24373] RSP: 002b:00007fc4e1da3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1563.367356][T24373] RAX: ffffffffffffffda RBX: 00007fc4e1da46d4 RCX: 000000000045c849 [ 1563.375360][T24373] RDX: 0000000020000000 RSI: 0000000000005609 RDI: 0000000000000003 [ 1563.383344][T24373] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1563.391324][T24373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1563.399677][T24373] R13: 0000000000000372 R14: 00000000004c5e44 R15: 0000000000000000 14:10:55 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:55 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000040)) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000000c0)={0x80000001, 0x0, 0x2, 0x50}) r4 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r4, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) ioctl$IMGETCOUNT(r4, 0x80044943, &(0x7f0000000140)) r5 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x40, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f00000001c0)='htcp\x00', 0x5) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000100)={0xfffffffffffffe01, r3}) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r6, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) 14:10:55 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x68, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1563.486396][T24373] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1563.524096][T24376] jfs: Unrecognized mount option "hash" or missing value 14:10:55 executing program 2 (fault-call:1 fault-nth:1): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:10:55 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1563.726265][T24387] FAULT_INJECTION: forcing a failure. [ 1563.726265][T24387] name failslab, interval 1, probability 0, space 0, times 0 [ 1563.747541][T24387] CPU: 1 PID: 24387 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1563.757020][T24387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1563.767596][T24387] Call Trace: [ 1563.771061][T24387] dump_stack+0x11d/0x187 [ 1563.775419][T24387] should_fail.cold+0x5/0xf [ 1563.779967][T24387] __should_failslab+0x82/0xb0 [ 1563.784769][T24387] should_failslab+0x5/0xf [ 1563.789191][T24387] __kmalloc+0x54/0x640 [ 1563.793445][T24387] ? tomoyo_encode2.part.0+0xd0/0x240 [ 1563.798855][T24387] tomoyo_encode2.part.0+0xd0/0x240 [ 1563.804094][T24387] tomoyo_encode+0x32/0x50 [ 1563.808519][T24387] tomoyo_realpath_from_path+0x11e/0x3d0 [ 1563.814199][T24387] tomoyo_path_number_perm+0xff/0x360 [ 1563.819572][T24387] ? _parse_integer+0x12f/0x150 [ 1563.824477][T24387] ? __fget_files+0xa2/0x1c0 [ 1563.829097][T24387] tomoyo_file_ioctl+0x28/0x40 [ 1563.834178][T24387] security_file_ioctl+0x69/0xa0 [ 1563.839140][T24387] ksys_ioctl+0x5a/0x150 [ 1563.843448][T24387] __x64_sys_ioctl+0x47/0x60 [ 1563.848108][T24387] do_syscall_64+0xc7/0x390 [ 1563.853740][T24387] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1563.859647][T24387] RIP: 0033:0x45c849 [ 1563.863550][T24387] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1563.883162][T24387] RSP: 002b:00007fc4e1da3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1563.891641][T24387] RAX: ffffffffffffffda RBX: 00007fc4e1da46d4 RCX: 000000000045c849 [ 1563.899623][T24387] RDX: 0000000020000000 RSI: 0000000000005609 RDI: 0000000000000003 [ 1563.907594][T24387] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1563.915570][T24387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 14:10:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_settime(0x3, &(0x7f00000000c0)={0x0, 0x1c9c380}) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:10:56 executing program 2 (fault-call:1 fault-nth:2): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1563.923549][T24387] R13: 0000000000000372 R14: 00000000004c5e44 R15: 0000000000000001 [ 1563.935235][T24387] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1564.043453][T24391] jfs: Unrecognized mount option "hash" or missing value [ 1564.089695][T24399] FAULT_INJECTION: forcing a failure. [ 1564.089695][T24399] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.089715][T24399] CPU: 1 PID: 24399 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1564.089724][T24399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1564.089729][T24399] Call Trace: [ 1564.089757][T24399] dump_stack+0x11d/0x187 14:10:56 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6c, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:10:56 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f00000000c0)={"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"}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1564.089788][T24399] should_fail.cold+0x5/0xf [ 1564.089854][T24399] __should_failslab+0x82/0xb0 [ 1564.089871][T24399] should_failslab+0x5/0xf [ 1564.089888][T24399] __kmalloc+0x54/0x640 [ 1564.089908][T24399] ? vc_do_resize+0x1b6/0xcd0 [ 1564.089935][T24399] vc_do_resize+0x1b6/0xcd0 14:10:56 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1564.089958][T24399] ? tomoyo_path_number_perm+0x306/0x360 [ 1564.090005][T24399] ? apparmor_capable+0x25a/0x470 [ 1564.090029][T24399] ? security_capable+0x8a/0xa0 [ 1564.090053][T24399] ? preempt_count_add+0x63/0x90 [ 1564.090076][T24399] vc_resize+0x3e/0x50 [ 1564.090096][T24399] vt_ioctl+0xc0b/0x1c30 [ 1564.090120][T24399] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1564.090166][T24399] ? complete_change_console+0x1f0/0x1f0 [ 1564.090188][T24399] tty_ioctl+0x8de/0xd80 [ 1564.090208][T24399] ? do_vfs_ioctl+0x3a4/0xd00 [ 1564.090231][T24399] ? tomoyo_file_ioctl+0x30/0x40 [ 1564.090252][T24399] ? tty_vhangup+0x30/0x30 [ 1564.090269][T24399] ksys_ioctl+0x101/0x150 [ 1564.090303][T24399] __x64_sys_ioctl+0x47/0x60 [ 1564.090369][T24399] do_syscall_64+0xc7/0x390 [ 1564.090393][T24399] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1564.090406][T24399] RIP: 0033:0x45c849 [ 1564.090488][T24399] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1564.090497][T24399] RSP: 002b:00007fc4e1da3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1564.090513][T24399] RAX: ffffffffffffffda RBX: 00007fc4e1da46d4 RCX: 000000000045c849 [ 1564.090523][T24399] RDX: 0000000020000000 RSI: 0000000000005609 RDI: 0000000000000003 [ 1564.090532][T24399] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1564.090542][T24399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1564.090551][T24399] R13: 0000000000000372 R14: 00000000004c5e44 R15: 0000000000000002 [ 1564.217446][T24401] jfs: Unrecognized mount option "hash" or missing value 14:10:56 executing program 2 (fault-call:1 fault-nth:3): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1564.475459][T24415] FAULT_INJECTION: forcing a failure. [ 1564.475459][T24415] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.475480][T24415] CPU: 1 PID: 24415 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1564.475489][T24415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1564.475494][T24415] Call Trace: [ 1564.475522][T24415] dump_stack+0x11d/0x187 [ 1564.475547][T24415] should_fail.cold+0x5/0xf [ 1564.475575][T24415] __should_failslab+0x82/0xb0 [ 1564.475592][T24415] should_failslab+0x5/0xf [ 1564.475675][T24415] __kmalloc+0x54/0x640 [ 1564.475696][T24415] ? vc_do_resize+0x1b6/0xcd0 [ 1564.475717][T24415] ? notifier_call_chain+0x12f/0x160 [ 1564.475737][T24415] ? __rcu_read_unlock+0x66/0x2f0 [ 1564.475763][T24415] vc_do_resize+0x1b6/0xcd0 [ 1564.475810][T24415] vc_resize+0x3e/0x50 [ 1564.475855][T24415] vt_ioctl+0xc0b/0x1c30 [ 1564.475881][T24415] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1564.475905][T24415] ? complete_change_console+0x1f0/0x1f0 [ 1564.475927][T24415] tty_ioctl+0x8de/0xd80 [ 1564.475947][T24415] ? do_vfs_ioctl+0x3a4/0xd00 [ 1564.475995][T24415] ? tomoyo_file_ioctl+0x30/0x40 [ 1564.476017][T24415] ? tty_vhangup+0x30/0x30 [ 1564.476035][T24415] ksys_ioctl+0x101/0x150 [ 1564.476056][T24415] __x64_sys_ioctl+0x47/0x60 [ 1564.476079][T24415] do_syscall_64+0xc7/0x390 [ 1564.476102][T24415] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1564.476115][T24415] RIP: 0033:0x45c849 [ 1564.476172][T24415] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1564.476181][T24415] RSP: 002b:00007fc4e1da3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1564.476197][T24415] RAX: ffffffffffffffda RBX: 00007fc4e1da46d4 RCX: 000000000045c849 [ 1564.476206][T24415] RDX: 0000000020000000 RSI: 0000000000005609 RDI: 0000000000000003 [ 1564.476216][T24415] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1564.476225][T24415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1564.476235][T24415] R13: 0000000000000372 R14: 00000000004c5e44 R15: 0000000000000003 14:10:57 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:57 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x74, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:10:57 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:10:57 executing program 2 (fault-call:1 fault-nth:4): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1565.112782][T24422] FAULT_INJECTION: forcing a failure. [ 1565.112782][T24422] name failslab, interval 1, probability 0, space 0, times 0 [ 1565.112806][T24422] CPU: 0 PID: 24422 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 1565.112821][T24422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1565.112826][T24422] Call Trace: [ 1565.112856][T24422] dump_stack+0x11d/0x187 [ 1565.112881][T24422] should_fail.cold+0x5/0xf [ 1565.112986][T24422] __should_failslab+0x82/0xb0 [ 1565.113004][T24422] should_failslab+0x5/0xf [ 1565.113020][T24422] __kmalloc+0x54/0x640 [ 1565.113039][T24422] ? vc_do_resize+0x1b6/0xcd0 [ 1565.113060][T24422] ? notifier_call_chain+0x12f/0x160 [ 1565.113080][T24422] ? __rcu_read_unlock+0x66/0x2f0 [ 1565.113105][T24422] vc_do_resize+0x1b6/0xcd0 [ 1565.113217][T24422] vc_resize+0x3e/0x50 [ 1565.113310][T24422] vt_ioctl+0xc0b/0x1c30 [ 1565.113337][T24422] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1565.113360][T24422] ? complete_change_console+0x1f0/0x1f0 [ 1565.113381][T24422] tty_ioctl+0x8de/0xd80 [ 1565.113400][T24422] ? do_vfs_ioctl+0x3a4/0xd00 [ 1565.113424][T24422] ? tomoyo_file_ioctl+0x30/0x40 [ 1565.113480][T24422] ? tty_vhangup+0x30/0x30 [ 1565.113496][T24422] ksys_ioctl+0x101/0x150 [ 1565.113515][T24422] __x64_sys_ioctl+0x47/0x60 [ 1565.113535][T24422] do_syscall_64+0xc7/0x390 [ 1565.113626][T24422] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1565.113644][T24422] RIP: 0033:0x45c849 [ 1565.113666][T24422] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1565.113674][T24422] RSP: 002b:00007fc4e1da3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1565.113759][T24422] RAX: ffffffffffffffda RBX: 00007fc4e1da46d4 RCX: 000000000045c849 [ 1565.113832][T24422] RDX: 0000000020000000 RSI: 0000000000005609 RDI: 0000000000000003 [ 1565.113842][T24422] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1565.113851][T24422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1565.113860][T24422] R13: 0000000000000372 R14: 00000000004c5e44 R15: 0000000000000004 [ 1565.119090][T24427] jfs: Unrecognized mount option "hash" or missing value 14:10:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:10:57 executing program 2 (fault-call:1 fault-nth:5): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:10:57 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:10:57 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1565.540701][T24438] jfs: Unrecognized mount option "hash" or missing value 14:10:57 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x7a, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:10:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x400000800000000, 0x6}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORUNLOCK(r5, 0x5381) ioctl$TIOCPKT(r2, 0x5420, &(0x7f00000000c0)=0x8) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r6, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000440)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r7 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r7, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f0000000500)={0x0, 0x6}, &(0x7f0000000540)=0x8) r9 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r9, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r9, 0x84, 0x1f, &(0x7f0000000580)={r8, @in={{0x2, 0x4e22, @broadcast}}, 0x201, 0x5}, 0x90) 14:10:58 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:10:58 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:58 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x23, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:58 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1565.906216][T24456] jfs: Unrecognized mount option "hash" or missing value 14:10:58 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x300, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:10:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$netlink(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)={0x14, r3, 0xb03, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x180, r3, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x88, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x98}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xe4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x47}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe541}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x127}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffff00}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffd6a7}]}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x80}, 0x4000001) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1566.070663][T24466] jfs: Unrecognized mount option "hash" or missing value 14:10:58 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b2f, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:10:58 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1566.232508][T24471] JFS: continue= is an invalid error handler 14:10:58 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:58 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b30, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1566.388172][T24479] JFS: continue= is an invalid error handler 14:10:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$SNDCTL_DSP_SETTRIGGER(r1, 0x40045010, &(0x7f00000000c0)=0x5) 14:10:58 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:58 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x500, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1566.498913][T24484] jfs: Unrecognized mount option "hash" or missing value 14:10:58 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b31, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1566.600903][T24489] jfs: Unrecognized mount option "hash" or missing value 14:10:58 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b32, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:10:58 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1566.745501][T24499] JFS: continue= is an invalid error handler 14:10:59 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:10:59 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b33, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1566.956651][T24509] JFS: continue= is an invalid error handler 14:10:59 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b34, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1567.000371][T24505] jfs: Unrecognized mount option "hash" or missing value 14:10:59 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b35, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:10:59 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x600, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1567.146565][T24517] jfs: Unrecognized mount option "hash" or missing value 14:10:59 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b36, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:10:59 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1567.292356][T24523] JFS: continue= is an invalid error handler 14:10:59 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:10:59 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b37, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:10:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r2, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f0000000100)={0x0, 'syz0\x00'}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8982, &(0x7f00000000c0)={0x7, 'ip6gretap0\x00', {0x3f79}, 0x8}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r3 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r3, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) ioctl$SIOCX25SENDCALLACCPT(r3, 0x89e9) getgid() [ 1567.432115][T24530] JFS: continue= is an invalid error handler [ 1567.448779][T24533] jfs: Unrecognized mount option "hash" or missing value 14:10:59 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b3a, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:10:59 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x700, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1567.650957][T24540] jfs: Unrecognized mount option "hash" or missing value 14:11:00 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:00 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:00 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b3b, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1567.836255][T24545] JFS: continue= is an invalid error handler 14:11:00 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b3c, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1568.026494][T24552] JFS: continue= is an invalid error handler [ 1568.032747][T24554] jfs: Unrecognized mount option "hash" or missing value 14:11:00 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x20200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = msgget$private(0x0, 0x204) msgctl$IPC_STAT(r0, 0x2, 0x0) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000100)=""/102) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:00 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xa00, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1568.246928][T24561] jfs: Unrecognized mount option "hash" or missing value [ 1568.311236][T24566] JFS: continue= is an invalid error handler 14:11:00 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:00 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b3d, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:00 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1568.489317][T24573] JFS: continue= is an invalid error handler [ 1568.590492][T24577] jfs: Unrecognized mount option "hash" or missing value 14:11:00 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b40, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:00 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xfbc, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1568.774080][T24582] jfs: Unrecognized mount option "hash" or missing value 14:11:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r1, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) r9 = getgid() fchownat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', r8, r9, 0x1000) write$FUSE_ENTRY(r4, &(0x7f00000000c0)={0x90, 0xffffffffffffffda, 0x6, {0x0, 0x0, 0xffff, 0x4, 0x8000, 0x7fff, {0x2, 0xff, 0x7, 0x8001, 0x9, 0xe6, 0x800, 0x9, 0x0, 0xffffffc1, 0x4, r6, r9, 0x6, 0x9}}}, 0x90) 14:11:01 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:01 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b41, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:01 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:01 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:01 executing program 3: uname(&(0x7f00000000c0)=""/31) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:01 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b44, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:01 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1569.170237][T24602] jfs: Unrecognized mount option "hash" or missing value 14:11:01 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:01 executing program 3: lsetxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="0400dd15b0a2dce2f2"], 0x9, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:01 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1569.356658][T24614] jfs: Unrecognized mount option "hash" or missing value 14:11:01 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:01 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000280)={0x2, &(0x7f0000000200)=[{0x2c84, 0x5, 0xc, 0x3f}, {0xacd, 0x0, 0x20, 0x9}]}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000000c0)=0x0) r5 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r5, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000180)=0x410052) setsockopt$inet_udp_int(r5, 0x11, 0x65, &(0x7f0000000100)=0xfffffff6, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x20, 0x0, 0x0, 0x6, 0x0, 0xffffffff}, r4, 0xfffffffeffffffff, 0xffffffffffffffff, 0x0) r7 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r7) ioctl$VHOST_SET_FEATURES(r7, 0x4008af00, &(0x7f0000000140)=0x1d) ioctl$KDGKBENT(0xffffffffffffffff, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:01 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b47, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:01 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:01 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1569.624551][T24630] jfs: Unrecognized mount option "hash" or missing value 14:11:01 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b48, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1569.789812][T24640] jfs: Unrecognized mount option "hash" or missing value 14:11:02 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:02 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:02 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:02 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:02 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b4a, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:02 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1570.108670][T24654] jfs: Unrecognized mount option "hash" or missing value 14:11:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x40050d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}, 0x8104, 0x0, 0x0, 0x5, 0x0, 0x4}, 0x0, 0xd, 0xffffffffffffffff, 0x8) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1570.232884][T24661] jfs: Unrecognized mount option "hash" or missing value 14:11:02 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b4b, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:02 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1fb5d423b0c7bd5b) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000000c0)=0x4) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:02 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x40000800, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:02 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2010, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:02 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:02 executing program 3: r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x7a, &(0x7f0000000080)={r3, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r3, 0x80000001}, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r4, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:02 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b4c, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1570.602168][T24679] jfs: Unrecognized mount option "hash" or missing value 14:11:03 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b4d, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x160) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x80000, 0x0) [ 1570.869753][T24693] jfs: Unrecognized mount option "hash" or missing value 14:11:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = shmget$private(0x0, 0x2000, 0x40, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(r1, 0xb) 14:11:03 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfbc, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:03 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b4e, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:03 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x80, 0x3}) 14:11:03 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:03 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:03 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b52, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1571.300938][T24718] jfs: Unrecognized mount option "hash" or missing value 14:11:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x60, 0x0, 0x304, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}, @NL80211_ATTR_REG_RULES={0x24, 0x22, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xffffffff}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x1}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x5}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x1009}]}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_RULES={0xc, 0x22, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x3}]}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x6080}, 0x40c08cd) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:03 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1571.547436][T24728] jfs: Unrecognized mount option "hash" or missing value 14:11:03 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b60, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:03 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1f00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:03 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1571.700886][T24734] JFS: continue= is an invalid error handler 14:11:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3c, 0x7}, 0xa0c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) socket$unix(0x1, 0x1, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/vmstat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000140)={0x0, 0x7, 0x80000001, 0x70, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r1, 0xc01064b3, &(0x7f0000000180)={r2}) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r0, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r4, 0x8010aa01, &(0x7f00000000c0)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002a00)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r6, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000002a40)={0x1c, r7, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE_ASSOC_RESP={0x8, 0x80, '\"'}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r5, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r7, 0x300, 0x70bd2b, 0x25dfdbfc, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x2}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x80c0}, 0x20000000) [ 1571.855844][T24743] JFS: continue= is an invalid error handler [ 1571.858519][T24745] jfs: Unrecognized mount option "hash" or missing value 14:11:04 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b61, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:04 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:04 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4800, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r1 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="00fb2104bf5643f416616c2e9992a45881d1f579c7b51a74aee03bd1e01c6df9a3"], 0x21, 0x3) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000200)) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r1, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) ioctl$SNDRV_PCM_IOCTL_DROP(r1, 0x4143, 0x0) [ 1572.030261][T24751] jfs: Unrecognized mount option "hash" or missing value 14:11:04 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b62, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:04 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1572.211030][T24761] JFS: continue= is an invalid error handler 14:11:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)) r1 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r1}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000100)={{0x9, 0x0, 0x200, 0x8001, '\x00', 0x4}, 0x1, 0x4, 0x4d0b, r1, 0x1, 0x4, 'syz0\x00', &(0x7f00000000c0)=['{GPLselfcgroup\x00'], 0xf, [], [0x2, 0xfff, 0x7, 0x1]}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r2, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_IRQP_SET(r3, 0x4008700c, 0x1a95) 14:11:04 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:04 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b63, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:04 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x18, 0x1407, 0x100, 0x70bd25, 0x25dfdbfb, "", [@RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r2}]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x240000c0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) [ 1572.360773][T24771] JFS: continue= is an invalid error handler [ 1572.467534][T24770] jfs: Unrecognized mount option "hash" or missing value 14:11:04 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:04 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2300, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1572.667342][T24786] jfs: Unrecognized mount option "hash" or missing value 14:11:04 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b64, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:05 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) write$FUSE_IOCTL(r0, &(0x7f0000000140)={0x20, 0x0, 0x5, {0x4, 0x4, 0xc3}}, 0x20) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r2) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x1000, 0x5c93, 0x8, 0x2}}) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x80, 0x0) ioctl$SNDRV_PCM_IOCTL_LINK(r2, 0x40044160, &(0x7f0000000100)=0xfff) [ 1572.762902][T24790] JFS: continue= is an invalid error handler 14:11:05 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r2}, 0x0) sched_getparam(r2, &(0x7f00000000c0)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x80240, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast1}}, {}, r5}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r5, 0x1}}, 0x18) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:05 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:05 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:05 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b65, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1572.965503][T24805] JFS: continue= is an invalid error handler [ 1572.989399][T24803] jfs: Unrecognized mount option "hash" or missing value 14:11:05 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:05 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b66, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f00000000c0)={0x100, 0x1}) 14:11:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x618040) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000040)) r3 = fcntl$dupfd(r2, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_pts(r3, 0x400000) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x63) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="6400000010001fff0000000000000000c10000004ad7f241f6fc403bd2a1d0597110c6d62a088bf206316f9128849149eba3a2926fcb329f556e02c6dc0df8af08e9225ca69c491689e4802dee1847f0ca46b850604ca834dee78dc155433298de77c42a5f26970cce4a5c7673ceee375995dd35b19b0632cbf9d3ebddafc63d93da473ffb255a2c38a04cd54fb9614fe9c446e2c6743cce2fccf332ea32f3f668e8536402087654b31aa3e07d08c589f69d582408114e87e7e679f178d4db29c0de35d9cf04bc84376e1b28469ba102f6ffdad0a0e9d26eb95a2d273d1c4ff25c3295eeae08a37dcc1054a061ceddd7443b8b3f7556cd4a12", @ANYRES32=0x0, @ANYBLOB="0000010000000000440012800b00010069703667726500003400028014000600fe8000000000000000000000000000bb14000700ff02000000000000000000000000000108000100", @ANYRES32=r4, @ANYBLOB], 0x64}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00', r4}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="14010000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fddbdf2504000000280001800800030004000000140002006d616373656330000000000000000000080003000100000020000180140002007465616d5f736c6176655f300000000008000300020000002c00018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="1c0001800800030003000000080003000200000008000300020000007000018008000300030000001400020069703665727370616e3000000000000008000300010000001400020074756e6c300000000000000000000000080003000100000008000100", @ANYRES32=r5, @ANYBLOB="08000300030000001400020069703665727370616e300000030002000000000000000000"], 0x114}, 0x1, 0x0, 0x0, 0xc001}, 0x20000000) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcsu\x00', 0x84100, 0x0) close(r6) ioctl$TIOCL_SCROLLCONSOLE(r6, 0x541c, &(0x7f00000000c0)) r7 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r7, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) getsockopt$inet_mreqsrc(r7, 0x0, 0x26, &(0x7f0000000100)={@empty, @local, @multicast1}, &(0x7f0000000140)=0xc) [ 1573.226488][T24818] jfs: Unrecognized mount option "hash" or missing value 14:11:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x9}, 0x208c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:05 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:05 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:05 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b67, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x10918, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000100}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:05 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1573.536817][T24842] jfs: Unrecognized mount option "hash" or missing value 14:11:05 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f00000004c0)={0x1, 0x1, 0x335, 0x10, 0x115, &(0x7f00000000c0)}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:05 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6800, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:05 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b68, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1573.679730][T24853] jfs: Unrecognized mount option "hash" or missing value 14:11:06 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:06 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:06 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b69, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1574.041834][T24868] jfs: Unrecognized mount option "hash" or missing value 14:11:06 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b6a, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:06 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1574.211055][T24876] jfs: Unrecognized mount option "hash" or missing value 14:11:06 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:06 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b6b, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:06 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:06 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:06 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1574.607072][T24894] jfs: Unrecognized mount option "hash" or missing value 14:11:06 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x7400, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:07 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1574.772063][T24900] jfs: Unrecognized mount option "hash" or missing value 14:11:07 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b6d, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:07 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xbc0f0000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:07 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:07 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b70, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1575.119772][T24914] jfs: Unrecognized mount option "hash" or missing value 14:11:07 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:07 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b71, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1575.324387][T24924] jfs: Unrecognized mount option "hash" or missing value 14:11:07 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xbc0f, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:07 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b72, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:07 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:07 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4bfa, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:07 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:07 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xbc0f, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1575.649119][T24938] jfs: Unrecognized mount option "hash" or missing value 14:11:08 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4bfb, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1575.775393][T24945] jfs: Unrecognized mount option "hash" or missing value 14:11:08 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xff00, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:08 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4c01, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xedc0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:08 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5409, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1576.171261][T24961] jfs: Unrecognized mount option "hash" or missing value 14:11:08 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xff0f, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1576.364686][T24972] jfs: Unrecognized mount option "hash" or missing value 14:11:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xff00, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:08 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x540b, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:08 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x80040, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:08 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x540c, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1576.792824][T24986] jfs: Unrecognized mount option "hash" or missing value 14:11:09 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:09 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x540d, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1576.962765][T24993] jfs: Unrecognized mount option "hash" or missing value 14:11:09 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x400000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:09 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:09 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x540e, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:09 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x540f, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1577.348807][T25010] jfs: Unrecognized mount option "hash" or missing value 14:11:09 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x80040, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:09 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:09 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5410, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1577.470493][T25014] jfs: Unrecognized mount option "hash" or missing value 14:11:09 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:09 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:10 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5413, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:10 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1577.836819][T25027] jfs: Unrecognized mount option "hash" or missing value 14:11:10 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:10 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5414, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1577.996605][T25036] jfs: Unrecognized mount option "hash" or missing value 14:11:10 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1578.101609][T25041] JFS: continue= is an invalid error handler 14:11:10 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xff000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:10 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5415, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1578.238644][T25046] JFS: continue= is an invalid error handler 14:11:10 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5416, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1578.356638][T25052] jfs: Unrecognized mount option "hash" or missing value 14:11:10 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5418, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:10 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:10 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1578.465395][T25059] jfs: Unrecognized mount option "hash" or missing value 14:11:10 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x541b, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:10 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xff0f0000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1578.611390][T25064] JFS: continue= is an invalid error handler 14:11:11 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x541c, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1578.793843][T25072] jfs: Unrecognized mount option "hash" or missing value [ 1578.803293][T25074] JFS: continue= is an invalid error handler 14:11:11 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:11 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x541d, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:11 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1578.973822][T25081] jfs: Unrecognized mount option "hash" or missing value 14:11:11 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x541e, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:11 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1579.135314][T25087] JFS: continue= is an invalid error handler 14:11:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002a00)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000002a40)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE_ASSOC_RESP={0x8, 0x80, '\"'}]}, 0x1c}}, 0x0) r4 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x2000) shmdt(r4) shmdt(r4) sendmsg$NL80211_CMD_NEW_KEY(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r3, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@NL80211_ATTR_KEY={0x44, 0x50, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "3bc808fb94bc03c20ee7741949"}, @NL80211_KEY_TYPE={0x8, 0x7, 0x2}, @NL80211_KEY_DEFAULT_TYPES={0x1c, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x4851) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$NL80211_CMD_STOP_AP(r5, &(0x7f0000000600)={&(0x7f0000000200), 0xc, &(0x7f00000005c0)={&(0x7f0000000240)={0x358, r3, 0x209, 0x70bd2c, 0x25dfdbfc, {}, [@NL80211_ATTR_SSID={0x7, 0x34, "9d32af"}, @NL80211_ATTR_IE_PROBE_RESP={0x26f, 0x7f, "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"}, @NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x7f}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x100}, @NL80211_ATTR_TX_RATES={0xb4, 0x5a, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x60, 0x2, [@NL80211_TXRATE_LEGACY={0x1b, 0x1, "5d9c733e5db032eeac08bf4a6be32b8997aa1577d8f6fe"}, @NL80211_TXRATE_HT={0x2b, 0x2, "c7d922130f0830beb87f6f3e61110b024bdaabe44a0a68226c9370fcf60d33c8b81e89e4e3ed97"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xf6, 0x1, 0x9, 0x9, 0x0, 0x2, 0x4, 0xffff]}}]}, @NL80211_BAND_2GHZ={0x50, 0x0, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x1a, 0x1, "1201397c5854eb7a0fc1971fbf11e0b8a41f496ca375"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x1e, 0x2, "cc56a9c837cc0283a73b8a2e91c736c151bd5ab749d480a53934"}]}]}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x91}]}, 0x358}, 0x1, 0x0, 0x0, 0x200040c1}, 0x10) 14:11:11 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1579.230330][T25091] JFS: continue= is an invalid error handler 14:11:11 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x541e, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:11 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1579.400253][T25099] jfs: Unrecognized mount option "hash" or missing value 14:11:11 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:11 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5421, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1579.571445][T25105] jfs: Unrecognized mount option "hash" or missing value [ 1579.592838][T25107] JFS: continue= is an invalid error handler 14:11:11 executing program 3: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000000c0)={0x1ff, 0x2}) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:12 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1579.763508][T25115] JFS: continue= is an invalid error handler 14:11:12 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5422, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x84000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x80}, 0x51018, 0x0, 0xffffffff, 0x8}, 0x0, 0xffffffffdfffffff, 0xffffffffffffffff, 0x6) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:12 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:12 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x5000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1579.992108][T25121] jfs: Unrecognized mount option "hash" or missing value 14:11:12 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5423, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10400, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x2000, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_subtree(r3, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) dup(r4) sendmsg$can_j1939(r0, &(0x7f0000000700)={&(0x7f0000000580)={0x1d, 0x0, 0x2, {0x2, 0x1, 0x2}, 0xff}, 0x18, &(0x7f00000006c0)={&(0x7f00000005c0)="7e7187aa3eba322c00912a6b56af70deba538d3e3fe794aa7f98ced38f62daa84c767646a36d847743c158af32fd531742d5ca7ebea4d60e0c07d27eb940a8b87f70c23112c83e68d57f4abab3c3cd7307e3851226381e5422fe4f2f210a76a42d8b67fef0833d48268b4848a990530028efda9d11d9bd077181e6e89d2659b5c7c8e3a37d5316583697ad7f969d1d1941dd68924d6be17638ab9f5d86ba16d86c1854271b30ff0b8debdd2874dc93ce162fdc1eafb6eb19a3417a8c87f5fe2ea47f", 0xc2}, 0x1, 0x0, 0x0, 0x4}, 0x4004) syz_open_dev$tty20(0xc, 0x4, 0x1) [ 1580.087751][T25129] JFS: continue= is an invalid error handler 14:11:12 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5424, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1580.143631][T25134] jfs: Unrecognized mount option "hash" or missing value 14:11:12 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1580.281129][T25140] JFS: continue= is an invalid error handler 14:11:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r1, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) getpeername$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c) 14:11:12 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5425, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:12 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:12 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:12 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5427, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1580.579832][T25151] jfs: Unrecognized mount option "hash" or missing value 14:11:12 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5428, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) readahead(r0, 0xfffffffffffffffc, 0x8000) [ 1580.712543][T25161] JFS: continue= is an invalid error handler 14:11:13 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5429, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:13 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1580.822657][T25170] jfs: Unrecognized mount option "hash" or missing value [ 1580.877309][T25174] JFS: continue= is an invalid error handler 14:11:13 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:13 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002a00)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000000900)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000e0000000800800022000000e92401fe03c484e096c557d3427ef20acb93cef9dd4b49c06127bbf879be559507d5166f8eeb1af49218bb0dad26e33327829f299527632a589e30e995b8083ab3abc71d6074d2e120e2da50a02db9f835a8025dfd5fd8fb6a3709b33060bb974df1ea7b5cae310bdcb79106c2adde62d50f0f367ddf42d62ba19604e83d5169d8f1f6fbcd5ad0bf82737ad1cddad7b0867a0b48d0e10cd4bb0021915788f2fd116d1948336fcf0ee6943acd021e4e5f7117c4b9fefd01a065"], 0x1c}}, 0x0) r4 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r4, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r5 = accept$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000780)=0x14) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000000700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000a00)={0x604, r3, 0x20, 0x70bd2a, 0x25dfdbfb, {}, [@NL80211_ATTR_TX_RATES={0x370, 0x5a, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x70, 0x2, [@NL80211_TXRATE_LEGACY={0x5, 0x1, "f2"}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x1f, 0x1, "962416544e4960312d478fd2efc3fa205425eec54417cf9ea15ec7"}, @NL80211_TXRATE_HT={0x2c, 0x2, "88925d2be1117ab63fcbce6e9c85d729b4d44fb518a156a26cbe1c33f32a4688ec8baa095e4880b9"}, @NL80211_TXRATE_HT={0x5, 0x2, '8'}, @NL80211_TXRATE_GI={0x5, 0x4, 0x8dde4db1cabe2cae}]}, @NL80211_BAND_6GHZ={0x7c, 0x3, [@NL80211_TXRATE_LEGACY={0x24, 0x1, "c90b2d7e950052e80dab2146263f9e53fd596350dcd25feee312555bc6433457"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0xe, 0x2, "5eb4da433752ec9fcb72"}, @NL80211_TXRATE_HT={0x39, 0x2, "20fc70ec7cf19f186b86fc0c757425be44bdff6806c492386fd41f9c22f2f0378666654689da63932b029bc0a34272ed0f25ed00e8"}]}, @NL80211_BAND_6GHZ={0x5c, 0x3, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x2, 0x7, 0x4, 0x1cc9, 0x8, 0xfffc, 0xf64]}}, @NL80211_TXRATE_HT={0x28, 0x2, "664c79fafc7fd7a3b8c61f41120f2aa855784c0994dc9f60ceb9720cfe85907d5d0c37b2"}, @NL80211_TXRATE_HT={0x1a, 0x2, "3c1d0808ca153194a09805b864de963ca57dd3ee379a"}]}, @NL80211_BAND_2GHZ={0x7c, 0x0, [@NL80211_TXRATE_LEGACY={0x1a, 0x1, "5b01dd98d881723a3cc9352bff6b669d84035029a93f"}, @NL80211_TXRATE_HT={0x45, 0x2, "35efff0453b28d0079174c33bf957929c33807bf38cbba06a109e38f0f5e776a6f4f8ba0ff4a8cc914d7612f40dc7e106993a081ce5a2ca5475d422f9cf3598ddc"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xb1, 0xfffe, 0x3ff, 0x0, 0x3, 0xdd2, 0xb5f, 0x1]}}]}, @NL80211_BAND_6GHZ={0xa0, 0x3, [@NL80211_TXRATE_LEGACY={0x7, 0x1, "13a517"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x401, 0x3, 0x6, 0x1, 0x101, 0x6, 0x5, 0x3]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xe6ad, 0xfffc, 0xc402, 0x1, 0x6, 0x4, 0x9, 0x6]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7fff, 0x1ff, 0x4, 0xa77, 0x1, 0x6]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x401, 0x11, 0x7f, 0x101, 0xffff, 0x4be, 0x401, 0x7ff]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x1, 0x6, 0x1, 0x6, 0xf2c8, 0x3, 0x2]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x4, 0x2, 0x2, 0x248, 0x5, 0x400, 0x6]}}, @NL80211_TXRATE_HT={0x1c, 0x2, "c5d1be221ae34c909e4d63f821f6596aefbe1393acc7007f"}]}, @NL80211_BAND_6GHZ={0x48, 0x3, [@NL80211_TXRATE_HT={0x42, 0x2, "a19e7908cb9ab3e1f7b0f06536a8cb3e7597c8e70f806b1a30d43460f27e8fa374b092d07361509edbbcddf3b9d6350329def770aac34ce6647466b018ac"}]}, @NL80211_BAND_6GHZ={0x20, 0x3, [@NL80211_TXRATE_HT={0x14, 0x2, "626d90e58816ad65d0056eceda997226"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_2GHZ={0x20, 0x0, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x20, 0x2, 0x0, 0x91e, 0x8000, 0xf1, 0xfe, 0x8000]}}]}, @NL80211_BAND_6GHZ={0x2c, 0x3, [@NL80211_TXRATE_HT={0x25, 0x2, "8f6f155df45819df37065ef6817b90555cfb928a75ca47ff8c83e73b376635a4f9"}]}, @NL80211_BAND_5GHZ={0x54, 0x1, [@NL80211_TXRATE_LEGACY={0x16, 0x1, "afdaa82d6a477e23a76095226b5e7ea36600"}, @NL80211_TXRATE_HT={0x36, 0x2, "ed5c94384c1c1a4858b8b5072c18c67e43565f8a9556a468d8edcaa05488dc9340275a4646fa031fb2e9dc8d264648ba57db"}]}]}, @NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x1}, @NL80211_ATTR_IE_ASSOC_RESP={0x268, 0x80, "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"}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0xffffffff}, @NL80211_ATTR_P2P_OPPPS={0x5}]}, 0x604}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) fsetxattr$trusted_overlay_nlink(r4, &(0x7f00000007c0)='trusted.overlay.nlink\x00', &(0x7f0000000800)={'U-', 0x4}, 0x16, 0x2) close(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$bt_hci(r5, 0x0, 0x1, &(0x7f0000000840)=""/98, &(0x7f00000008c0)=0x62) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r8) ioctl$TUNSETOWNER(r6, 0x400454cc, r8) 14:11:13 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5437, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:13 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x7000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:13 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5441, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1581.117121][T25183] jfs: Unrecognized mount option "hash" or missing value 14:11:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000040)) r2 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r2, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r3, 0xc0305710, &(0x7f00000000c0)={0x0, 0x1, 0xe000000000}) 14:11:13 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xc000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1581.203412][T25190] JFS: continue= is an invalid error handler [ 1581.250828][T25194] jfs: Unrecognized mount option "hash" or missing value 14:11:13 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5450, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1581.345996][T25199] JFS: continue= is an invalid error handler 14:11:13 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000000c0)={0x0, 0x0, 0x1, 0x0, [], [{0x7, 0x3f, 0x8, 0xc1, 0x4, 0x1}, {0x40, 0x264, 0x2, 0xfffffffffffffffd, 0x3, 0x7}], [[]]}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:13 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:13 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:13 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5451, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1581.523674][T25210] jfs: Unrecognized mount option "hash" or missing value [ 1581.629555][T25215] JFS: continue= is an invalid error handler [ 1581.643925][T25217] jfs: Unrecognized mount option "hash" or missing value 14:11:13 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5452, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1581.825696][T25224] JFS: continue= is an invalid error handler 14:11:14 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:14 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000040)) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000100)={0x1, 0x0, 0x10001, 0x87cd}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000140)={r2, 0xa1a}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r4) ioctl$IOC_PR_REGISTER(r4, 0x401870c8, &(0x7f00000000c0)={0x80000001, 0xfff}) 14:11:14 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:14 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x545d, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:14 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xa000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1582.049501][T25237] jfs: Unrecognized mount option "hash" or missing value 14:11:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0x1030, 0x4) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1582.200355][T25246] jfs: Unrecognized mount option "hash" or missing value 14:11:14 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5460, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:14 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x64, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ip6gre={{0xb, 0x1, 'ip6gre\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_GRE_LOCAL={0x14, 0x6, @remote}, @IFLA_GRE_REMOTE={0x14, 0x7, @mcast2}, @IFLA_GRE_LINK={0x8, 0x1, r5}]}}}]}, 0x64}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'veth0\x00', r5}) utimensat(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r6, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, &(0x7f00000000c0)=0x7fffffff, 0x4) [ 1582.303847][T25251] JFS: continue= is an invalid error handler 14:11:14 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:14 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5600, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1582.434501][T25259] JFS: continue= is an invalid error handler 14:11:14 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1582.567039][T25264] jfs: Unrecognized mount option "hash" or missing value 14:11:14 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5601, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:14 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1582.726882][T25272] jfs: Unrecognized mount option "hash" or missing value 14:11:15 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5602, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:15 executing program 1: r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x7a, &(0x7f0000000080)={r3, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000000c0)={r3}, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r4, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:15 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:15 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x10000, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VIDIOC_G_PARM(0xffffffffffffffff, 0xc0cc5615, &(0x7f00000000c0)={0xa, @output={0x0, 0x1, {0x2, 0x6}, 0x7ff, 0x7f}}) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1582.855897][T25279] JFS: continue= is an invalid error handler 14:11:15 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5603, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:15 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x23000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_xen(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)={'trans=xen,', {[{@access_any='access=any'}, {@loose='loose'}], [{@obj_role={'obj_role'}}]}}) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x4, 0x4}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f00000001c0)={0x2, 0x0, [{}, {}]}) [ 1583.023345][T25289] jfs: Unrecognized mount option "hash" or missing value [ 1583.060476][T25291] JFS: continue= is an invalid error handler 14:11:15 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5604, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000000c0)={r4, 0x1000, 0x100}) [ 1583.207320][T25302] jfs: Unrecognized mount option "hash" or missing value 14:11:15 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1f000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:15 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5605, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:15 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) socket$bt_rfcomm(0x1f, 0x2, 0x3) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r3}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, r3, 0x0, r2, 0xf) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r4, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:15 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x40000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:15 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:15 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r2, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) [ 1583.480169][T25319] JFS: continue= is an invalid error handler 14:11:15 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5606, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:15 executing program 3: ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000180)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$adsp1(0xffffffffffffff9c, &(0x7f0000000200)='/dev/adsp1\x00', 0xa0a182, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r2) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x58, 0x1402, 0x4, 0x70bd26, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x840}, 0x44000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x88040, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r3, 0x80044d1a, &(0x7f00000002c0)) syz_open_dev$tty20(0xc, 0x4, 0x1) r4 = socket(0x10, 0xa, 0x0) setsockopt$sock_int(r4, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) bind$isdn(r4, &(0x7f00000001c0)={0x22, 0x0, 0xcb, 0x5, 0x1}, 0x6) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x7) getsockopt$IP_SET_OP_GET_FNAME(r5, 0x1, 0x53, &(0x7f00000000c0)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000100)=0x2c) ioctl$KDGKBENT(0xffffffffffffffff, 0x5609, &(0x7f0000000440)={0x7d, 0x4}) [ 1583.556064][T25322] jfs: Unrecognized mount option "hash" or missing value [ 1583.613464][T25327] JFS: continue= is an invalid error handler 14:11:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f0000000140)=0x1) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x1, 0x5, 0x3, 0x81, 0x0, 0x8, 0x8386c, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x800, 0x1, @perf_config_ext={0x0, 0xc00000000000000}, 0x40820, 0x7fffffff, 0x7fa, 0x8, 0x598, 0x3652, 0x2}, 0xffffffffffffffff, 0x1, r0, 0x6) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r4, 0x5609, &(0x7f0000000180)={0x0, 0x0, 0x6}) r5 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r5, 0x40045532, &(0x7f0000000040)) write$binfmt_aout(r5, &(0x7f00000001c0)={{0x108, 0x40, 0x9, 0x3ab, 0x28c, 0xfffffffc, 0x206}, "", [[], []]}, 0x220) [ 1583.671113][T25333] jfs: Unrecognized mount option "hash" or missing value 14:11:15 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:16 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5607, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = getpid() timer_create(0x3, &(0x7f0000000440)={0x0, 0x1d, 0x1, @tid=r1}, 0x0) wait4(r1, &(0x7f00000000c0), 0x2, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:16 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:16 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1583.893033][T25342] JFS: continue= is an invalid error handler 14:11:16 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5608, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1583.982783][T25351] jfs: Unrecognized mount option "hash" or missing value 14:11:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000050d, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:16 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:16 executing program 1: r0 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r0}, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r0, r3, 0x0, 0xc, &(0x7f00000000c0)='-\\\'nodevem0\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffc}, r4, 0x9, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r5, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x804, 0x0) [ 1584.078210][T25357] JFS: continue= is an invalid error handler 14:11:16 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x40000800, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1584.194541][T25365] jfs: Unrecognized mount option "hash" or missing value 14:11:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@ipv6_newrule={0xa0, 0x20, 0x200, 0x70bd2d, 0x25dfdbfc, {0xa, 0x0, 0x14, 0x1f, 0x6, 0x0, 0x0, 0x1, 0x1}, [@FRA_DST={0x14, 0x1, @ipv4={[], [], @loopback}}, @FIB_RULE_POLICY=@FRA_SUPPRESS_PREFIXLEN={0x8, 0xe, 0x2}, @FRA_DST={0x14, 0x1, @mcast2}, @FIB_RULE_POLICY=@FRA_FWMASK={0x8, 0x10, 0x8}, @FIB_RULE_POLICY=@FRA_PROTOCOL={0x5, 0x15, 0x4}, @FRA_DST={0x14, 0x1, @mcast1}, @FRA_DST={0x14, 0x1, @ipv4={[], [], @empty}}, @FIB_RULE_POLICY=@FRA_IP_PROTO={0x5, 0x16, 0x88}, @FRA_SRC={0x14, 0x2, @ipv4={[], [], @loopback}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x20004004}, 0x48010) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:17 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20100000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:17 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x560b, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:17 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:17 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x4640, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000100)={'nat\x00', 0x2, [{}, {}]}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:17 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1585.606586][T25385] jfs: Unrecognized mount option "hash" or missing value 14:11:17 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x560c, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4088}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) ftruncate(r0, 0x6cc) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:18 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1585.849502][T25399] jfs: Unrecognized mount option "hash" or missing value 14:11:18 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x560d, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:18 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3f000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f00000000c0)) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:18 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:18 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f00000000c0)={0xb62614edb63e2f8f, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x801a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40010, 0x100000001, 0x5}, 0x0, 0x10, r2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) r7 = socket$packet(0x11, 0x3, 0x300) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PIO_FONTX(r8, 0x4b6c, &(0x7f00000006c0)={0x409f, 0x1, &(0x7f00000002c0)="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"}) r9 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x78040, 0x0) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r11) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x102020, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_mmap='cache=mmap'}, {@cache_none='cache=none'}, {@noextend='noextend'}, {@version_u='version=9p2000.u'}, {@cache_none='cache=none'}, {@privport='privport'}], [{@context={'context', 0x3d, 'root'}}, {@uid_gt={'uid>', r11}}, {@uid_eq={'uid'}}, {@smackfshat={'smackfshat', 0x3d, '@'}}, {@dont_appraise='dont_appraise'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'selinuxem0eth0wlan0\xd9-*)'}}]}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KDGKBENT(r6, 0x5609, &(0x7f0000000000)={0xc2, 0x0, 0x805}) 14:11:18 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x560e, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x400, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r1 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r1, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r2, 0x8, 0x4}, 0xc) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EVIOCGPROP(r6, 0x80404509, &(0x7f0000000200)=""/140) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBENT(r7, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:18 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x560f, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1586.137127][T25411] JFS: continue= is an invalid error handler 14:11:18 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x5e78c36c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f00000000c0)={0x31, "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"}) [ 1586.249907][T25425] JFS: continue= is an invalid error handler [ 1586.256377][T25422] jfs: Unrecognized mount option "hash" or missing value 14:11:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:18 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5610, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:18 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1586.416259][T25434] jfs: Unrecognized mount option "hash" or missing value 14:11:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x80, 0xfd, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r4, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000040)={0x10}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r5, 0x1, 0x23, &(0x7f0000000100)=0x8, 0x4) 14:11:18 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5611, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:18 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000340)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/216, 0xd8}, {&(0x7f0000000240)=""/112, 0x70}], 0x2, &(0x7f0000000300)=""/46, 0x2e}, 0x20) [ 1586.636087][T25447] JFS: continue= is an invalid error handler 14:11:18 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:18 executing program 1: timerfd_create(0x0, 0x800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:19 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5612, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1586.724494][T25453] jfs: Unrecognized mount option "hash" or missing value [ 1586.755132][T25456] JFS: continue= is an invalid error handler 14:11:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xb53101f3ec046cef}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40c0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) semget$private(0x0, 0x3, 0x40) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$unix(0x1, 0x1, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)={0x6, 0xfffffffc, 0x3, 0x406, 0x9, 0x7ffd}) syz_read_part_table(0xc23, 0x2, &(0x7f0000000300)=[{&(0x7f0000000200)="e1ac5aae08eea4568ac8a778c1e4c039123619f047d43581c30d23ae7355257ce9b83a2a0c", 0x25, 0x200}, {&(0x7f0000000240)="2bbc021969c93503e4bff9e8a1f1e86b68c02d505466af1e22b6d81ca49300bcb80aad8b88c2669b31b6965f486ca41ee7bd15ceafa67f0f29e24fe123bded545e2b464c06a1a34d3ee3f0d6c7a5ce0ba813bee9682c1794a9ea739848fc387868622d25bb36f34d6695dd1366742b138efe3444f1d649f7997b93450215c8c4f6", 0x81, 0x8}]) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000100)="ec2453a1f64b4a473f5fb5e31bb790f375157d8cc991cd361f963ddcf1477e6fd6efab7144454be96f082f9b11f7ea661b3077b1cd6a2cc39e737c7ee648a34b56589f22d096e0e8e5cca3316903e2aeb5e0ebce13e329ff7c85d42a47e4") 14:11:19 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x40000800, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1586.932603][T25469] jfs: Unrecognized mount option "hash" or missing value 14:11:19 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x6364, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:19 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:19 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:19 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x8933, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) eventfd(0x4) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x1, 0x0) [ 1587.183079][T25481] JFS: continue= is an invalid error handler [ 1587.296140][T25490] JFS: continue= is an invalid error handler [ 1587.302449][T25489] jfs: Unrecognized mount option "hash" or missing value [ 1587.470515][T25496] jfs: Unrecognized mount option "hash" or missing value 14:11:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = socket$unix(0x1, 0x1, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x3, 0x1000, 0x47a1, 0x3}}) socket$unix(0x1, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, &(0x7f0000000100)={0x20, 0x0, 0x100000000, 0x8000, 0x4}) 14:11:19 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0xae01, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f00000000c0)={0xc0000000, 0x8, "0c9f63250c4d2717b8173561e0fd9097a4e2e19481ec64bc9651a2aaf3343ed4", 0xffff, 0xc8, 0x80, 0x4f, 0xfff, 0x204, 0x7, 0x2, [0x9, 0x3, 0x6, 0x9]}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETAF(r4, 0x5408, &(0x7f00000001c0)={0x2, 0x8, 0x9, 0x2, 0x6, "4310d03dcdf60c36"}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:19 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6cc3785e, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:19 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x48000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:19 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:19 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0xae41, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:20 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x400454ca, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1587.779634][T25511] JFS: continue= is an invalid error handler [ 1587.843613][T25513] jfs: Unrecognized mount option "hash" or missing value 14:11:20 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:20 executing program 1: r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x401}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) [ 1587.945052][T25523] JFS: continue= is an invalid error handler 14:11:20 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x40049409, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:20 executing program 1: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) [ 1588.066973][T25527] jfs: Unrecognized mount option "hash" or missing value 14:11:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x4, 0xfd, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xff, 0x0, 0x1}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0xc000, 0x0) ioctl$TIOCCBRK(r1, 0x5428) 14:11:20 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x40186366, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:20 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4c000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r1, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) accept4$inet6(r1, 0x0, &(0x7f00000000c0), 0x80800) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:20 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:20 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1588.314820][T25545] JFS: continue= is an invalid error handler 14:11:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:20 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4020940d, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = dup(r1) mq_timedreceive(r2, &(0x7f00000000c0)=""/39, 0x27, 0x8001, 0x0) 14:11:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0xe, 0x1) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1588.468926][T25553] jfs: Unrecognized mount option "hash" or missing value [ 1588.514948][T25560] JFS: continue= is an invalid error handler 14:11:20 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x80045432, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:20 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1588.640777][T25571] jfs: Unrecognized mount option "hash" or missing value 14:11:20 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x60000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:20 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6010000000000000, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) 14:11:21 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:21 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x80045440, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:21 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xbc0f0000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1588.906051][T25583] jfs: Unrecognized mount option "hash" or missing value [ 1588.955679][T25587] JFS: continue= is an invalid error handler 14:11:21 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x80086301, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1589.006802][T25591] jfs: Unrecognized mount option "hash" or missing value 14:11:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1589.180940][T25601] JFS: continue= is an invalid error handler 14:11:21 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0xc0045878, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:21 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:21 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:21 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x68000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_S390_VCPU_FAULT(r3, 0x4008ae52, &(0x7f00000000c0)=0x5) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f00000000c0)) r4 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002a00)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r5, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000002a40)={0x1c, r6, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE_ASSOC_RESP={0x8, 0x80, '\"'}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xcc, r6, 0x100, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x3}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x6f, 0xbe, "64be034dfbb0547bb13044d0bdb2fc1970446325e1d7ae854c003e4d1f6fe9aec144daf40d970b6f174991cc8d4a6a6cba5f3cb99b8ff102e501a2574e3e49c262908398ed3ff4b81a0088d7f529bc9ed55fd76de3d751a8d33246f97f71e7e0019e67bb2517babf4da77d"}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x40}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x4}, @NL80211_ATTR_STA_WME={0x24, 0x81, [@NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x7f}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x3}, @NL80211_STA_WME_MAX_SP={0x5}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0xfb}]}, @NL80211_ATTR_STA_SUPPORTED_CHANNELS={0xa, 0xbd, [0x8001, 0x3, 0xfd]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4000046}, 0x40) getsockopt$ax25_int(r4, 0x101, 0xc, &(0x7f0000000040), &(0x7f0000001a40)=0x4) recvfrom$ax25(r4, &(0x7f0000000100)=""/199, 0xc7, 0x110, &(0x7f0000000200)={{0x3, @default, 0x6}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @default, @null, @null]}, 0x48) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:22 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0xc0045878, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1589.754469][T25612] JFS: continue= is an invalid error handler [ 1589.764310][T25617] jfs: Unrecognized mount option "hash" or missing value 14:11:22 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xf5ffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:22 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x12000, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x62000, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r1, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000180)={0x200a}) syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) r2 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r2}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r2, r0, 0x0, 0xa, &(0x7f0000000280)='/dev/vcsu\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30}, r3, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket(0x10, 0x802, 0x0) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r6) ioctl$TCSETAF(r6, 0x5408, &(0x7f0000000240)={0x3, 0x8, 0x1, 0x84, 0x13, "3e1306d69fbfeaaa"}) setsockopt$sock_int(r5, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$KDGKBENT(r4, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) [ 1589.917163][T25626] JFS: continue= is an invalid error handler 14:11:22 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0xc0189436, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ashmem\x00', 0x50f102, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000100)={0x9, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$IPSET_CMD_DEL(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xac}, 0x1, 0x0, 0x0, 0x40080}, 0x4) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1589.971935][T25633] jfs: Unrecognized mount option "hash" or missing value 14:11:22 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6c000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:22 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1590.164391][T25646] JFS: continue= is an invalid error handler 14:11:22 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4100, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:22 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:22 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1590.316600][T25652] JFS: continue= is an invalid error handler 14:11:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x3a, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$nbd(r2, &(0x7f0000000180)={0x67446698, 0x1, 0x3, 0x4, 0x2, "031b26bea1c5ed1d83ed23747e8c627156d91c5301d8979937d95acd0776548c04f02566fa69babe2ccc7dbd83c4848eb474d79b0a1c5f0fb8ad01084d0e3e4575cb4845ae6c9a1230c2ced91b54cf9ba0dda6e32ba5ff0f74d045af433bc2ef3a42b0f9c3c1826235a348f08eec5e6a47bae295786e1cd195fae8e89bf0fb559d907943235339bc9a664dc2a121fd87d07ebe725ab923fb904be5f6a7521c91b8575ba187bdf4b96c977ccd087f2549482f330d81fac19d6a891f87761e6d7d1eebd9c38ff4222521ad1a40cb"}, 0xdd) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f0000000100)={0x1, 0x3, 0x401}) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r3) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0xbfe) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$KDGKBENT(r4, 0x5609, &(0x7f0000000000)={0x1f, 0xfc, 0x4}) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x8}, 0x8) 14:11:22 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x74000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1590.445500][T25658] jfs: Unrecognized mount option "hash" or missing value 14:11:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000000c0)) 14:11:22 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:22 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x2, 0x0, 0x5}) [ 1590.596051][T25672] jfs: Unrecognized mount option "hash" or missing value [ 1590.684916][T25670] JFS: continue= is an invalid error handler 14:11:22 executing program 3: r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000100)={0x9, 0xc770, 0x401, 0xeef, 0x8, 0x1}) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0x8001, 0x5, 0x1000, 0x45}, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r4, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:23 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:23 executing program 1: prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r0}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x82940, 0x13c) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x1406, 0x300, 0x70bd29, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x20044051) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r2, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:23 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x3, 0x0, 0x5}) 14:11:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x1, 0x4}) r1 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r1, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) getsockopt$nfc_llcp(r1, 0x118, 0x1, &(0x7f00000000c0)=""/245, 0xf5) [ 1590.867271][T25683] JFS: continue= is an invalid error handler 14:11:23 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfbffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1590.973831][T25692] jfs: Unrecognized mount option "hash" or missing value 14:11:23 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x4, 0x0, 0x5}) 14:11:23 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x7a000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x4, 0x2, 0x0, 0x0, 0xe2e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000100)={0x7, 0x9, 0x0, 0x6, 0x6}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = openat(r1, &(0x7f0000000140)='./file0\x00', 0x200000, 0x20) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, r4, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'netdevsim0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xa}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffff}]}, 0x38}, 0x1, 0x0, 0x0, 0x4840}, 0x4) r5 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r5, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000180)={0x0, 0xfff}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x7, 0x5, 0x8, 0xfff, r6}, &(0x7f0000000240)=0x10) geteuid() [ 1591.129181][T25699] jfs: Unrecognized mount option "hash" or missing value 14:11:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x140) r2 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r2}, 0x0) sendmsg$AUDIT_SET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x3e9, 0x800, 0x70bd2a, 0x25dfdbff, {0x56, 0x1, 0x2, r2, 0xffffffff, 0x3, 0x100, 0x0, 0x7ff}, ["", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40005}, 0x4040010) 14:11:23 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:23 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:23 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x5, 0x0, 0x5}) [ 1591.319329][T25711] JFS: continue= is an invalid error handler 14:11:23 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)={0x3, 0x40, &(0x7f00000000c0)="227a9b11ab695ff7ee5181f6e288a8aa748db728fb0e8924d295cb96480f1331ba722c336645232fd058af0f972718c62a537f198117bafa1f25963fe14f8a18"}) [ 1591.440065][T25723] JFS: continue= is an invalid error handler 14:11:23 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x6, 0x0, 0x5}) [ 1591.496477][T25721] jfs: Unrecognized mount option "hash" or missing value 14:11:23 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:23 executing program 1: r0 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r0}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1050d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8, 0x0, @perf_config_ext={0xfffffffffffff000, 0x20}, 0x40004, 0x0, 0x0, 0x0, 0x0, 0x7f}, r0, 0x0, 0xffffffffffffffff, 0x1) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r3 = socket$netlink(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)={0x14, r4, 0xb03, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x168, r4, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x58, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9bf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x83f1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}]}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_BEARER={0x7c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2f}}}, {0x14, 0x2, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x37}}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @local}}, {0x14, 0x2, @in={0x2, 0x4e24, @local}}}}]}, @TIPC_NLA_BEARER={0x50, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'nr0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x6, @mcast2, 0xb7f}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_LINK={0x1c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe01}]}]}]}, 0x168}}, 0x800) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r5) ioctl$TCSBRKP(r5, 0x5425, 0x10c6) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0xfffb, 0x1, 0x3}}) [ 1591.613504][T25736] jfs: Unrecognized mount option "hash" or missing value 14:11:23 executing program 3: sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001700)={&(0x7f00000016c0)={0x38, 0x140a, 0x200, 0x70bd2a, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000010}, 0x84) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x8}, 0x4000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x100, 0x82200) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001580)={0x6, 0x0, [{0x2, 0x60, &(0x7f0000000240)=""/96}, {0xd000, 0xf0, &(0x7f00000002c0)=""/240}, {0x5000, 0xb8, &(0x7f00000003c0)=""/184}, {0x1, 0x75, &(0x7f0000000480)=""/117}, {0x6000, 0x1000, &(0x7f0000000500)=""/4096}, {0x6000, 0x54, &(0x7f0000001500)=""/84}]}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$CAPI_GET_PROFILE(r3, 0xc0404309, &(0x7f00000000c0)=0x767) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, &(0x7f0000000100)={0x9, 0x20, 0x1, 'queue1\x00', 0x8000}) ioctl$KDGKBENT(r4, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r1, 0x101, 0xc, &(0x7f0000000040), &(0x7f0000001a40)=0x4) sendmmsg(r1, &(0x7f0000007900)=[{{&(0x7f0000000240)=@phonet={0x23, 0x7, 0xc0}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)="3e0a1a8acdfd78c12e4fb90759808fad9421314597830934cfcd5f41e775243fdb1b714ba81c003070514710656d8ab9792370d0dae5d20500fa6bac81ac0421e62c614662f949525245e9aac5af150db9e1f1f4b1c83cd44e", 0x59}, {&(0x7f0000000340)="05ab337c233fca5cced6fabf4e37dd768ea2cc21c9b66bb6fc0d07d10b", 0x1d}], 0x2, &(0x7f00000003c0)=[{0x1010, 0x113, 0x4, "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"}, {0xf0, 0x100, 0xfffffc00, "92c4bc1f1af56d1e3f67f278023ff40f092fc9397776b20815abd23b06f60bb5e394d47e6a3debf38582fa97c4586077fe7c223e22bc4fd43dd610ee76aae5cd7d49e7108bebb7cbbfd4c9a80e57e1f7c131c2535071111280f09cc01666c145b5ed696765ba1907688baecbd30e9a9c86e5fbefc0b082b7498b9952aed6bb414120b9f9e71e81a14529b949737abb4eb62c7b08917b3ac2f14937fbda7dc7a27cd5173201439f3d8f1643d700179ffbcdd6cd0d49cc446fdb08168aeb77dd12d89707e657ece3e6bcc166b109a63298951ae6b4bcfe88df2abc69c3"}, {0xb8, 0x104, 0x1, "d8756e26fb9c66e58c87207da2ee78fd66251711f8881210c77707db49f82d0d104d3c6eb57e09c0498fdd9f4d12829f6e148106617f46daaf0c945363dbf3b03088855be061bd34d22026ae70f73368d574485298616af0f65735d6b7f661d2f8567aeb6b3d2d9be611fedad3045797a6b9071476b68c5d66c6e3f899be4b9d965b56b1a48278db306dca26225d604110a9d5d7f8b5a8839d700587dd7f4c898b6ecd7edc"}, {0xc8, 0x110, 0x93, "57157c206c0cf37874b1c13bb84140b5f5ce9b5f0f64b86011d5a562fafd1bdebdcdefd84824e8ecb056d338939ca4a8314d88f122fba8be6b153a22bb3edacc7a9e88b53a8d7a6391788bf4e779bdc460810c0636541fb9898bef9eb98728c277eae9ce0d3cfcb09aeda62e0a77898a85e5c247ac2f5f615168d840bd12cd220bc1f6daed8cd0853c2e01df2db6865f64e74d52a31289354768874be944d0c5a529b737467d3de8dffda0bb50dd9f96838d37"}, {0x48, 0x102, 0x8, "ec70d6d5e93fa78a582209045165cd4c06968bb5c237deb02d030f6edc8fcbd5c442a94b3eeb8622edb5c723f24c21b921b8a288a751fa37"}], 0x12c8}}, {{&(0x7f00000016c0)=@rc={0x1f, @none, 0x1f}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001740)="eedc0b07b85005bef4cb5daa18463f73bc7d058bf4a15dfccfa701faabbb05c6751ed2687961542dce0cb67a43b2eac708d56aa4fae16d8a41735fea736d42eb0a192960b03ff46c2fb8961b31cb03bdcb09b52682c2c3efc1f68567dd5623383898bff718a23276ba9ec7be45c0b7db5608402076f6bdb8f6ef679c5d7cca2e031b43470d293ef1c6b8ffbaa0dcdd8faa8b586467eb6aa37ac4760f5dc0daa983a88501134e49538f1c4533cc24549d2b0ac4085d9f8f334d44c4ad9486bf6145cceb61d0cb782845fcbd12439ebdb14ba1b2e6a49f7850ec75aa0cbb24b7248bdd10a3c23f6abf85f5ca2ea7", 0xed}, {&(0x7f0000001840)="56c0d6edd163435422f72ceadb40b26428cebc084765d2f99eee4ce84457549489d4ee09e28b545c559a8465be8ffdccd02344e8848e60a899650258ac4f3d7da2a58b9c", 0x44}, {&(0x7f00000018c0)="b46fdfb58b523c67934aa6456f2bd860b913cde22d694fd1323f4512a49cc62568e8e20fab98523810b1447d66e7be7a043077ec53023c6688f199a9959d7a9c3092985b95ad1d08dbc443b997f4ae895a5d9e20b4244f9fc5d6c286598230e57dcc93339e4356176a090d1cd1f05cd2e4603f25f71b63f72fc93d3111f0b108d07c5293301d9a32909adba4b2af8baa06bdd8c9aa70db32eec0a61d533911888af667077f091e8c4a81d0dee1e884cc2ed64bda92590dc7c9adc025782b0d", 0xbf}, {&(0x7f0000001980)="4b9af4e6df64ca823ea0d38d8cb321f4b87aba212a74b7d881c43f88429dbe6a75c33627ebe2adb792d93f6fb0d85bf3e050479c9d3f2bd0df922177506424ea43b1404433722a3269c87ee9af55e06c11685ddd4d743ff81d17f34bc3a456af8226ce44cf3dbf0f4a4dcaf5a1841933458c28f2d7c6f58db6d0720844ba49ac3172970e0703dba7c30123f7f2a86b3c", 0x90}, {&(0x7f0000001a40)}, {&(0x7f0000001a80)="11b12ee7b3786139cbcdbc899422663aa9df00233798769c143562ae65694713e373be339e93b34c94dae5a7034e3f9b30c788354ab32328c26e4310d9f1d4768999dafc1ba86c43a0f5247426273a0a350a03ed2a7d78024f43f522a85ce6ad36d6da3546cc532746f34c5a375334b74a7133c138c77461b8cad67f67193a7d8fd44747fd731cc00165b9660e40e08bb984c3e3940a016be2bb278807d4e59c2d4f6a797ddee800c4d09eed0c6b53c1cb08e0835460e10fea19b571585f9177c9ea095799e12d0477d899fb449d8fb19c0db4265f581dbd4244fc6a6a269964c693fd54", 0xe4}, {&(0x7f0000001b80)="fdd9b4b8ab4bb8efa49618d29e540168ed53afae8a1fe74b85a681325f8fbfb6a6174af2d466dcaf2b2fb8f69e128bd91b4d99b0eaf2e3f39979eff2a5bffdbdde84f6450d46b7a157c5", 0x4a}], 0x7, &(0x7f0000001c80)=[{0x50, 0x105, 0x6, "b4c78dca711ed2c45054bb5bcad8bdf6f9b03acc5271f1ca32c6a13f16d99976c600e0f8905c6f5b62f5cfe2779466fe7351b744f2ac25a39f378886194475"}], 0x50}}, {{&(0x7f0000001d00)=@l2tp6={0xa, 0x0, 0x893b, @empty, 0x10001, 0x1}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001d80)="63d6ea72cf4b5fa1171da6938c614ac2a7912561301efd2d4b6201ab16d60faa304719331c6f8b2d58ae628a8f9f35", 0x2f}, {&(0x7f0000001dc0)="38c45cf9088bdce426954ef83052541d6e1147891ed1f4aea2f6dc27b80832925608461b596c3dc3e02fa5f1b904ff47e9f71a7476abf315a4658dd79660efce525976b70f49b1493f14961329b34fb1b350ee244cd0eaea", 0x58}], 0x2, &(0x7f0000001e80)=[{0x1010, 0x110, 0x40, "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"}, {0x60, 0x10e, 0x5, "efd73d2480da959371f408cc40d784f33961ca2e5e82edb7c1e9375ffb1309ec7e8cabb6ecd79dec9ee2a0204800b6956d007b1110a1f4fe866bf01566ea80ddf8324e32e4448ca70909"}, {0x20, 0x6, 0x8, "4e0e77cd6ca9c5af99f666d77c"}, {0x18, 0x1, 0x3, "5ee5d15398a0fae8"}, {0x78, 0x10d, 0x5, "36f94e6f6cda135ed5d90f665d4dd5880d8902f3d7d48d712a7abeeb12cb59369098b3261f6c62f9b16389257d0cec5c6dadcb7aca1ec3137aa5ce520403867e8ef195abdaccdc6367c9b888db5318cd8d2543899ec9a017082c3509133e7025c01494878e6162f7"}, {0x100, 0x0, 0x57b, "2a1780dc6afb26daa5da26d4795f6c523982ec2ba5d8704dc7c3124420c289b126be407290d6501ffc6138ad45090ee9400ccb7237bcb88e27a24794f35502dec0549d749d207e587936a5435b13ffa7cbbf37d1e2c87a8cffb6d29eb161d941aaef5512cb6b6137fe09cd6765cd67bc9193dba564c4e75bb297d2c0119b96c5f018444f777fe05995cbfe451e29f248f2cb4222a39f7a79f96356e858e1f2e1309e7aa8b4ef592d7cec4e438a1ff771f57271ed6ee549a895280e6fb2777032877fad58685f0b1a434a8d4b206cd974a352b2accf4172949bf34cad338c205dc5d6910183f0c332b9"}, {0xf0, 0x108, 0x4, "bdb936bcd272b2cc9b6b47c04f9c5cbb4d02950b62816a7ab7026d83b5825a205cec9e31965854c0d6fd7dbc01d6d7c96f69a1a20087052f285d841aabbb28781f608d0398c8b1166edbe222df5cd36301b5d244508e3054ebc2b7378a3e7bd914e2c9304fe4c80ebcf25c9cd14b6bef3ee6260ba951a97450e8a03816652acaeaa63c5f6a043fe1525b9e2e31eaef16c85c25ad1ebaadaadbad8f28417bdcefe23b1661807addcbb4db8b296e5a036d36212a0a6b8f604ed6c55013411315e30750bdf84189d9b491507a754f7f4381e9bbda8e0f582f1e7547"}, {0x30, 0x115, 0xfe000000, "e0e4c166c1de5dd7749b053e8bb3042a46fba2f9fa7024ac6a11ea"}, {0x30, 0x119, 0x401, "b4547ca448882ba942654e92672db2960e1fd62713174fded728827c38a178"}, {0xc8, 0x29, 0x0, "6ca85888de3a3e9228f27df5195592546ce723e34cd230a55569a14108ee712b03637083415313219e331615c14c9da66dc2a161a2bf58431009a3d5290b9c871b5eaed554389695165773d26d63ee941271515fd5a59d5ac0f65b5bcc3dec265b69886e3eb6624d8514b4d4c002429d30b06ee89519518d02b96fdbb71f2026c7da33f42d92d44ffe9cb70a2161feff389e91be306828ae72b2f5f74a5740195eb83706e35ae8e6ada23541a62bf02f11dd"}], 0x1438}}, {{&(0x7f00000032c0)=@l2tp6={0xa, 0x0, 0x7, @ipv4={[], [], @empty}, 0x7, 0x4}, 0x80, &(0x7f0000004600)=[{&(0x7f0000003340)="ef0aec8227ee842a99ebcd60596a18cafd55869b579c12c0d9990c2239c54cdeb03a19f4ddbec5efad5fee767fe2425662dc29f8955bf1db", 0x38}, {&(0x7f0000003380)="a5079dd33e286985163f8d051e5e703cc283eb2437fac7f74048fe81d16d2690eadb113b14f4d589dd73c4b30de0fda015b7a995987f3c04a014f07723bcc21c44e2", 0x42}, {&(0x7f0000003400)="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", 0xfc}, {&(0x7f0000003500)="e4775764871d4d92f0b9918846838577bcd30d9d4f425d603fbfecb0cff2b4ae71506af1f8343d116ae0b8f21a67890598127e0eaf2c79018a3855c4564a36df268fa3bb5bc7f7c9dd6cbcb33e3df908335f3f4df771313900b8f7b2e712e9dcb36ca32ac458f1d0899d865513c5462ce8362452050541fc29d85847a85ac02f81f232ee374e2e22b4870b3b448b77ee578f94d1f323f92973f73149563e5d29a36f963c1a4f64f86000672a64cf134af7f9e4cb468f4dd3cfeced412f6a320a7b", 0xc1}, {&(0x7f0000003600)="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", 0x1000}], 0x5}}, {{0x0, 0x0, &(0x7f0000004840)=[{&(0x7f0000004680)="b9a6a863f72b43f082c10c363f", 0xd}, {&(0x7f00000046c0)="3bdae484034122aa46859b7286a483b70d3ee612f9ab253f515e121c5aa9ee567d96587a3dbb530be6866dd3e60cfb3bbfee311a5ea84694c80a51577b2fac64fb7d6d71fcffa7aeae1ba0d27052d9ff83caaa6f679a258170e5931438edbbb3ab32cfd58bf774fb446cf3326d51c1124b9146d616a0e3be95fdaa527b7264d4280628a5bc8547f3aea410c9be7f56972ce291da4f14ce256211ea4f1694f59b1f35daf741c23f85ea8b0470bc06c3e3f58a89eb1f4f0d54286eb3f0bc0b7a6ffb5218a5743f9845f1e60508a7fa7743e8fe3da278993bee68cbbdaca99e5e0f236d5fb665b49464465410f04bd2", 0xee}, {&(0x7f00000047c0)="90e4f96ee6c3add95c9e585c2126b3e57614ec7ab3785de67b02632c87e7aeab50aebd2d2af73c271e0ec0805d899e87daea06d55478e7f3a972eee79beb2f819e7850c32c48065c5c2d51b669d8e9fc82b233b384257a0c629a694c53a5f3ab8196f6a2041e16d83b74ef20d68112ea0553c43a1202e586be2161", 0x7b}], 0x3, &(0x7f0000004880)=[{0xf8, 0x103, 0xffff, "a8dbdd8568e9342734b44541cd228e77f62ec7cb30962d474aeec7edb7a0d4f21d9ddb6190e609b681c32eda0412b5a9a8883822f9357ab0e1531c4db67b6478b5a62cfb59655bfce1645d8251f489b4241358cbff10d3e70852cf56f5a6b377d2ffaeb0e7a4e7caa08e53f8f9ceafbf50adb806bb22741e1ea265179379c42d85bcb992441cbb94d929ebb05455a1b3e72682eed3cd6e541ba7cfc376de57ff44ffa1e567423b187e433081e054094d17977b8d0f3fd4b3fc325a69ae2ae6aa5ad4c0629b870c71765fe19f5aa858ceb42a8f77918fa5e6aa5ff774a73b1999d94ecd42e1ce90"}, {0x110, 0x112, 0x3, "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"}, {0x10, 0x1, 0xfffffffe}, {0x48, 0x3a, 0x9, "2e581c42166a3bd7eda0e84846feb687c217f577a3a4603b58a540805b91fa0e27378cc015c70a4d02090175e76c73dd3247cbce"}, {0x40, 0x104, 0x1f, "c73af28ac5eaae55b3311fce360a0b0723ad1e957ee96741762e270e67300a1672c38cd0287c11e0e659c3153fa5c695"}, {0x68, 0x114, 0xfff, "63d98cd41a11b3e52ce780b785488f618b10b561870e079c89a0a0debf7c2e9765669732db1687d902e4cb870a11ab883462772ea5c8bea002bd0dee6698b134bb68d4b65f55ef5f89b531206ce41179ed99"}, {0xd8, 0x101, 0x142, "5a377430c094afbf8ff198bf452ecb0d77e51a6a2ed7adc42410cc5cbf382f204d32b222837c67479dbe284afb9163460f54dfd1c1cca9e52c82ea1d370a470a97722ca9115c827990ffaf15d79b3a459b28b360ae39b7af1e4fbaaeb4adfa7da9b100064d2cff89ad9c684edc3105f7cd49c28442c36bc881db9602fbc513847312cfe587126bcf237e6a7ee038f02e5cda24a1d8ca4addd12842cb97bce133ceeeb38bbabbe4242856c6c090cdfde01625a480ef4492ec9840bd609fd36ef8da4b32da97f6cbf9"}, {0x58, 0x115, 0xfff, "56cec4ad16de09522ec2d7d33da8c51df5b3a53b37b07c015bb6ce72e50a08b49bcd29be784bd5c85c6c85a69941470704e1a2aa91fc9e0d69cb79b4a91a4c134c485e"}, {0x38, 0x101, 0x80000001, "789fae4af5e0251a7745d5aa1612c8c1f44c15043f06da13118230bb6695c877c3"}], 0x470}}, {{&(0x7f0000004d00)=@can, 0x80, &(0x7f0000005280)=[{&(0x7f0000004d80)="9bac049e3ea75757bc6ab5f534bec9be526f648b838afa0c27f44c0e12844fd8cbf07dccaf627c76de19b681a16005cd50f3f6b39ae0addeec166eef9bad5bca72c956a79e07e373c8dfa5d785787089eed533c910570af3993290cea1be571b3a6191be0187b3fc7099c000d935aa2eed6cd4482a371cb282ef1213d0f33d2ee45639fe45146178bf2fcf660adf95fcf1c4ea703fc6147f4bd58dfd37cd686d689e6847a027c6b8d5f3be9e1bf753bf905b46001bbb9ac7b4aa", 0xba}, {&(0x7f0000004e40)="642ae87d3a08204f4fa48d8242885179cda5ce3110e78431d3ed4e2c291e498419ed3f48b11c51a3e018a16c57e447bdccac003d7ecc711eb153d6cb355f72be248b70ca27c9f9793375e1bd45dfa1b4b02b3d2fcc6c984dfe3748ef7bb0e3c14136afd9bd9e3c3948ae0ad884b3853e32d2818bed73fa34f6003b9e291548e5e7705aac21b5c35d800c2fc9094d7837a645cef7", 0x94}, {&(0x7f0000004f00)="2a1898e223deb64111ca13983c4e836c80c0765aae47e73ec81e67091c41aebdbd8a354f65bf76f206d002f3f072ae98b4f2b9f74985ead72754674ffdc9de4b691538e0e33e0f0757383c7021939db5ba1d983cc2166d4ade6b9b5621f458242cc5501c7f95848b9cfb0e7863114a8a920854db8414494a6c8c3e751a58d2ffec49266c1c721e40d90e8e5fa32f8d20c887a2b1fc4308279cb2dbc5128659e26f9893bedda308604819827b722388d426b97e", 0xb3}, {&(0x7f0000004fc0)="81353b1b901016636911007d15178c4e427daf1d7ba5f2d8e6b8ac9a4695df2eee1e48cc28709d8598bfb4d8f6f900b9a9cdfd83087c989db635ee810c057aa503285a", 0x43}, {&(0x7f0000005040)="c041ea2d869217b6513e3f35493d61e07afbba1a5b816f544cd8d4ebffdb896608a1da07f67bcc9e4efa56f9", 0x2c}, {&(0x7f0000005080)="32f99a0e5d203a0113691c4017530b9d53e7e725497961d1a50db7758685831fd91954717d534c8801bf89159580c7c12a46545cae0dc510316f52e40e083687d6b7b3b25aace0c2c1b640965dc1472afce4385974c2aebbd6ca97281a3da9bb23cc535618144ec2e59cebd9281f6f0a7f248da0cde7dd06ed878a4040f4042044637bcefa09365168b19b4223589bd813d6b823a490c18132270b41159965030d4b1f84b861a40b985a14a0bb4b54ecadb6d95d188c99e873bffd787338360b7121bad63c9fcc7a6250e4016799a98446fb650fd4e64257d83bda17c24de5d7e2538a3a6361fb74d4fb30e0f4e5757a90ade793081892", 0xf7}, {&(0x7f0000005180)="fdbb952d358a6323a6dd1350a585a522027f952b959982206d9443542075a03c7e6525ffc3664a749dab83c986919bae5a30ac2cca5116f5f4089b95ec2eace076ca27609360fe79cac0dd6e841fbe795690ad2d6f3fa317667170e4e12f28802d329c2ec43b1b6e93d10d677ba6045cb56e4f6fa4f9b9edaa9fc02e4d2ea523abf231615be02c12c1435aea7f19c804f4d41eab905a4238bca0fbbf5a52d0fd3527df1e66143c242143b5ace49c05467155aea2d8da1e651d1e70028711270b785479cad9b48fdc43fa259f2e4be4b6", 0xd0}], 0x7, &(0x7f0000005300)=[{0x48, 0x3a, 0x2, "8a570658444a801c24f769833a368e64bfec1cbc0f52dedef5ee45bc9b3be1761200233ead9011611a6d68949f3fa25f27a88e"}, {0x100, 0x111, 0x40, "469e855fcccf7c1933113120d6a283c46126ef4540a7bf8d17ef268b5fca3115e13ce3daee907ae98dabcc11af0e631c05417b84b462ca02eaf969a053d1b7583a226eb8d04f53c424a2393d26c391aae6f59945c14585a7cb17220394dd4a6f3920b3bcd13bf3d38e7d120e5e27f30db64eee2e394072f8238526806f6f5020fab1891be803dd55336611f5ea164cdb821b09109392e8264962f8747e96066467bb679c6e8b92575efba672bc3632bec56dad12e4a173e8d459d81d7c11e102a61cd26ff6071a1846585f99c675a67c269b3bf3487c9ce6582ffab08c28caf70f97e6f85ed2a8b8e2ec410e"}, {0x1010, 0x110, 0x1, "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"}, {0x50, 0x111, 0x6, "3d3ae3bf4d6d1f36114cbd0d1cc87b5645b59ab4c30c14faee2fa22892942fd899109d72d8ee5d7430df715e2b88ccd349a2cba0cd3fc4dacb53"}, {0xd8, 0x88, 0x9, "59d0d96a07360de3237fd716918dc372824c2792b232fce7774780993cc9ab67f2fb822d4f2a73325439afc420f19f6f7c8a8b695653308d8426bbdea14c73ec547adf793332c8c3f705a686fc335655f4c5727791018c3640cbf2e3c1738e839d9477e94d709b04f78d3dceb9fdf67c4375123dbceeeba1ff1164df2d2be7dbbfde0ca37ee3520279b8e5aa3ede1e7c64cf765e64c1d87b4aa9dd32a3ff894c330eee9877f80930943827ec97de9a6fddd4abda7493fd07bb06dccb0b5c437b4a412f5590fedf"}], 0x1280}}, {{&(0x7f0000006580)=@isdn={0x22, 0x6, 0x5, 0x3, 0xff}, 0x80, &(0x7f0000006740)=[{&(0x7f0000006600)="cccb49a399fc76644587a19732b9c0eb1950ab820089984f9626339882", 0x1d}, {&(0x7f0000006640)="055dfdc47708e1b51aaa70c2afc16bc6b5a1488340ba8d1031f6d4095ccde58030be8d0e9b78d2986553eca5f1a6539280df41f7fae37bca917606f85dac7fbf7ebc205a2e28c8ac1ba733eb4391e9ff9ff94c", 0x53}, {&(0x7f00000066c0)="47f854197d74327da1be0447f00469779db1302425aee3d1bc1c8f2810d1387ad1fdfdca2a20a58524bc60239283adcc4c2810b0b6a81cafab48ac38054d167dbed36b8216519a5b05eb9c63889b615ec5fe3d19e6e6b3bdd3e8bc0413a2e16d90acafe91a40dd583ba8cad351", 0x6d}], 0x3, &(0x7f0000006780)=[{0x80, 0x11, 0x3ff, "6a92127bd6f86bc5cde5313616ff68df323be2c9b89b8340cc4c3c8a506dcfe9610d2007b2ee15b18c935cf53b8092f2d20208244c6af1b3b6d654fad1026e53d262e6929d303154e8aba56f0fd8e6ecb294404dd7558b883c89a41190f1942badbcb1c30a66c83eecfd42637e42f0"}, {0x1010, 0xa715ac0fc3b18649, 0x6, "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"}, {0xc8, 0x107, 0x0, "c51823cc308f93c103c105873cedb74dcb3d49db66a98251ce3fd29949dc4545d151b176cfe5a9bf2e38ef97ff0ac4e3e1152a2e309844ba6864acee12fed04c87de0fb0df080488abdc41604c0892c2820558df014b95bd27d3b7c06dcd90ae1744de47530551d4c7f0dfb63bfc1c3ea7169da8a433834009120f9b7a123df0f7475c016451724130ec02ec6e1b41f0c30260bdf221739a091d9de045d95f6f6a74382adc8854112381377467687e8a4b40eef7a567fd81"}], 0x1158}}], 0x7, 0x8804) sendto$unix(r0, &(0x7f00000000c0)="08a08756e415cd5181e3ba2a21e63d8e69e53f5fb352c424152e4e0a355ccfd05e4f567e9df8744c192f4017f25f00922d0c009790ac3cb031ce426e93b35f13baf3ad5d346614ebc259a8458a870943e0d52008f041a85a21b26e8e943b864897c6ad360ebb8a600bf21aa23f4dbb71cf48ab64c9b82a3e2b4f61526910c77babd7cc552ab5e3667015af4513af47ff225168063bd45ae1dd7c146d6b902efae63d56d34cb6be6e19733de1c380ba27f7ed741d92710fadb48a7fa53c38c132612dfc50f2f751421b6608c6ed72031191747e6ebf6bf4237bfa85d4", 0xdc, 0x4845, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r2, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:23 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x7, 0x0, 0x5}) 14:11:24 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:24 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f00000002c0)={0x6e5b, 0x0, 'client1\x00', 0x2, "4586ede497c0a0d6", "9fdd68fc9474acf10c4aa1ce604cfc929ba2954841fc5e7eaf473beb7002f9b6", 0x7f, 0x1ff}) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000100)) r2 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r2, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000040), &(0x7f0000001a40)=0x4) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000200)={r3, r4, 0x9, 0xc, &(0x7f0000000140)="9ec21fe2e48427039ff6566b", 0x7b, 0x80, 0xc418, 0x0, 0x6d2, 0x3, 0x1, 'syz0\x00'}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r5, 0x8983, &(0x7f00000000c0)={0x0, 'ip6_vti0\x00', {0x1}, 0x8}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x402, 0x0) ioctl$KDDELIO(r6, 0x4b35, 0x1) 14:11:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r1 = socket$netlink(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000680)={0x400, 0x1, 0x4, 0xe000, 0x2, {r2, r3/1000+30000}, {0x4, 0x8, 0x7, 0xa6, 0x80, 0x5, "3c5d8c51"}, 0x5, 0x3, @offset=0x8001, 0x0, 0x0, r4}) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="6400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000440012800b00010069703667726500003400028014000600fe8000000000000000000000000000bb14000700ff02000000000000000000000000000108000100", @ANYRES32=r6, @ANYBLOB="f148a544e15519fc59545a94c0beb9135f1f6dad51e2ef502df15da98e82e6fe22bc5fb6d11339989315461bc02c384d605c8150092f1c75dda639840caea3669b7794dad324315e72562e24da41be3605014d537405006cfbedceb8005821ef80e7d2d1b32f575949e827d5be35fc097c0bf91253c9b5a50e08bcb31b3b5b7c799b5c94bec2844066fba46e889bac7e007133b095c72da8c1224eeeb3b7fffcb4954aa85cb27e2c8b11dc5f1c71f84f8c5df5ef72e9006eb94c9ac76e428d5ebeac9f1082db1eb79afa02e19c2af4e6e147ae5393f5e13822a51b359905b025e2ddcfea9b4dd828d04c24447ec0fc6c7c44be"], 0x64}}, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000480)={@multicast2, @dev={0xac, 0x14, 0x14, 0x2d}, r6}, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1000) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x103800, 0x0) r7 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x8b30, 0x202) statx(r7, &(0x7f00000001c0)='./file0\x00', 0x400, 0xfff, &(0x7f0000000200)) r8 = syz_open_dev$tty20(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000000a004e2180000000ff010000000000000000000000000001090000000000000000000000000000000000000000000000000000000000b1053035000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a004e21000000010000000000000000000000000000000020000000000000000000000000000000000000000307d17900000000000000000000000000000000000000000000000000000000000000000000000000000000000000003d49f0626d09e99500"/272], 0x110) ioctl$KDGKBENT(r8, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:24 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x8, 0x0, 0x5}) 14:11:24 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xbc0f0000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1592.020384][T25758] jfs: Unrecognized mount option "hash" or missing value 14:11:24 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1592.149369][T25767] jfs: Unrecognized mount option "hash" or missing value 14:11:24 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:24 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:24 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x2, 0x5}) [ 1592.481745][T25782] jfs: Unrecognized mount option "hash" or missing value 14:11:24 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xff000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:24 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0), 0x4) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:24 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x3, 0x5}) [ 1592.578267][T25789] jfs: Unrecognized mount option "hash" or missing value [ 1592.751191][T25797] JFS: continue= is an invalid error handler [ 1592.898762][T25803] JFS: continue= is an invalid error handler 14:11:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x9b80e3c6ec0e967a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x406, 0x4, @perf_config_ext, 0x200, 0x80000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x1) prctl$PR_GET_KEEPCAPS(0x7) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:25 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:25 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xff0f0000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:25 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x4, 0x5}) 14:11:25 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x9}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video0\x00', 0x2, 0x0) fsetxattr(r5, &(0x7f0000000280)=@known='com.apple.FinderInfo\x00', &(0x7f00000002c0)='/sys/kernel/debug/binder/state\x00', 0x1f, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) r8 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r8) ioctl$VIDIOC_QBUF(r4, 0xc058560f, &(0x7f00000001c0)={0x0, 0xb, 0x4, 0x1, 0x1c4b, {r6, r7/1000+30000}, {0x2, 0x0, 0x1f, 0xcf, 0xb2, 0x40, "1f6a3a2b"}, 0x1, 0x3, @planes=&(0x7f0000000180)={0x6, 0x7, @fd=r8, 0xc6}, 0x9, 0x0, r1}) 14:11:25 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x5, 0x5}) 14:11:25 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x6, 0x5}) [ 1593.417061][T25812] jfs: Unrecognized mount option "hash" or missing value 14:11:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f00000000c0)={0x1, 0x0, 0x663a, 0x4, 0xaa8, 0x8, 0x7e7}) 14:11:25 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffefffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:25 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50d, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1593.590061][T25833] jfs: Unrecognized mount option "hash" or missing value 14:11:25 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x7, 0x5}) 14:11:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) clock_getres(0x6, &(0x7f0000000100)) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r6, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:25 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:25 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xf9fdffff, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:26 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f0000000100)) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r4) ioctl$TIOCL_GETSHIFTSTATE(r4, 0x541c, &(0x7f00000000c0)={0x6, 0x40}) 14:11:26 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:26 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x8, 0x5}) [ 1593.948684][T25853] jfs: Unrecognized mount option "hash" or missing value 14:11:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000fec000/0x11000)=nil, &(0x7f0000ff6000/0x2000)=nil, 0x11000}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r4 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r4, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x7a, &(0x7f0000000080)={r7, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000100)={r7, @in={{0x2, 0x4e22, @rand_addr=0x58}}, 0x0, 0x401}, 0x90) [ 1594.119092][T25865] jfs: Unrecognized mount option "hash" or missing value 14:11:26 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:26 executing program 1: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0xfffffffffffffffa, 0x2980c0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000100)=0x20) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fb8115452cf91d, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:26 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4000080000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:26 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000040)) r1 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_CURSOR2(r3, 0xc02464bb, &(0x7f00000001c0)={0x2, 0x1, 0x3, 0x200, 0x0, 0xb62f, 0x81, 0x2, 0xff}) r4 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r4, 0x101, 0xc, &(0x7f0000000040), &(0x7f0000001a40)=0x4) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000240)={'veth0_to_bridge\x00', {0x2, 0x4e20, @loopback}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)="e4b63b7267521f12317e20a13a9e9020e5a6e4f0b36971fb3be03ad4bb33849fb424e46789c8bf0468c6d72389ec38c5b9b96614e357d19b953fdf7de9fe76feb75a526eb4491222c6025f64945c71cab1e552903e57115ab8d47e514f8b3e3172ecdbdd90c109cba4f2034b8191c625926feee26c91f4903b75248f69b4c2af42ccab9a4193", 0x86) setreuid(0x0, r5) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f00000000c0)={0x1b6c0000, 0x49e, {r1}, {r5}, 0x3, 0x6}) ptrace$getregset(0x4204, r6, 0x3, &(0x7f0000000180)={&(0x7f0000000100)=""/126, 0x7e}) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000200)) ioctl$KDGKBENT(r7, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:26 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:26 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0xa}) [ 1594.453290][T25883] jfs: Unrecognized mount option "hash" or missing value 14:11:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:26 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1594.625680][T25898] jfs: Unrecognized mount option "hash" or missing value 14:11:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x80c4, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:27 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:27 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x10}) 14:11:27 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1594.929836][T25912] jfs: Unrecognized mount option "hash" or missing value 14:11:27 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xff000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:27 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x3, 0x5}) [ 1595.116900][T25922] jfs: Unrecognized mount option "hash" or missing value 14:11:27 executing program 3: r0 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r0}, 0x0) clone3(&(0x7f0000000340)={0x200000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0x29}, &(0x7f0000000180)=""/241, 0xf1, &(0x7f0000000280)=""/123, &(0x7f0000000300)=[0xffffffffffffffff, r0, 0x0], 0x3}, 0x50) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r2, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:27 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:27 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:27 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f0000000040)={0x8001, 0xa, 0x4, 0x100000, 0xb9a1, {0x77359400}, {0x3, 0x2, 0x40, 0x9, 0x8, 0x3f, "9d5b4d46"}, 0x1f, 0x2, @planes=&(0x7f0000000100)={0x302, 0x5557fee3, @mem_offset=0x4, 0xc4}, 0x9, 0x0, r0}) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x400500, 0x0) ioctl$KDGKBENT(r4, 0x5609, &(0x7f0000000000)={0x1, 0x80, 0x7}) 14:11:27 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f0000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1595.415700][T25941] jfs: Unrecognized mount option "hash" or missing value 14:11:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) r3 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r3, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000100)=@req={0x8, 0x6, 0x4, 0x9}, 0x10) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r4, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4000) ioctl$sock_ax25_SIOCDELRT(r5, 0x890c, &(0x7f0000000180)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) [ 1595.532643][T25947] jfs: Unrecognized mount option "hash" or missing value 14:11:27 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:27 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000040)={0x0, 0x0, 0x5}) 14:11:28 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:28 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdf9, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1595.943298][T25964] jfs: Unrecognized mount option "hash" or missing value 14:11:28 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1596.112041][T25973] jfs: Unrecognized mount option "hash" or missing value 14:11:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)={0x14, r2, 0xb03, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r2, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7b0}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x10000}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6a5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7ff}]}, @TIPC_NLA_NET={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x24, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:28 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:28 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff5, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1596.440434][T25984] jfs: Unrecognized mount option "hash" or missing value 14:11:28 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfc, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1596.568345][T25988] jfs: Unrecognized mount option "hash" or missing value 14:11:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0xf7, 0x0, 0x1, 0x0, 0x10000, 0x1011, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x210, 0x0, 0x0, 0x1, 0x200}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r1}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @tid=r1}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_delete(r2) 14:11:28 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:29 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1596.856460][T26002] jfs: Unrecognized mount option "hash" or missing value 14:11:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12412, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffe}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) write$P9_RLINK(r0, &(0x7f0000000000)={0x7, 0x47, 0x2}, 0x7) syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDGKBENT(r3, 0x5609, &(0x7f00000000c0)={0x9, 0xfd}) 14:11:29 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfd, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1596.967862][T26006] jfs: Unrecognized mount option "hash" or missing value 14:11:29 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:29 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffb, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x80, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r2 = openat(r1, &(0x7f0000000100)='./file0\x00', 0x2, 0x10) connect$pppoe(r2, &(0x7f0000000140)={0x18, 0x0, {0x0, @local, 'vlan1\x00'}}, 0x1e) [ 1597.239403][T26018] jfs: Unrecognized mount option "hash" or missing value 14:11:29 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = getgid() fchownat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, r1, 0x1000) r2 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001940)={0x0, 0x0}) r4 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r4, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) fstat(r4, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r6, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r8 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r8, 0x40045532, &(0x7f0000000040)) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r10 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r10, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001d80)=[{&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000380)=[{&(0x7f00000000c0)="ef39519129d2b01cf907c024757a2b4b6a3fc6fd26af3220ce4674cc47110d082de46ca53462626fa89368f06c5c", 0x2e}, {&(0x7f0000000100)="68488b71374b662eb33f1251c9a26ca51134b4b500cb7ad54ee7206e46c3b0c76a63dc53d2450f7f908b92", 0x2b}, {&(0x7f0000000140)="4bf77bd9c257e5eefa1e7178d56af0af1e109e2aefdc76c96a8b646fcb8b5364bd69e6850cd9d8ee801e4fb26df9c0204383b622287198a435c33788ae4b48c2828220bbea9b9a14568cf1c1ccdcf1f93084015ada83456e9bf73f4109bf2c618a1338ec338bb206181cc44e758fdaef8415bc4e2bcc12b608837448d4e06580a94f8a4de73affd48ccc6884b6d621993d6d22632f7c8b8daa12b38fd852fc8e", 0xa0}, {&(0x7f0000000200)="1e30ecc30553016aead699460dd3716c3754dc112d75de284d65885351ad5911b0342d52364770", 0x27}, {&(0x7f0000000240)="0e5ebc8f28", 0x5}, {&(0x7f0000000280)="552f663d3c2a9d1973cbea9c5a0347ee493a86295abfb638dd5d688db8f464ecd67402e45cf96a0848c70e21156b9d9db636bef8b4cf45180f927df98bb49eebb0ac2ce3c0c7bb215a69184c31670c702bbf2cac62f27681394d02a8a520cab657733447d2871819b57204f8c072bcd1f0e691c22057e4332bcde61dcfc9bba6fa134ee503e27c96b4683bc5747942acb02e8460c9cdac27c307ba9138f4bbaa00a8146749f276e400afc4982192623e9d7de41156a96c7e8369fd1d49285090423a8a1751524f089318627beb2a6a7bda9a", 0xd2}], 0x6, &(0x7f00000008c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [r0, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0xd0, 0x24000000}, {&(0x7f00000009c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000f80)=[{&(0x7f0000000a40)="4e8c1618d2bd193631e90dde406af940c3818c79d85019c9db5e142a453f6a2ac6beadd682da3996f1ad9adadc9bda5df337facbfc5dad4e654caa06fd8ed3e0662e55282e268326", 0x48}, {&(0x7f0000000ac0)="f884a8240bef5e73bb24eb90561af899ea085b4c7bbda53f0bd2fd7b936a91bab5", 0x21}, {&(0x7f0000000b00)="2d2a0f7514a3fd947731b5ed9ffb23566ac4cd5478ca0eb36bb9b269647ddd8b636205706091046db5be6ffa9df3d627ad8515d0aba3fb8dc53493653777", 0x3e}, {&(0x7f0000000b40)="7de34afb69907edf00146670b9ff63de8dcf20b946f2184b9ddb79dbab47fe848d30268f9fa322db385bde2e6c8cbbf502ebc06e6c9789c66fd5095601e6eebee4496d9ea5f75a8fec03db499ad72b2b57bdc5b00ed985155ab19cc938558f2f28627143ab7f5746e0dc8513b538db738479c3586844e7567c0bad8a27cb3201089ea8be83179e6a3e9e1ec46e592170b351616bb2b30e17e581208096bf92b75fc8ac6fe4f48bbc3e7e43635ce8263096b7bf2c00dac5129d946d8fec2077eaabb8a7f03eb750040586a4bd15a4ea313546cdcea719d2acf7e1d465ae29b90144ca80f4", 0xe4}, {&(0x7f0000000c40)="2bd6f6ccac350733c8d5eb6fae244b9e621b9ac0be9166495ba954a679ec465d4738449d28108964142b04fd93157fcf84f87defecbdfd33f283091184a9d77903b54c72300e5e6884567644f5f20b26a17ad79e5def9bd9426b53e0847a5179e6832bbe64fec5248d0efaff036e63b82680b4", 0x73}, {&(0x7f0000000cc0)="3acdf812235f84adc09932e339e75f1d1b18383f81c5562c2ee63613d9e46d3da5f72b76976218c14471669b1b6ee20d327d3542688fc751d834f8238c7ffefba5b15d2829689235896c111c0f3fd60fab07e14476e17e2cfe2bbda64b5c84ce5528e9b12331987d1aa4a171b2bfb3ce574b3da8588f29cb774d41b2a0608159ef01dd682f11ca2b546738f9a1e7d1f48109202f9af3af1aca3ba7bff7ef50555a12232749a69499b4a1b95bb584c91adee10601e960797667dac7d8f2fa96ed4fb68f23a119a090aaf6003ae61deb0f1467f8c0d881db935c4233b61fb0ef0d", 0xe0}, {&(0x7f0000000dc0)="8ac6d7d5fa5fc1e5107575913317485f573cfe84800716ae7ae96236eae7a9a27158f56894ec43b93ae7256af844195ac832dca576c50b360d5c1593a71ca0a568651165fa4f091e91f20851f9f99afa163706cfb04b0be13ca47170c9fcf1617eb00734bfac6820fbffd519d527d1091aeed9776cbb9fc6c2b8d9772c9fda3043b5b98dfd84440c9a2b5f12bca9c8ad63757c99dc657020ad1e3ce77e015853dc5016134169e28bdfd065ceda7a60b52eca9bc47d396c4db919227e91863869e9dc0ad7a3a6867925035b", 0xcb}, {&(0x7f0000000ec0)="8aa9dbe675a76e5fc73e4ec94471e991c88dbfa8d99e30c76be04d7daf0f3ad781ecd5f170c0b96356eee10e4bcb14c915acc240cdc8f00688192982cce5f7416297b6fa75fc2098c2dd7fd13307f77c73f2b3feb5eacade4f4ef2181173bf4efbd5a66eeb0be763713c362ad3e2672b369c64d9b6857df0c9c183", 0x7b}, {&(0x7f0000000f40)="f110a1f71cac5b037120f084f62f4ff8ecd33b064df6bc80202a328f0cfa097035ee89ff", 0x24}], 0x9, 0x0, 0x0, 0x4040014}, {&(0x7f0000001040)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001380)=[{&(0x7f00000010c0)="090ce6bce3ba58e57e989cb8b4d53e45c58d3edd4dcb0b3c1b01491afb379abb6b1868eb756106185fce61748cd889df975cd04dea4b885cf8f0322999677ce0cb5a37d5cf642cc582882aa061653bcc0c7ef2c1120139f10d7d13c934cf71e54ed2a4167d091e80aeff08ff3cb5e91ce7bb9b15219b4f90c9e03f4c1ee94547b5efe7922bae481118d32140096489e05d8e0fb1c2511d92039a4ee5d98374db14782c52a5a52840edaeffc275de1f77bf0f", 0xb2}, {&(0x7f0000001180)="63ab225416e2f6cf24f674e5b44ae2c0247fe133709abdb3db2bbdf4815662330501fa6bc0830f353293424b7b3c8837d8ad786e30f357de90fb5750e64761db300dcffb17f1fb6dfde715091fe94c433cfbde163ec01333e9407fc36f0635c6024c4aedd0929553afeb764c943e89e92f07b0ad8bcb450b5cb64ac3a0d71553965d06ee78a4884595f277b80ec98cedb10e4136701cd204c9ab32995958bb1adbfe58259545d3680fc8b148a55b583233ae572df5fb152188acc2fc61130ef809e8eee67cda8360f1e4b4b7ab39d5816e5469b24772c68588d321518c93", 0xde}, {&(0x7f0000001280)="d44b6d630c9ccab33f705604fc6e79019fe7d77584e0ae66421cb5b2a9f3be85f3a5f0fce9d74361b310e780c8df0ccc44ba6d1f2aab0b7ce63641ada4506ada4d02ad1967db204b922533f0a2ee251084d32e73b8008227e692f836451ad885cbc589e1ef4253b43769435bceaad3176738a3dd7f1c310a61c0cc8f9dda1505bf7b6b3a30d0b42a06ecdbc7e027264af97c9ae5bc65d159fce232ccb568bc783c01b91ec1", 0xa5}, {&(0x7f0000001340)="b734fe38384fe83c6c0afe", 0xb}], 0x4}, {&(0x7f00000013c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001700)=[{&(0x7f0000001440)="0460aa1e7bb43e7f153b7673c17df0c14dfaa9a7548e3e8683a8233d6fc9597610f74cbc4417da654d886fff21", 0x2d}, {&(0x7f0000001480)="f1665ce9d07b1188f9232109cb4d59e5710b2e02689e7b886263f2466b56d497036d0206804cef49c60e6fb2f2ad64ea3eb8af1f4c91ef59c826fddc06a1a4f9fc268c2d7d9bcc", 0x47}, {&(0x7f0000001500)="7a5c5c0e9bad6c499550c39c252940d0ffb2eb66d5ce5a7140a92cefb442a1644042a3886e7c589183f703fa0a2489ebc000c6b87489a46420732bf778c011ad0e7f39bb4e85d44f41277f477516725dfe95e6f3ec05f8e3acdfe8fa6e312a132c2844653d1df5f198649c485d6e55ec4069f0aa32ac76a04aca63081b459a1380f60c6722ef9f3b458f3fcc8bd48c890c754ec8f71a40384aea9d3f2344b5db3ec2bdae4d8257a0a9951da0227d106cd82bee1d5525bb1c54020707b7b27ba11fcc050fc062cf36fb4e618989da14e6d5304b01be75b875d5d93402f7d3447c3ff19e90ec1a6b6c7c", 0xe9}, {&(0x7f0000001600)="f14aa1f8421e0a1fa3600060415be248f30267c130e5cbec1e7e7d5c1871e1354706591658cfc50f560d73f2d268721529b9b85976d3fe58cae16b2424801a82f4b0b11b65e02a7afef35c07f8c614b8acb3184770b3a6b7b55e60e8c6d4841277419f1d7a5239a7db7931e0cb285ec1f51967dd374c97930d53e0182f3e051cea10204f24b1fc72d8f51d78197ff7947fa3892d720c2f7a8c21efc9548134a664e9f06d2be72eaf44a10cd145a6500c5b29afa28eccf1b90327eaf56350d77907036bdc26373f5894", 0xc9}], 0x4, &(0x7f0000001740)=ANY=[@ANYBLOB="18df00ae700000", @ANYRES32=r0, @ANYRES32=r2], 0x18, 0x4a000}, {&(0x7f0000001780)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001900)=[{&(0x7f0000001800)="a0d9db6e58ded81b855b97f256f40021aab35f154f6dd832243731c41ae8dfb3c55c0983a55b5003ba89036b35bb7d07e0faa90ece3aaffd31c2c3cf87eafb0bb13bbcedd3e9d0041007c88dcf94b16a09d827e95ff70a2b814d556d13ffc484c99dc4af7f6ebe6c49d82270c4c0e0e05c43bdbee8943c92fc2f67a97f9fc7a859ce47fe45def0af69f97499e7e8cab898ea51546ed5bf92d109b845d363762f1c51d18c398a878db413a5ab71938af5622a6f833a4a431ffd7424f931b46069448e1c5fbda49b42198e", 0xca}], 0x1, &(0x7f0000001a40)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, r5}}}], 0x20, 0x8094}, {&(0x7f0000001a80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001d00)=[{&(0x7f0000001b00)="bb90a85b828e5a0bcd0b3d4c286b5976b767d5c32a0501647b0495b000565661f1f40bbd5e16ad9d76e242133c143ae2b7b85cca67c27d66b452efae357c508164949444314e6adb4a7a53a3fb20057223800274dbb53005e359bb76ab5a9f40b8219e8574c3f73b9865a417f4210414eeca263a07c762ad8c2d4ba3c462e3ed2e6d7a9e71c1903c53d75c829c8e4f5bc01ab82d6a5fad78476ec5", 0x9b}, {&(0x7f0000001bc0)="eee8bbc7df3a5d5384b30403f1518184cc291f07577e6b137ec5246d5e6ef16c47c4520a0dad5de966d576eca5afc6f176d0462d317a8542edcd65986e0785956766de25f7db8569ca2888b5b4dd3cca", 0x50}, {&(0x7f0000001c40)="6a06549284b34be8f45fc0a616bb3a655c0b3b227a2ffd803ad5c82e218d751238d92c5fa121238657ab3f5c1e56bff6d40cda095b1c8ceafe9b54ee15a1ef3bd6d11bf677a7272d4ebd232963e8215a8032f707afbce8bd048238c5ac0a120d8c8056f8", 0x64}, {&(0x7f0000001cc0)="4cb8b91928006acf1d4d13fed0e4bd44cef934a0181637d41d", 0x19}], 0x4, &(0x7f0000001d40)=ANY=[@ANYBLOB="28001000000000003c25518f2f870100", @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r0, @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10], 0x28, 0x20000810}], 0x6, 0x20004811) 14:11:29 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1597.393730][T26028] jfs: Unrecognized mount option "hash" or missing value 14:11:29 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:29 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002a00)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000002a40)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE_ASSOC_RESP={0x8, 0x80, '\"'}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="040000fbffffffffffffff000400000008000100ffffff0005000100"/40], 0x40}, 0x1, 0x0, 0x0, 0x260040c5}, 0x4000004) r3 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r3}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x8000, 0xffffffffffe}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80480, 0x42) ioctl$KDGKBENT(r4, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:29 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:29 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1597.736533][T26045] jfs: Unrecognized mount option "hash" or missing value [ 1597.854960][T26053] jfs: Unrecognized mount option "hash" or missing value 14:11:30 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xbc0f000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x50d, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0), 0xf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x28, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14}]}, 0x28}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r2, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={[], [], @empty}}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x8080) syz_open_dev$tty20(0xc, 0x4, 0x1) 14:11:30 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x200000, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[{0x1, 0x3f, 0xf9, 0x7ff}, {0x1, 0x4, 0x3, 0x2}, {0x4, 0x78, 0x5, 0x10001}, {0x9, 0x81, 0x3f, 0x90d}, {0x15, 0x2, 0xb8}, {0x0, 0x9, 0x3, 0xfffffff8}, {0x1000, 0x2, 0x0, 0x7}]}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r2, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000001280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001240)={&(0x7f00000001c0)={0x104c, r3, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0x2}}, @NL80211_ATTR_BEACON_TAIL={0x2f8, 0xf, "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"}, @NL80211_ATTR_BEACON_HEAD={0x75a, 0xe, "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"}, @NL80211_ATTR_TX_RATES={0x64, 0x5a, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4c, 0x2, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x36, 0x2, "399574ce384724dceb616b33789a43e1526ad9342ba30ab121e805bad951ca0f2e8d5aa41928873df29eaa46aba5c01fb4b1"}, @NL80211_TXRATE_LEGACY={0x5, 0x1, '$'}]}, @NL80211_BAND_5GHZ={0x14, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}]}, @NL80211_ATTR_IE_PROBE_RESP={0x564, 0x7f, "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"}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}, @NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, 0x5}, @NL80211_ATTR_PRIVACY={0x4}]}, 0x104c}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @host}, 0x10) 14:11:30 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1598.189148][T26067] jfs: Unrecognized mount option "hash" or missing value 14:11:30 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:30 executing program 3: r0 = getpid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x20, 0x6, @tid=r0}, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0xfffffffffffffe31, 0x0, 0x9, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x80}, 0x4108a}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1598.317607][T26074] jfs: Unrecognized mount option "hash" or missing value 14:11:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETSF(r3, 0x5404, &(0x7f00000000c0)={0x400, 0x0, 0x8000, 0x5, 0x13, "2d11b034f97e7e0faccd8128b51b76efcb3222"}) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000100)=0x1, 0x4) r4 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r4, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000140)=[@in6={0xa, 0x4e21, 0x3, @mcast2, 0x9}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x38}}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1f}}, @in6={0xa, 0x4e24, 0xe94, @rand_addr="b18660d1d47a8a4fc74225778f282a46", 0x80000001}, @in6={0xa, 0x4e21, 0x2eb, @rand_addr="b8c304c27f9201d645c2af4b0019b43c", 0x40}, @in={0x2, 0x4e20, @loopback}], 0x84) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:30 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000040)) r3 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r3, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) close(r3) r4 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r4, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f00000000c0)={0x9e0000, 0xdc, 0x81, r5, 0x0, &(0x7f0000000080)={0x9b0941, 0x7fff, [], @ptr=0x4}}) mmap$snddsp_status(&(0x7f0000ffd000/0x2000)=nil, 0x1000, 0x1000000, 0x13, r6, 0x82000000) 14:11:30 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:30 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:30 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1598.691668][T26093] jfs: Unrecognized mount option "hash" or missing value [ 1598.873119][T26101] jfs: Unrecognized mount option "hash" or missing value 14:11:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002a00)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000002a40)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE_ASSOC_RESP={0x8, 0x80, '\"'}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xcc, r2, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x1000}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x82, 0xbe, "3df9f9e441232276362d9feebc8fb106007261b577a7696afe034e880678e2f2acfedb42498740d465a61e4c318aae4254e1184f14dd9d1107301590edeb853cab5251d503e1ee275401b9629d564dc915e4c63084e69b4873f65674037fe351ac5dc6ceb5921159726120ed189d31c48b76c293a9462fd5d22ca97bde22"}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @dev={[], 0x2e}}, @NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0xa83}, @NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0xff1c}, @NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}]}, 0xcc}, 0x1, 0x0, 0x0, 0x48024}, 0x20000880) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, 0x20010, r0, 0x180000000) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:31 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:31 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7ffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:31 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r1, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 1599.192327][T26115] jfs: Unrecognized mount option "hash" or missing value 14:11:31 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) syz_open_dev$ttys(0xc, 0x2, 0x1) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x502500, 0x0) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000140)=@un=@abs, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000440)=""/85, 0x55}, {&(0x7f0000000240)=""/44, 0x2c}, {&(0x7f0000000280)=""/115, 0x73}], 0x3, &(0x7f0000000340)=""/176, 0xb0}, 0x1) ioctl$KDMKTONE(r1, 0x4b30, 0x8) close(r0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KDGKBENT(r7, 0x5609, &(0x7f0000000000)={0x3, 0x0, 0x5}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$TCSETA(r8, 0x5406, &(0x7f0000000100)={0x4, 0xff, 0x1, 0x3, 0x17, "b21893edc3c900be"}) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0xfffffffffffffffe) [ 1599.416575][T26125] jfs: Unrecognized mount option "hash" or missing value 14:11:31 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x40000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:31 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:31 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1599.658972][T26135] jfs: Unrecognized mount option "hash" or missing value 14:11:32 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x20, 0x4, 0x14020000000, 0x1000}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002a00)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r3, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c8100d644", @ANYRES16=r4, @ANYBLOB="010000000000000000000e0000000800800022000000"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00022cbd7000fbdbdf254c0000000400ff000400ec000a00f500b812e01e94aaaaaaaaaabb0000"], 0x28}, 0x1, 0x0, 0x0, 0x844}, 0x80) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:32 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000040)={0x81, 0x9, 0x88}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r2, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @ipv4={[], [], @rand_addr=0x800}}, @NLBL_MGMT_A_DOMAIN={0x6, 0x1, '%\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40009}, 0x40) [ 1599.809390][T26142] jfs: Unrecognized mount option "hash" or missing value 14:11:32 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:32 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:32 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:32 executing program 2: removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'system.', 'ppp1vmnet0\x00'}) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:32 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) [ 1600.231872][T26161] jfs: Unrecognized mount option "hash" or missing value 14:11:32 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:32 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x4ae465) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) fgetxattr(r0, &(0x7f00000001c0)=@random={'user.', '\x00'}, &(0x7f0000000200)=""/10, 0xa) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002a00)='nl80211\x00') r4 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r4, 0x40045532, &(0x7f0000000040)) r5 = dup2(r1, r4) getsockopt$ax25_int(r5, 0x101, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000002a40)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE_ASSOC_RESP={0x8, 0x80, '\"'}]}, 0x1c}}, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) connect$l2tp6(r8, &(0x7f0000000240)={0xa, 0x0, 0x80000001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1, 0x4}, 0x20) ioctl$VT_RELDISP(r8, 0x5605) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48850}, 0x84) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1600.383076][T26171] jfs: Unrecognized mount option "hash" or missing value 14:11:32 executing program 2: pipe2(&(0x7f0000000040), 0x86000) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:32 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:32 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:32 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xff00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:32 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$tty20(0xc, 0x4, 0x1) 14:11:33 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="02000004", @ANYRES16=r3, @ANYBLOB="01050000000000000000010000000000000001410000001c001700000000000000006574683a6970365f7674693000000000"], 0x38}}, 0x0) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r3, 0x20, 0x70bd2b, 0x25dfdbfc, {{}, {}, {0x8, 0x2, 0x800}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8810) [ 1600.807156][T26188] jfs: Unrecognized mount option "hash" or missing value 14:11:33 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1600.993142][T26197] jfs: Unrecognized mount option "hash" or missing value 14:11:33 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:33 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xff0f000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:33 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1601.290558][T26208] jfs: Unrecognized mount option "hash" or missing value [ 1601.465338][T26213] jfs: Unrecognized mount option "hash" or missing value 14:11:33 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:33 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f00000000c0)={0x2, 0x4, 0x1, {0x4, 0x2}, 0x5, 0x6}) r3 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r3}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x81, 0xff, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x696863cf039f28b4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r4, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:33 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:33 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:34 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000040)) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f00000000c0)={0x0, 0x6}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000240), 0x9}, 0xa211, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x4400, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x10001, 0x0) ioctl$BLKRRPART(r3, 0x125f, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r2, 0xc0285628, &(0x7f0000000180)={0x0, 0x7, 0x200, [], &(0x7f0000000140)=0xb6}) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000200)={0x0, 0x0, 0x3}) [ 1601.868079][T26226] jfs: Unrecognized mount option "hash" or missing value [ 1601.979862][T26235] jfs: Unrecognized mount option "hash" or missing value 14:11:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f00000000c0)={0x10001, 0x2, 'client0\x00', 0xffffffff80000001, "79fdecdedd436484", "0bc496682e4d18dcc5448eb3fafde75d1ebe3483c85d1a91a16ec5ecf997a9a9", 0x101, 0x8001}) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f0000001340)={0xffff0000, 0x0, 0x4, 0x9a, &(0x7f0000000180)=""/154, 0xd9, &(0x7f0000000240)=""/217, 0x1000, &(0x7f0000000340)=""/4096}) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000001380)={0x9, 0x54, 0x1, 0x3f, 0x8, 0x40, 0x93, 0x6d, 0xff, 0x1f, 0x1f, 0xfb, 0x3, 0x9}, 0xe) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:34 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:34 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:34 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:34 executing program 3: perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x0, 0x6, 0x40, 0x0, 0x0, 0x50d, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6b, 0x0, 0x400000}, 0x0, 0x4, 0xffffffffffffffff, 0x9) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1602.357082][T26250] jfs: Unrecognized mount option "hash" or missing value 14:11:34 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:34 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1602.510289][T26256] jfs: Unrecognized mount option "hash" or missing value 14:11:34 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) get_thread_area(&(0x7f00000000c0)={0x2, 0xffffffffffffffff, 0xb7d03d0a316abd01, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:34 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, r0, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @empty}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x14, 0x1, '.selinux*user%:\x00'}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @ipv4={[], [], @empty}}, @NLBL_MGMT_A_DOMAIN={0x9, 0x1, 'ppp0\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}]}, 0x70}, 0x1, 0x0, 0x0, 0xc004}, 0x810) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x1, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r1, 0x4112, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r2, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:34 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:34 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1602.799495][T26273] jfs: Unrecognized mount option "hash" or missing value 14:11:35 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) fcntl$notify(r1, 0x402, 0x80000018) 14:11:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xd0091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) [ 1602.991762][T26282] jfs: Unrecognized mount option "hash" or missing value 14:11:35 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:35 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:35 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x4547, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000140)="83afedbc57af6fc23707f80b3e34b474d9ab7912d1a6087d44800a74930681dc91ffae48770e22a64884a99d15d01df1e29de4c071771eba48bc44ca4d8e0dc2b1382cfb7baf65785846b1f805b835563e044784d535d4d6654e2a5ae5e3a3e1f6dc206b6a75529ca6da", 0x6a, 0x4d}], 0x109a80b, &(0x7f0000000200)={[{@codepage={'codepage', 0x3d, 'macturkish'}}, {@iocharset={'iocharset', 0x3d, 'macinuit'}}, {@dir_umask={'dir_umask', 0x3d, 0x3d}}], [{@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}]}) [ 1603.316502][T26299] jfs: Unrecognized mount option "hash" or missing value 14:11:35 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1603.429442][T26303] jfs: Unrecognized mount option "hash" or missing value 14:11:35 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:36 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1603.752838][T26317] jfs: Unrecognized mount option "hash" or missing value 14:11:36 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002a00)='nl80211\x00') r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r4) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f0000000280)={0x5, 0x0, 0x8, 0x0, 0x4, 0x5f, 0x28, 0xfc, 0x2, 0x1, 0xfd, 0xd8, 0x0, 0x101, 0x2, 0x9a, 0xb6, 0x71, 0x7, [], 0x20, 0x5}) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000002a40)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE_ASSOC_RESP={0x8, 0x80, '\"'}]}, 0x1c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c0000002000080625bd7000fddb101006f800000004000000998d25b767b61aac12916443cc76fb93cb2245bc7282599f90981da94f9d11f7f635177dc32d507a54f981fa979168fc36cfef86ba896d2a24ad15724f79cb640819afb56a713c6318dd52e639aa9c02526cff8935a5e0572a912495823271199ee32ce3"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r3, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY_TX_POWER_SETTING={0x8, 0x61, 0x100}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_TXQ_LIMIT={0x8, 0x10a, 0x1}, @NL80211_ATTR_TXQ_QUANTUM={0x8, 0x10c, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4000c50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x64, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ip6gre={{0xb, 0x1, 'ip6gre\x00'}, {0x34, 0x2, 0x0, 0x1, [@IFLA_GRE_LOCAL={0x14, 0x6, @remote}, @IFLA_GRE_REMOTE={0x14, 0x7, @mcast2}, @IFLA_GRE_LINK={0x8}]}}}]}, 0x64}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00012dbd7000fcdbdf251d000000080001000000000008000100ffffffff08000300", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=r7, @ANYBLOB="080600000000000000000300316a6198fc4618592d27", @ANYRES32=r8, @ANYBLOB="08000100020000000c0099000900000002000000"], 0x60}, 0x1, 0x0, 0x0, 0x20008040}, 0x8000) [ 1603.859753][T26319] jfs: Unrecognized mount option "hash" or missing value 14:11:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r2 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r2, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) getpeername$tipc(r2, &(0x7f00000000c0)=@id, &(0x7f0000000100)=0x10) 14:11:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = shmget(0x3, 0x4000, 0x100, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:36 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:36 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:36 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r1 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r1, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000000c0)={0x0, 0xda}, 0x8) [ 1604.422382][T26340] jfs: Unrecognized mount option "hash" or missing value 14:11:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:36 executing program 1: r0 = msgget$private(0x0, 0x204) msgctl$IPC_STAT(r0, 0x2, 0x0) msgsnd(r0, &(0x7f00000000c0)={0x3, "1aa77ca1a33eafe87d81d6a73957652201f02232d4492cd604be2e4ac72ad09e846fe2463f814173003450dc4556c7fb9c00d0b2fece1692a00b988f06435b090f1bbdd6a876f94be83cbdd3adc93a8685fa259c08f9ee2b2d30b86c092b08692a46dbb997d267307a364eef8692fe952da04f3aa4228a9488a92e5962264680d2eabf1b36f3b318"}, 0x90, 0x800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) [ 1604.654673][T26355] jfs: Unrecognized mount option "hash" or missing value 14:11:36 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:36 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:37 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x20000, 0x0) recvfrom$rose(r1, &(0x7f0000000100)=""/189, 0xbd, 0x10022, &(0x7f00000001c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @default}, 0x1c) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = shmget(0x3, 0x4000, 0x100, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1604.953062][T26372] jfs: Unrecognized mount option "hash" or missing value 14:11:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCL_BLANKSCREEN(r3, 0x541c, &(0x7f00000000c0)) 14:11:37 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1605.169456][T26383] jfs: Unrecognized mount option "hash" or missing value 14:11:37 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000040)) ioctl$DRM_IOCTL_MODE_GETFB(r1, 0xc01c64ad, &(0x7f00000000c0)={0xffffffff, 0x4, 0x200, 0x80000000, 0x3, 0x5, 0x3ff}) 14:11:37 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) fcntl$notify(r1, 0x402, 0x80000018) 14:11:37 executing program 1: syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) socket$inet_tcp(0x2, 0x1, 0x0) socketpair(0x28, 0x5, 0x7, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="6400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000440012800b00010069703667726500003400028014000600fe80000000000000000000000000efba14000700ff02000000000000000000000000000108000100", @ANYRES32=r4, @ANYBLOB="d1f395ed3557743cef663af5ff34e549af7aefc0b8a340b5dd00d571e28e17f3e399419423cfa8aff3cb3b49dd36ea50a2b610c2dea34b5f22a49891f4899488e9fb8ec7bec1b15b6b6efc8f2c9d63d9d032eee58b9458296f1594b12cd676bbe64c99f5372970a161c59cd94edb0384be3a4bd0ad6954905446000000c0df739ba10672f4606a575140c92d5667a5b44f4a01bb66238c88611cbf890096afd03c224dd81c4a131077fdab3acff7672d48bd2cd4ed6256"], 0x64}}, 0x0) bind$can_raw(r1, &(0x7f00000001c0)={0x1d, r4}, 0x10) 14:11:37 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:37 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:37 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1605.675403][T26406] jfs: Unrecognized mount option "hash" or missing value 14:11:38 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x4ae465) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) fgetxattr(r0, &(0x7f00000001c0)=@random={'user.', '\x00'}, &(0x7f0000000200)=""/10, 0xa) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002a00)='nl80211\x00') r4 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r4, 0x40045532, &(0x7f0000000040)) r5 = dup2(r1, r4) getsockopt$ax25_int(r5, 0x101, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000002a40)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE_ASSOC_RESP={0x8, 0x80, '\"'}]}, 0x1c}}, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) connect$l2tp6(r8, &(0x7f0000000240)={0xa, 0x0, 0x80000001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1, 0x4}, 0x20) ioctl$VT_RELDISP(r8, 0x5605) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48850}, 0x84) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1605.905547][T26417] jfs: Unrecognized mount option "hash" or missing value 14:11:38 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:38 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:38 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:38 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x4ae465) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) fgetxattr(r0, &(0x7f00000001c0)=@random={'user.', '\x00'}, &(0x7f0000000200)=""/10, 0xa) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002a00)='nl80211\x00') r4 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r4, 0x40045532, &(0x7f0000000040)) r5 = dup2(r1, r4) getsockopt$ax25_int(r5, 0x101, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000002a40)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE_ASSOC_RESP={0x8, 0x80, '\"'}]}, 0x1c}}, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) connect$l2tp6(r8, &(0x7f0000000240)={0xa, 0x0, 0x80000001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1, 0x4}, 0x20) ioctl$VT_RELDISP(r8, 0x5605) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48850}, 0x84) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1606.247248][T26428] jfs: Unrecognized mount option "hash" or missing value 14:11:38 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) fcntl$notify(r1, 0x402, 0x80000018) [ 1606.406539][T26436] jfs: Unrecognized mount option "hash" or missing value 14:11:38 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:38 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x4ae465) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) fgetxattr(r0, &(0x7f00000001c0)=@random={'user.', '\x00'}, &(0x7f0000000200)=""/10, 0xa) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002a00)='nl80211\x00') r4 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r4, 0x40045532, &(0x7f0000000040)) r5 = dup2(r1, r4) getsockopt$ax25_int(r5, 0x101, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000002a40)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE_ASSOC_RESP={0x8, 0x80, '\"'}]}, 0x1c}}, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) connect$l2tp6(r8, &(0x7f0000000240)={0xa, 0x0, 0x80000001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1, 0x4}, 0x20) ioctl$VT_RELDISP(r8, 0x5605) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48850}, 0x84) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:38 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4000080000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:38 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4000080000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1606.786687][T26448] jfs: Unrecognized mount option "hash" or missing value 14:11:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r1, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 14:11:39 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4800000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1607.053063][T26459] jfs: Unrecognized mount option "hash" or missing value 14:11:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) clock_getres(0x6, &(0x7f0000000100)) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r6, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:39 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:39 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) clock_getres(0x6, &(0x7f0000000100)) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r6, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) clock_getres(0x6, &(0x7f0000000100)) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r6, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:39 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1607.586577][T26479] jfs: Unrecognized mount option "hash" or missing value 14:11:39 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x9b80e3c6ec0e967a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x406, 0x4, @perf_config_ext, 0x200, 0x80000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x1) prctl$PR_GET_KEEPCAPS(0x7) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:40 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x4, 0x5}) 14:11:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) clock_getres(0x6, &(0x7f0000000100)) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r6, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) [ 1607.756101][T26492] jfs: Unrecognized mount option "hash" or missing value 14:11:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r1 = socket$netlink(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000680)={0x400, 0x1, 0x4, 0xe000, 0x2, {r2, r3/1000+30000}, {0x4, 0x8, 0x7, 0xa6, 0x80, 0x5, "3c5d8c51"}, 0x5, 0x3, @offset=0x8001, 0x0, 0x0, r4}) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="6400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000440012800b00010069703667726500003400028014000600fe8000000000000000000000000000bb14000700ff02000000000000000000000000000108000100", @ANYRES32=r6, @ANYBLOB="f148a544e15519fc59545a94c0beb9135f1f6dad51e2ef502df15da98e82e6fe22bc5fb6d11339989315461bc02c384d605c8150092f1c75dda639840caea3669b7794dad324315e72562e24da41be3605014d537405006cfbedceb8005821ef80e7d2d1b32f575949e827d5be35fc097c0bf91253c9b5a50e08bcb31b3b5b7c799b5c94bec2844066fba46e889bac7e007133b095c72da8c1224eeeb3b7fffcb4954aa85cb27e2c8b11dc5f1c71f84f8c5df5ef72e9006eb94c9ac76e428d5ebeac9f1082db1eb79afa02e19c2af4e6e147ae5393f5e13822a51b359905b025e2ddcfea9b4dd828d04c24447ec0fc6c7c44be"], 0x64}}, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000480)={@multicast2, @dev={0xac, 0x14, 0x14, 0x2d}, r6}, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1000) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x103800, 0x0) r7 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x8b30, 0x202) statx(r7, &(0x7f00000001c0)='./file0\x00', 0x400, 0xfff, &(0x7f0000000200)) r8 = syz_open_dev$tty20(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000000a004e2180000000ff010000000000000000000000000001090000000000000000000000000000000000000000000000000000000000b1053035000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a004e21000000010000000000000000000000000000000020000000000000000000000000000000000000000307d17900000000000000000000000000000000000000000000000000000000000000000000000000000000000000003d49f0626d09e99500"/272], 0x110) ioctl$KDGKBENT(r8, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:40 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:40 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:40 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1608.173066][T26509] jfs: Unrecognized mount option "hash" or missing value 14:11:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) clock_getres(0x6, &(0x7f0000000100)) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r6, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r1, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r2, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @loopback}, @NLBL_MGMT_A_FAMILY={0x6}, @NLBL_MGMT_A_DOMAIN={0x7, 0x1, '-#\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000800}, 0x4000010) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1608.434400][T26518] jfs: Unrecognized mount option "hash" or missing value 14:11:40 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6800000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:40 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:40 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$cgroup_type(r4, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) close(r1) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000040)={@local}) 14:11:40 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:41 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x140c, 0x2, 0x70bd2a, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_RES_CQN={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) 14:11:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) clock_getres(0x6, &(0x7f0000000100)) syz_open_dev$tty20(0xc, 0x4, 0x1) [ 1608.831979][T26535] jfs: Unrecognized mount option "hash" or missing value 14:11:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r1 = socket$netlink(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000680)={0x400, 0x1, 0x4, 0xe000, 0x2, {r2, r3/1000+30000}, {0x4, 0x8, 0x7, 0xa6, 0x80, 0x5, "3c5d8c51"}, 0x5, 0x3, @offset=0x8001, 0x0, 0x0, r4}) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="6400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000440012800b00010069703667726500003400028014000600fe8000000000000000000000000000bb14000700ff02000000000000000000000000000108000100", @ANYRES32=r6, @ANYBLOB="f148a544e15519fc59545a94c0beb9135f1f6dad51e2ef502df15da98e82e6fe22bc5fb6d11339989315461bc02c384d605c8150092f1c75dda639840caea3669b7794dad324315e72562e24da41be3605014d537405006cfbedceb8005821ef80e7d2d1b32f575949e827d5be35fc097c0bf91253c9b5a50e08bcb31b3b5b7c799b5c94bec2844066fba46e889bac7e007133b095c72da8c1224eeeb3b7fffcb4954aa85cb27e2c8b11dc5f1c71f84f8c5df5ef72e9006eb94c9ac76e428d5ebeac9f1082db1eb79afa02e19c2af4e6e147ae5393f5e13822a51b359905b025e2ddcfea9b4dd828d04c24447ec0fc6c7c44be"], 0x64}}, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000480)={@multicast2, @dev={0xac, 0x14, 0x14, 0x2d}, r6}, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1000) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x103800, 0x0) r7 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x8b30, 0x202) statx(r7, &(0x7f00000001c0)='./file0\x00', 0x400, 0xfff, &(0x7f0000000200)) r8 = syz_open_dev$tty20(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000000a004e2180000000ff010000000000000000000000000001090000000000000000000000000000000000000000000000000000000000b1053035000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a004e21000000010000000000000000000000000000000020000000000000000000000000000000000000000307d17900000000000000000000000000000000000000000000000000000000000000000000000000000000000000003d49f0626d09e99500"/272], 0x110) ioctl$KDGKBENT(r8, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:41 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6cc3785e00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:41 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1609.041250][T26546] jfs: Unrecognized mount option "hash" or missing value 14:11:41 executing program 2: r0 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r0}, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)) sched_rr_get_interval(r0, &(0x7f0000000040)) syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDGKBENT(r4, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x2}) 14:11:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) clock_getres(0x6, &(0x7f0000000100)) syz_open_dev$tty20(0xc, 0x4, 0x1) 14:11:41 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x48, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:41 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:41 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) epoll_create1(0x0) msgget(0x3, 0x40) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000340)=""/179) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setreuid(0x0, 0x0) r4 = getgid() lchown(&(0x7f0000000080)='./file0\x00', 0x0, r4) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'hsr0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r5}, 0x14) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, &(0x7f0000000640)=ANY=[]) sendto$inet6(r3, &(0x7f0000000300)="0503000189063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) r6 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCL_SETVESABLANK(r6, 0x541c, &(0x7f0000000040)) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:41 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x7400000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1609.469449][T26567] jfs: Unrecognized mount option "hash" or missing value 14:11:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) clock_getres(0x6, &(0x7f0000000100)) 14:11:41 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1609.656606][T26577] jfs: Unrecognized mount option "hash" or missing value 14:11:41 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r1 = socket$netlink(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000680)={0x400, 0x1, 0x4, 0xe000, 0x2, {r2, r3/1000+30000}, {0x4, 0x8, 0x7, 0xa6, 0x80, 0x5, "3c5d8c51"}, 0x5, 0x3, @offset=0x8001, 0x0, 0x0, r4}) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="6400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000440012800b00010069703667726500003400028014000600fe8000000000000000000000000000bb14000700ff02000000000000000000000000000108000100", @ANYRES32=r6, @ANYBLOB="f148a544e15519fc59545a94c0beb9135f1f6dad51e2ef502df15da98e82e6fe22bc5fb6d11339989315461bc02c384d605c8150092f1c75dda639840caea3669b7794dad324315e72562e24da41be3605014d537405006cfbedceb8005821ef80e7d2d1b32f575949e827d5be35fc097c0bf91253c9b5a50e08bcb31b3b5b7c799b5c94bec2844066fba46e889bac7e007133b095c72da8c1224eeeb3b7fffcb4954aa85cb27e2c8b11dc5f1c71f84f8c5df5ef72e9006eb94c9ac76e428d5ebeac9f1082db1eb79afa02e19c2af4e6e147ae5393f5e13822a51b359905b025e2ddcfea9b4dd828d04c24447ec0fc6c7c44be"], 0x64}}, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000480)={@multicast2, @dev={0xac, 0x14, 0x14, 0x2d}, r6}, 0xc) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1000) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x103800, 0x0) r7 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x8b30, 0x202) statx(r7, &(0x7f00000001c0)='./file0\x00', 0x400, 0xfff, &(0x7f0000000200)) r8 = syz_open_dev$tty20(0xc, 0x4, 0x1) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000000a004e2180000000ff010000000000000000000000000001090000000000000000000000000000000000000000000000000000000000b1053035000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a004e21000000010000000000000000000000000000000020000000000000000000000000000000000000000307d17900000000000000000000000000000000000000000000000000000000000000000000000000000000000000003d49f0626d09e99500"/272], 0x110) ioctl$KDGKBENT(r8, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) clock_getres(0x6, &(0x7f0000000100)) 14:11:42 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:42 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = socket(0x10, 0x802, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) epoll_wait(r4, &(0x7f0000000140)=[{}, {}], 0x2, 0xfff) setsockopt$sock_int(r1, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000040)={'ip_vti0\x00', 0x3, 0x7137}) 14:11:42 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7fffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1609.940104][T26592] jfs: Unrecognized mount option "hash" or missing value [ 1610.056667][T26603] jfs: Unrecognized mount option "hash" or missing value 14:11:42 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6(0xa, 0x2, 0x6) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000100)=0x7fff, 0x4) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x7a, &(0x7f0000000080)={r6, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000040)={r6, 0xfffffffa, 0xcee, 0x400}, &(0x7f0000000080)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:42 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x68, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) 14:11:42 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:42 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1610.375910][T26625] jfs: Unrecognized mount option "hash" or missing value 14:11:42 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000000000)) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000040)={0x0, 0x0, 0x5}) 14:11:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) 14:11:42 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6(0xa, 0x2, 0x6) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000100)=0x7fff, 0x4) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x7a, &(0x7f0000000080)={r6, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000040)={r6, 0xfffffffa, 0xcee, 0x400}, &(0x7f0000000080)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1610.596624][T26636] jfs: Unrecognized mount option "hash" or missing value 14:11:42 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xbc0f000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:42 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) socketpair(0x1e, 0x6, 0x8000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x7a, &(0x7f0000000080)={r4, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) r5 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r5, 0x40045532, &(0x7f0000000040)) write$binfmt_elf64(r5, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3f, 0xf9, 0x3, 0x0, 0x6, 0x3, 0x6, 0xcdd, 0x29a, 0x40, 0x17e, 0x80000000, 0x80, 0x38, 0x1, 0x3840, 0x6, 0x1f}, [{0x5, 0x6c, 0x8, 0x6, 0xe0, 0x0, 0x6, 0x6}, {0x3, 0x772, 0x10001, 0xd704, 0x85, 0x5, 0x9, 0x564d}], "7ec40505972fa7b85119ae6ddbffaa9cd80e7346c5234c8ed913bc162350cc7dd48e56bd34af5a79b00d8ecae0dc1516abd14fcd345363effa16580ae69741d07f9de8ff1fa50c855c86a275749446bf5e650fce869ad88308896f5d66263f610a5b66e7408cbef3c6f7313dd8d9bc059412606a57d8a9e35a32a35701be51fb7594edf47e8f46f1b6a5188b7454fac7b21a6618dd51e4c99b25046c9bc79cc25dcda81ba62155962e4ed29e6a0c63398eb78a7dfd42375f85def8423f0111ac46221902db0b505f7653e9a4"}, 0x17c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000140)={r4, 0x60, "7e03fbed28032bc5ef47d5ba2f31ecdc2ec5eba49873340b9d9a4b09a08afb6487e64a0a332c3e9a100200c74711e31afbe0035cc3093a1fa241bb97fdb701b5c5c2be7f992b36da0a7da0c6bb3395cad459a8eba15b30628e18a0ff07dd102f"}, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x7c, r6, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x16}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x26}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x2a}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2c, 0x11}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xdc}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x19f0be77fab046b4) 14:11:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) clock_getres(0x6, &(0x7f0000000100)) 14:11:43 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:43 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xbc0f000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) 14:11:43 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xf5ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:43 executing program 2: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) ioctl$KDGKBENT(0xffffffffffffffff, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:43 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040)={0x0, 0x40}, 0x2) [ 1611.138629][T26668] jfs: Unrecognized mount option "hash" or missing value 14:11:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) 14:11:43 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:43 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') socket$nl_route(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1611.341171][T26692] jfs: Unrecognized mount option "hash" or missing value 14:11:43 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x74, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:43 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r1, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x9e0000, 0x10000, 0xb0ef, r1, 0x0, &(0x7f0000000040)={0x990a6e, 0xfffffffa, [], @value=0x8000}}) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f00000000c0)) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') socket$nl_route(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:43 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x7, 0xff, 0x6, 0x6, 0x17, "3d9898ce739d4cba8d0dbcc1e387360618d548"}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = getuid() r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB="cd00ef00081000", @ANYRESHEX=r0, @ANYBLOB=',cache=none,version=9p2000.L,version=9p2000.L,mmap,mmap,smackfsfloor=,uid<', @ANYRESDEC=r1, @ANYBLOB="2c646f6e745f61707072616973652c736d61636b66737472616e736d7574653d5b766d6e6574315e626465765ddc2c6673636f6e746578743d73797374656d5f752c646f6e745f6d6561737572652c00"]) 14:11:44 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1611.771106][T26712] jfs: Unrecognized mount option "hash" or missing value 14:11:44 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xf9fdffff00000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1611.924130][T26719] jfs: Unrecognized mount option "hash" or missing value 14:11:44 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x6b02) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0xfc, 0x40}) 14:11:44 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') socket$nl_route(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) clock_getres(0x6, &(0x7f0000000100)) 14:11:44 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_NESTED_STATE(r4, 0xc080aebe, &(0x7f0000001a80)={{0x0, 0x0, 0x80}}) getsockopt$ax25_int(r1, 0x101, 0xc, &(0x7f0000000040), &(0x7f0000001a40)=0x4) r5 = accept4(r1, &(0x7f0000000040)=@nfc, &(0x7f00000000c0)=0x80, 0x80800) bind$pptp(r5, &(0x7f0000000100)={0x18, 0x2, {0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1e) 14:11:44 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfbffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1612.298381][T26737] jfs: Unrecognized mount option "hash" or missing value 14:11:44 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff00000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) clock_getres(0x6, &(0x7f0000000100)) 14:11:44 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1612.466624][T26751] jfs: Unrecognized mount option "hash" or missing value 14:11:44 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)) r1 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000040)) r2 = dup2(r0, r1) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, &(0x7f00000000c0)={0x0, 0x5, 0xf9, [], &(0x7f0000000040)=0x6f}) syz_open_dev$tty20(0xc, 0x4, 0x1) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r3) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:44 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:44 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x9, 0x59, 0x0, 0x3, 0x2, 0x3, 0x1f, 0xd9, 0x38, 0x364, 0x5, 0x2a, 0x20, 0x1, 0x2, 0x7, 0x400}, [{0x1, 0x7ff, 0xfffffffb, 0x0, 0x3, 0x400, 0x4f2c, 0x4}, {0x5, 0x5, 0x7, 0x3, 0x2, 0x5, 0x9d, 0x97a}], "668de0419937d9a02dad22a288ef7f0422ddfc7f50a40a140ec067dc0521424618ac0bf4a6781a207454f89a342515b5066c52d3b923f7fe1f0b93e481af4fdac1a22b2d0a6b02c175c1f74b535e26bd712970b422ba019b818d818873ebe7f4617dbe1584fbd3fca7d3a40d126c5a8db0ed33f02cbe9e4dcff8728a8d50bb39f9a72e9bbf19fc84fa", [[], [], [], [], [], [], []]}, 0x801) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0x584) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000900)={@my=0x1}) 14:11:44 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) clock_getres(0x6, &(0x7f0000000100)) syz_open_dev$tty20(0xc, 0x4, 0x1) 14:11:45 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:45 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff00000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1612.840999][T26777] jfs: Unrecognized mount option "hash" or missing value 14:11:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:45 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000040)=0x400, 0x8) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x6800, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f00000000c0)) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:45 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x28}}, 0x4000000) clock_getres(0x6, &(0x7f0000000100)) syz_open_dev$tty20(0xc, 0x4, 0x1) [ 1613.164605][T26796] jfs: Unrecognized mount option "hash" or missing value 14:11:45 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RRENAMEAT(r2, &(0x7f0000000040)={0x7, 0x4b, 0x1}, 0x7) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:45 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:45 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xff00000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:45 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xff00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1613.434420][T26812] jfs: Unrecognized mount option "hash" or missing value 14:11:45 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1613.592496][T26821] jfs: Unrecognized mount option "hash" or missing value 14:11:45 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:46 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:46 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xff0f000000000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:46 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f000000000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x1, 0x4}) r1 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r1, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) getsockopt$nfc_llcp(r1, 0x118, 0x1, &(0x7f00000000c0)=""/245, 0xf5) 14:11:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:46 executing program 2: r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000380)={r1, 0x2}) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000100)={'rose0\x00', 0x2, 0x9}) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0xf8142, 0x0) close(r2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000040)={0x100, 0x5, 0x800, {0x8, 0x8}, 0x8000, 0x8}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$sndseq(r2, &(0x7f0000000280)=[{0x2, 0xd8, 0xd8, 0x4, @tick=0xd46, {0x1, 0x9d}, {0x8, 0xa6}, @control={0x5, 0x9, 0x200}}, {0x7, 0x2, 0x8, 0x0, @tick=0x4, {0x20, 0x8}, {0x20, 0x9}, @raw32={[0x4, 0x9, 0x800]}}, {0xf, 0x1, 0x9, 0xff, @tick, {0xe0, 0x7f}, {0x5, 0x20}, @raw32={[0x2, 0xfffffffb, 0x401]}}, {0xe2, 0x4, 0xec, 0x6, @time={0xfffffffb, 0x1ff}, {0x1, 0x2}, {0x3, 0x40}, @connect={{0x1, 0x9}, {0x1f, 0x6}}}, {0x20, 0xa0, 0x8, 0xbd, @time={0xf0b2, 0x4}, {0x9, 0x1}, {0x3f, 0x1}, @raw32={[0x7ff, 0x200, 0x3]}}, {0x20, 0x0, 0x8, 0x7, @time={0x6, 0x7}, {0x1, 0x64}, {0x9, 0x8}, @ext={0x3a, &(0x7f0000000200)="2356bf93a4b951c7df713c97a7cec923fbe28d135255570a19e2b57076979d6e9987976dacf5dc5ed5b11a5d1f9886261f7d812056f02cdd6c76"}}, {0x2, 0x9, 0x1f, 0x6, @tick=0x2400000, {0x1, 0x4}, {0x0, 0x7}, @ext={0x13, &(0x7f0000000240)="ac3266bb05115e70953c8f4d8409463235017b"}}], 0xc4) r4 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r4, 0x101, 0xc, &(0x7f0000000040), &(0x7f0000001a40)=0x4) ioctl$sock_ax25_SIOCADDRT(r4, 0x890b, &(0x7f0000000540)={@null, @default, 0x2, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000480)={r5, r2, 0x7fff, 0x2f, &(0x7f00000003c0)="176b1d9267acecaf8e086f3b9d3944013285aec8cd973dcdd237ef9e937eff480f9a0c86b2cf3e76c0de61d215a7a7", 0x70, 0x4, 0xffff, 0x3, 0x6, 0x3, 0x4, 'syz1\x00'}) 14:11:46 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1614.091574][T26835] jfs: Unrecognized mount option "hash" or missing value 14:11:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:46 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8, 0x240140) r2 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r2, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x7a, &(0x7f0000000080)={r5, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000000c0)={r5, 0x7}, 0x8) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000080)={@fixed={[], 0x12}, 0x101}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x1, 0x8, 0x4}) 14:11:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:46 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffefffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:46 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) [ 1614.427264][T26852] jfs: Unrecognized mount option "hash" or missing value 14:11:46 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:46 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) clock_nanosleep(0x5, 0x1, &(0x7f0000000080), &(0x7f00000000c0)) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:46 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:46 executing program 1: prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r0}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x82940, 0x13c) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x1406, 0x300, 0x70bd29, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x20044051) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r2, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:46 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1614.894583][T26878] jfs: Unrecognized mount option "hash" or missing value 14:11:47 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x12000, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x62000, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r1, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000180)={0x200a}) syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) r2 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r2}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r2, r0, 0x0, 0xa, &(0x7f0000000280)='/dev/vcsu\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30}, r3, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101000, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = socket(0x10, 0x802, 0x0) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r6) ioctl$TCSETAF(r6, 0x5408, &(0x7f0000000240)={0x3, 0x8, 0x1, 0x84, 0x13, "3e1306d69fbfeaaa"}) setsockopt$sock_int(r5, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$KDGKBENT(r4, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:47 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBENT(r2, 0x5609, &(0x7f0000000040)={0x4, 0x1f, 0x7fff}) r3 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r3, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) getsockopt$XDP_STATISTICS(r3, 0x11b, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x18) 14:11:47 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x101000) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1615.117388][T26890] jfs: Unrecognized mount option "hash" or missing value 14:11:47 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f00000000c0)) r4 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002a00)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r5, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000002a40)={0x1c, r6, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE_ASSOC_RESP={0x8, 0x80, '\"'}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xcc, r6, 0x100, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x3}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x6f, 0xbe, "64be034dfbb0547bb13044d0bdb2fc1970446325e1d7ae854c003e4d1f6fe9aec144daf40d970b6f174991cc8d4a6a6cba5f3cb99b8ff102e501a2574e3e49c262908398ed3ff4b81a0088d7f529bc9ed55fd76de3d751a8d33246f97f71e7e0019e67bb2517babf4da77d"}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x40}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x4}, @NL80211_ATTR_STA_WME={0x24, 0x81, [@NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x7f}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x3}, @NL80211_STA_WME_MAX_SP={0x5}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0xfb}]}, @NL80211_ATTR_STA_SUPPORTED_CHANNELS={0xa, 0xbd, [0x8001, 0x3, 0xfd]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4000046}, 0x40) getsockopt$ax25_int(r4, 0x101, 0xc, &(0x7f0000000040), &(0x7f0000001a40)=0x4) recvfrom$ax25(r4, &(0x7f0000000100)=""/199, 0xc7, 0x110, &(0x7f0000000200)={{0x3, @default, 0x6}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @default, @null, @null]}, 0x48) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:47 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x100c0, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f00000000c0)=0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x200000, 0x0) 14:11:47 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:47 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3d}]}) 14:11:47 executing program 2: r0 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r0}, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/vlan/vlan1\x00') read$FUSE(r1, &(0x7f0000000080), 0x1000) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r2, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r3 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000001080), &(0x7f0000001100)=0x60) fchdir(r3) 14:11:47 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffff0700, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f00000000c0)) r4 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002a00)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r5, &(0x7f00000032c0)={0x0, 0x0, &(0x7f0000003280)={&(0x7f0000002a40)={0x1c, r6, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_IE_ASSOC_RESP={0x8, 0x80, '\"'}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xcc, r6, 0x100, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x3}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x6f, 0xbe, "64be034dfbb0547bb13044d0bdb2fc1970446325e1d7ae854c003e4d1f6fe9aec144daf40d970b6f174991cc8d4a6a6cba5f3cb99b8ff102e501a2574e3e49c262908398ed3ff4b81a0088d7f529bc9ed55fd76de3d751a8d33246f97f71e7e0019e67bb2517babf4da77d"}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x40}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x4}, @NL80211_ATTR_STA_WME={0x24, 0x81, [@NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x7f}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x3}, @NL80211_STA_WME_MAX_SP={0x5}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0xfb}]}, @NL80211_ATTR_STA_SUPPORTED_CHANNELS={0xa, 0xbd, [0x8001, 0x3, 0xfd]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4000046}, 0x40) getsockopt$ax25_int(r4, 0x101, 0xc, &(0x7f0000000040), &(0x7f0000001a40)=0x4) recvfrom$ax25(r4, &(0x7f0000000100)=""/199, 0xc7, 0x110, &(0x7f0000000200)={{0x3, @default, 0x6}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @default, @null, @null]}, 0x48) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1615.535803][T26912] jfs: Unrecognized mount option "hash" or missing value 14:11:48 executing program 2: ioctl$KDGKBENT(0xffffffffffffffff, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) clock_gettime(0x0, &(0x7f0000000040)) r0 = msgget$private(0x0, 0x204) msgctl$IPC_STAT(r0, 0x2, 0x0) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000180)=""/12) r1 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r1}, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r2) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000240)=""/92) r3 = syz_open_procfs(r1, &(0x7f0000000100)='attr/current\x00') setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000140)={0x6, 0x1, 0x6, 0xfd, 0xb1, 0x8, 0xed, 0x0, 0x1, 0x8, 0x3, 0xa8, 0x3f, 0x1}, 0xe) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r4) ioctl$BLKRRPART(r4, 0x125f, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) nanosleep(&(0x7f00000000c0), &(0x7f0000000200)) 14:11:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:48 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff7f, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:48 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2}]}) 14:11:48 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000240)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xd4, 0x0, 0x7, 0x201, 0x0, 0x0, {0xa, 0x0, 0x9}, [@NFACCT_FILTER={0x2c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xbd}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x6}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xb7}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x10000}]}, @NFACCT_FILTER={0x4c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x6}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xc9}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x914}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x10000}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x58b5c5d3}, @NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}]}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x8}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0xfff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3c0}]}, 0xd4}, 0x1, 0x0, 0x0, 0x20000004}, 0x800) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pwrite64(r1, &(0x7f0000000280)="53d68840efa47258a1d48d99298dbf095d9183c3318bed6c17eec07f718aa59d1d85c2b8e27c13e22f6e0d14ce6973992fa1d37b50b7a0455395479500327b4401dde35ae44f6b7d6d9600b08305742efcf342fb7d0e6f41194ac2343d32dbef34e7b94fc14add6055b3917279b6334b259ce9e85102e33405a3dd88c1b33bcb7a4f9fbac5fe785e6ce31d5e7eb63457e6952597fc3ba4ae132789", 0x9b, 0x1c0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r3) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x38, 0x17, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0x7}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xc}, 0x20000000) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000040)) ioctl$KDGKBENT(r2, 0x5609, &(0x7f0000000000)={0x3, 0x0, 0x994}) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x68, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x3, @media='ib\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0xbedc9a73f971d5be}, 0x8000) [ 1616.020734][T26939] JFS: continue is an invalid error handler 14:11:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/206) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:48 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1616.234985][T26947] jfs: Unrecognized mount option "hash" or missing value [ 1616.269672][T26959] JFS: continue is an invalid error handler 14:11:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:48 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x3}]}) 14:11:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = socket$unix(0x1, 0x1, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCL_SETSEL(r3, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x3, 0x1000, 0x47a1, 0x3}}) socket$unix(0x1, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, &(0x7f0000000100)={0x20, 0x0, 0x100000000, 0x8000, 0x4}) 14:11:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:48 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfbc, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:48 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000340)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/216, 0xd8}, {&(0x7f0000000240)=""/112, 0x70}], 0x2, &(0x7f0000000300)=""/46, 0x2e}, 0x20) [ 1616.654219][T26978] JFS: continue is an invalid error handler 14:11:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:49 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000040)={0x0, 0x0, 0x5}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x454480, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x5c, 0x1, 0x8, 0x1, 0x0, 0x0, {0x3, 0x0, 0x7}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x3c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x79e9}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x9}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x6ac61a629fe68b13}, 0x1) r2 = socket$alg(0x26, 0x5, 0x0) r3 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r3}, 0x0) sched_getparam(r3, &(0x7f0000000000)) dup3(r0, r2, 0x80000) [ 1616.836940][T26989] JFS: continue is an invalid error handler [ 1616.839055][T26981] jfs: Unrecognized mount option "hash" or missing value 14:11:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:49 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x4}]}) 14:11:49 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:49 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r1}, 0x0) move_pages(r1, 0x5, &(0x7f0000000040)=[&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x5000)=nil], &(0x7f0000000080)=[0x6, 0xff000000, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6) 14:11:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:49 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) [ 1617.099109][T27005] JFS: continue is an invalid error handler [ 1617.234744][T27012] JFS: continue is an invalid error handler 14:11:49 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x5, 0x4, 0x401, 0x9, 0xd8, 0x400, 0x1, 0x80000000, 0x8}, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:49 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:49 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x5}]}) 14:11:49 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f00000002c0), 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x7a, &(0x7f0000000080)={r4, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000040)={r4, @in6={{0xa, 0x4e21, 0x1, @mcast1, 0x6}}, 0x1, 0x3, 0xc07, 0x4, 0x19, 0x9, 0x1f}, &(0x7f0000000100)=0x9c) r5 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r5, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e22, 0x3, @empty, 0x5}}, [0xffffffffffffffff, 0x8, 0x3, 0xffffffffffffffff, 0x5, 0x8000, 0x5, 0xffff, 0xfffffffffffffc01, 0xdc, 0x1, 0x1, 0xc69c, 0x31, 0xdb]}, &(0x7f0000000140)=0x100) 14:11:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:49 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1617.623374][T27019] jfs: Unrecognized mount option "hash" or missing value [ 1617.722300][T27032] JFS: continue is an invalid error handler 14:11:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1617.839351][T27045] JFS: continue is an invalid error handler 14:11:50 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000040)) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$SO_J1939_PROMISC(r2, 0x6b, 0x2, &(0x7f0000000440), &(0x7f0000000480)=0x4) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = add_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000002c0)='}', 0x1, 0xffffffffffffffff) keyctl$setperm(0x5, r4, 0x0) r5 = add_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)="7a4988d8d1531ec1c6abe4e97925a6a88fa33dfb582c53eba149f3295da652cb80badcce6edcb0b2fb5d2569fbb0b992f8032b7aa0715e1ff6b052f5083955b8c87807f84863be89b18411fc", 0x4c, r4) add_key(&(0x7f0000000200)='logon\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="9b5045cc964015e03064093e8e635b12e670affb9a1d4cdc8b24606036aaac660d64643df8a92857afc1cf5865ae8d0e5a110d48e66bfee608a212150629569a4855e567248a6ca5e65fff73049f4686f57117fb5fc530a328323574ac4decd68d80fa8f0ae2cc78b7cfa1cfa03e929996f4ec460e2718a3cd8b84ff69b51e180d3a3c65cb7564418ab4f792923d0da0a7cf160e418948b8184ac7e6fa9436a47c91860ad5d183e9ec118d3d4f5cc918ed", 0xb1, r5) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="721ba44d", @ANYRES16=r6, @ANYBLOB="000326bd7000fddbdf2508000000080005000800000008000400090000001c000180060004004e220000060004004e230000060002002c0000004000018008000500030000000a0006006c626c6372000000060004004e2000000600010002000000060001000a000000080009003e00000008000900600000000800040008000000"], 0x88}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) 14:11:50 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1f00, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:50 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x6}]}) 14:11:50 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:50 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:50 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) tee(r1, r0, 0x562, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000040)={0x1, 0x0, 0x17f}) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r2) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f00000000c0)={0xa30000, 0x1, 0x1, r0, 0x0, &(0x7f0000000080)={0xa20920, 0x8, [], @value64=0x3}}) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f0000000100)="fc47fa44c1ec7afa20a617e97b91c4ff101ed81e4519c13540e379aa0439e250d51340a698f67da5109ec47373eea88c69371048087001684704709f3c1d066ceb7764b8f27c0921f964319ecc3798b88eaba9c27907175201b3d3cf82aa7fa981e3ab855f42252bf66dd11f9149b488ea97e6ffece78aab39") [ 1618.137161][T27059] JFS: continue is an invalid error handler 14:11:50 executing program 1: timerfd_create(0x0, 0x800) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:50 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1618.252066][T27071] JFS: continue is an invalid error handler 14:11:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f00000000c0)) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:50 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x7}]}) 14:11:50 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:50 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1618.577807][T27087] JFS: continue is an invalid error handler [ 1618.747006][T27062] jfs: Unrecognized mount option "hash" or missing value [ 1618.751150][T27095] JFS: continue is an invalid error handler 14:11:51 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:51 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:51 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:51 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r1, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:51 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x8}]}) 14:11:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = getpid() timer_create(0x3, &(0x7f0000000440)={0x0, 0x1d, 0x1, @tid=r1}, 0x0) wait4(r1, &(0x7f00000000c0), 0x2, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:51 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(0xffffffffffffffff, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x805}) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x9, 0x4800) r1 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r1, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000100)={0xde, "0c9ef1"}, 0x6) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x13f, 0x1}}, 0x20) 14:11:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1619.196488][T27112] JFS: continue is an invalid error handler 14:11:51 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:51 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) socket$bt_rfcomm(0x1f, 0x2, 0x3) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r3}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, r3, 0x0, r2, 0xf) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r4, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) 14:11:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1619.309206][T27126] JFS: continue is an invalid error handler [ 1619.546940][T27115] jfs: Unrecognized mount option "hash" or missing value [ 1619.755200][T27138] jfs: Unrecognized mount option "hash" or missing value 14:11:52 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:52 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x1, 0x40) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2e000000060000000000000000000000000000000000000001000000000000000500000000ad8ba1cd4d36ee2b16d7f1290000007d657468310015bab7349c38f8250b6811a56269"], 0x2e) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:52 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x9}]}) 14:11:52 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000040)) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000100)={0x1, 0x0, 0x10001, 0x87cd}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000140)={r2, 0xa1a}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x4}) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r4) ioctl$IOC_PR_REGISTER(r4, 0x401870c8, &(0x7f00000000c0)={0x80000001, 0xfff}) 14:11:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:52 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:52 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = semget$private(0x0, 0x0, 0x120) semop(r1, 0x0, 0x0) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000040)=""/241) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1619.967220][T27150] JFS: continue is an invalid error handler 14:11:52 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1620.094208][T27160] JFS: continue is an invalid error handler 14:11:52 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:52 executing program 2: r0 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000580)=0x60, 0x80000) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x4b0) 14:11:52 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x541d, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1620.278417][T27151] jfs: Unrecognized mount option "hash" or missing value 14:11:52 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:52 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0xa}]}) 14:11:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:52 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r2}, 0x0) sched_getparam(r2, &(0x7f00000000c0)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x80240, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast1}}, {}, r5}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r5, 0x1}}, 0x18) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:52 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1620.669994][T27182] JFS: continue [ 1620.669994][T27182] is an invalid error handler 14:11:52 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r2}, 0x0) sched_getparam(r2, &(0x7f00000000c0)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x80240, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast1}}, {}, r5}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r5, 0x1}}, 0x18) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:53 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x23, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1620.869597][T27200] JFS: continue [ 1620.869597][T27200] is an invalid error handler 14:11:53 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r2}, 0x0) sched_getparam(r2, &(0x7f00000000c0)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x80240, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast1}}, {}, r5}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r5, 0x1}}, 0x18) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1621.249306][T27190] jfs: Unrecognized mount option "hash" or missing value 14:11:53 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000040)) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:53 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:53 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0xb}]}) 14:11:53 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x48, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:53 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r2}, 0x0) sched_getparam(r2, &(0x7f00000000c0)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x80240, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast1}}, {}, r5}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r5, 0x1}}, 0x18) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:53 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000440)={0x0, 0x0, 0x3, 0x1d, 0x7e, &(0x7f0000000040)="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"}) 14:11:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, 0x0) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1621.607245][T27220] JFS: continue is an invalid error handler 14:11:53 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) open_by_handle_at(r0, &(0x7f0000000040)={0x1008, 0x1, "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"}, 0x4100) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1621.713612][T27236] JFS: continue is an invalid error handler 14:11:54 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:54 executing program 1: r0 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000580)=0x60, 0x80000) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="7f454c4601029405060000000000000003000300010000000c030000000000004000000000000000be01000000000000fdffffff07003800010080000000000051e57464b200000005000000000000007f00000000000000ff070000000000002f000000000000004555000000000000008000000000000051e574640000010002000000000000009f1b0000000000009e0000000000000004000000000000008100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e52c729e55c2363b43e275213a99c9b5eeea063bb9f32e59a712f4019b2978078cd04cb86f6f5db227b2586194364ae4409665b755c865a01e502cdac897b90c456a6c463007bd718d591ed837acc60993fd598e34b0099c88dfdc4e9c1d264ab179a563a95b3dc9b426a83d5a9b"], 0x4b0) 14:11:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, 0x0) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:54 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0xc}]}) [ 1622.056122][T27251] JFS: continue is an invalid error handler [ 1622.123149][T27234] jfs: Unrecognized mount option "hash" or missing value [ 1622.200354][T27255] JFS: continue is an invalid error handler 14:11:54 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:54 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) ioctl$TIOCGPTLCK(r1, 0x80045439, &(0x7f0000000040)) 14:11:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, 0x0) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:54 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x68, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:54 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0xd}]}) 14:11:54 executing program 2: r0 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f00000000c0)={r1, r2, 0x27, 0xdd, &(0x7f0000000200)="41f4e5d5c516e6e29b6998fb86f3e618e428e4ba5f134b656d746ed1de59c511af33ed83ab0f31e36c17037e8e5abb885eaf93d2f1f761d1abd18984cbd5001d8ca1010b23ca566f713098d444433f9404f23cbb6c6ba31ec80b881e3290f6088f92f1defec14834fb8d4035e2a8945bd6e9fa81ac7353947d47d8c47325f741b6f927e462c80cf88d72615c50aafe9f036e5bf8d527e0f0e826723911c9c35cf22243830fa610ab7b59c551b63e91afc92f2dbb066d7eba33b212dd266794a61ebaebd7f93e5a8ce29f063af68b00363a8d5a75814e25b0b0a4cff951", 0x4, 0x81, 0x2, 0xff01, 0x6, 0x1, 0x10001, 'syz0\x00'}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:54 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1622.579609][T27266] JFS: continue is an invalid error handler 14:11:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_IRQP_SET(r3, 0x4008700c, 0x1a95) 14:11:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1622.727679][T27278] JFS: continue is an invalid error handler 14:11:55 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000100)) r4 = openat(r3, &(0x7f0000000040)='./file0\x00', 0x400000, 0x120) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x7a, &(0x7f0000000080)={r7, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000080)={0x7, 0xfff, 0x8005, 0x401, 0x4, 0x8, 0x8, 0x6aa, r7}, 0x20) 14:11:55 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1623.149245][T27270] jfs: Unrecognized mount option "hash" or missing value 14:11:55 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:55 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0xe}]}) 14:11:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:11:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_REG(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x60, 0x0, 0x304, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}, @NL80211_ATTR_REG_RULES={0x24, 0x22, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xffffffff}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x1}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x5}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x1009}]}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_RULES={0xc, 0x22, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x3}]}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x6080}, 0x40c08cd) ioctl$KDGKBENT(r1, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) 14:11:55 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:55 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x74, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1623.577573][T27302] JFS: continue is an invalid error handler 14:11:55 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$uinput_user_dev(r3, &(0x7f0000000040)={'syz0\x00', {0x3, 0x0, 0x3, 0x6}, 0x38, [0x5, 0x7, 0x10001, 0x400, 0xea3e, 0x4, 0x7fffffff, 0xffff8000, 0x5, 0x5, 0x3f, 0x0, 0x3, 0x48, 0x8, 0x2, 0x1f, 0x18000000, 0x5, 0x3, 0x3, 0x2, 0x8000, 0x8, 0x7f, 0x846c, 0xff, 0x6, 0x2d5, 0xffffffff, 0x0, 0x9, 0xb8f, 0xfffff801, 0x6, 0x49, 0x3, 0x2000000, 0x400, 0x1ff, 0x4, 0x7ff, 0x9, 0x7, 0x80000000, 0xff, 0x7ff, 0x9, 0x0, 0x0, 0x3, 0x3, 0x80, 0x7fff, 0xffff, 0x40, 0xfffffffe, 0xffff2b6e, 0x1ff, 0x4, 0x20, 0xffffffff, 0x0, 0x4], [0xffff, 0x10000, 0x10001, 0x800, 0x96, 0x4, 0x7fffffff, 0x7, 0x5515, 0x1, 0x7ff, 0xff, 0x0, 0x9, 0x2, 0x3, 0x4, 0x9, 0x10001, 0x3ff, 0x90c, 0x5, 0x5, 0x80000, 0x0, 0x3, 0x7, 0x0, 0x6, 0x3, 0x4, 0x9, 0xa5, 0x10000, 0xffffffff, 0x5, 0x6, 0x2, 0xfff, 0x7, 0x9, 0x9, 0x401, 0x401, 0xe000, 0xbf7d, 0x758, 0x37a, 0x0, 0x4, 0x3, 0x7, 0x3f, 0xfffffff9, 0xfffffffa, 0xb36, 0x3f, 0x5, 0x7fffffff, 0xcd, 0xaf3, 0x94, 0xfffffffb, 0x7f], [0xfff, 0x8, 0x7fffffff, 0x0, 0x94, 0x7c, 0x9, 0x4, 0x91c, 0xffffffff, 0x9, 0x1, 0x1, 0x6, 0x0, 0x4f, 0x2, 0x0, 0xfffff801, 0x4, 0x5, 0x3, 0x8, 0x1000, 0x6, 0xfffffffa, 0x7fff, 0x9c, 0x6, 0x7fff, 0xffff, 0x6, 0x6, 0x2, 0x7f, 0xffff, 0x81, 0x42, 0x4, 0x0, 0x40, 0x2, 0x0, 0x1ff, 0x686, 0x100, 0x3120, 0x3, 0xe581, 0xffffff01, 0x10001, 0x9, 0xfffffff8, 0x5, 0x7fffffff, 0x3, 0x8, 0x1, 0x100, 0x6, 0xfffff21a, 0x8, 0xe4e1, 0xcb82], [0x0, 0x6, 0xffff8000, 0x0, 0x9, 0x3, 0x1, 0x2, 0x3, 0xac0, 0x0, 0x1, 0x3ff, 0x6, 0x40, 0x7, 0x6, 0x7, 0x0, 0x3, 0x7f, 0x6, 0x3f, 0x6, 0x9, 0xaafc, 0x1, 0x8000, 0x40b, 0xf8, 0x8, 0x9, 0x7, 0x8, 0x9, 0x10001, 0xffff6c4d, 0xf3, 0xb0ce, 0xfffffffb, 0x9, 0xffffffff, 0x3f, 0x4, 0x12, 0x8, 0x1069, 0x3ff, 0x6, 0x7, 0x10000, 0x3ff, 0x3, 0x7, 0x9, 0x1, 0x20, 0x4, 0x1, 0x3, 0x1f, 0x55861946, 0x9, 0x9]}, 0x45c) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00'}) sendmsg$BATADV_CMD_TP_METER(r0, 0x0, 0x0) 14:11:55 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1623.775026][T27314] JFS: continue is an invalid error handler 14:11:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00'}) sendmsg$BATADV_CMD_TP_METER(r0, 0x0, 0x0) 14:11:56 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:56 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1624.251380][T27308] jfs: Unrecognized mount option "hash" or missing value 14:11:56 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:56 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0xf}]}) 14:11:56 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x9, 0x5}) 14:11:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00'}) sendmsg$BATADV_CMD_TP_METER(r0, 0x0, 0x0) 14:11:56 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:56 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00'}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 1624.592316][T27340] JFS: continue is an invalid error handler 14:11:56 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:56 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000000c0)='.mime_typeselinuxeth0)%proc{\x00') r4 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCSERGETLSR(r4, 0x5459, &(0x7f0000000080)) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 14:11:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) [ 1624.751449][T27349] JFS: continue is an invalid error handler 14:11:57 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000040)) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000000c0)={0x80000001, 0x0, 0x2, 0x50}) r4 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r4, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) ioctl$IMGETCOUNT(r4, 0x80044943, &(0x7f0000000140)) r5 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x40, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f00000001c0)='htcp\x00', 0x5) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000100)={0xfffffffffffffe01, r3}) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r6, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) 14:11:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00'}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 1625.364015][T27345] jfs: Unrecognized mount option "hash" or missing value 14:11:57 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:57 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000200)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="7000e100", @ANYRES16=r3, @ANYBLOB="00042abd7000fddbdf250c0000002400028006000f000800000006000e004e2400000800030004000000080008007f000000080005000200000030000380080001000000000006000400ff07000008000300040000001400020073797a6b616c6c657230000000000000"], 0x3}, 0x1, 0x0, 0x0, 0x40000}, 0x800) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:57 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:57 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x10}]}) 14:11:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00'}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 14:11:57 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000040)) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000000c0)={0x80000001, 0x0, 0x2, 0x50}) r4 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r4, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) ioctl$IMGETCOUNT(r4, 0x80044943, &(0x7f0000000140)) r5 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x40, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f00000001c0)='htcp\x00', 0x5) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000100)={0xfffffffffffffe01, r3}) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r6, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) [ 1625.780470][T27374] JFS: continue is an invalid error handler 14:11:58 executing program 2: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="8c", 0x0, 0xfffffffffffffffb) keyctl$get_security(0xb, r0, &(0x7f0000000140), 0x0) r1 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r1, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{@fixed}, {}, {@none}]}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r2, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00'}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 14:11:58 executing program 1 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1625.948865][T27379] JFS: continue is an invalid error handler [ 1626.031145][T27386] FAULT_INJECTION: forcing a failure. [ 1626.031145][T27386] name failslab, interval 1, probability 0, space 0, times 0 [ 1626.044795][T27386] CPU: 0 PID: 27386 Comm: syz-executor.1 Not tainted 5.6.0-rc1-syzkaller #0 [ 1626.053653][T27386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1626.064531][T27386] Call Trace: [ 1626.068124][T27386] dump_stack+0x11d/0x187 [ 1626.072584][T27386] should_fail.cold+0x5/0xf [ 1626.077627][T27386] __should_failslab+0x82/0xb0 [ 1626.082496][T27386] should_failslab+0x5/0xf [ 1626.086999][T27386] __kmalloc+0x54/0x640 [ 1626.091402][T27386] ? tomoyo_realpath_from_path+0x85/0x3d0 [ 1626.097156][T27386] tomoyo_realpath_from_path+0x85/0x3d0 [ 1626.102899][T27386] tomoyo_path_number_perm+0xff/0x360 [ 1626.108746][T27386] ? _parse_integer+0x12f/0x150 [ 1626.114273][T27386] ? __fget_files+0xa2/0x1c0 [ 1626.118895][T27386] tomoyo_file_ioctl+0x28/0x40 [ 1626.123680][T27386] security_file_ioctl+0x69/0xa0 [ 1626.128632][T27386] ksys_ioctl+0x5a/0x150 [ 1626.133287][T27386] __x64_sys_ioctl+0x47/0x60 [ 1626.137930][T27386] do_syscall_64+0xc7/0x390 [ 1626.142481][T27386] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1626.148380][T27386] RIP: 0033:0x45c849 [ 1626.152286][T27386] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1626.172314][T27386] RSP: 002b:00007f1323566c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:11:58 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:58 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, &(0x7f0000000040)={0x6, 0x80}) 14:11:58 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x11}]}) [ 1626.181748][T27386] RAX: ffffffffffffffda RBX: 00007f13235676d4 RCX: 000000000045c849 [ 1626.190615][T27386] RDX: 0000000020000000 RSI: 0000000000005609 RDI: 0000000000000004 [ 1626.199422][T27386] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1626.207427][T27386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1626.216281][T27386] R13: 0000000000000372 R14: 00000000004c5e44 R15: 0000000000000000 [ 1626.276399][T27386] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1626.316510][T27395] JFS: continue is an invalid error handler [ 1626.426992][T27398] JFS: continue is an invalid error handler 14:11:59 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:11:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00'}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 14:11:59 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x481, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x2}) 14:11:59 executing program 1 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:11:59 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x12}]}) 14:11:59 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:11:59 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000040)={0x0, 0xfd, 0x5}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000080)={0xa20000, 0xffffffff, 0x6568331b, r0, 0x0, &(0x7f0000000000)={0x9a090d, 0x3, [], @ptr=0x35b8}}) ioctl$KDGKBDIACR(r4, 0x4b4a, &(0x7f00000000c0)=""/109) [ 1626.904157][T27413] JFS: continue is an invalid error handler [ 1626.936532][T27412] FAULT_INJECTION: forcing a failure. [ 1626.936532][T27412] name failslab, interval 1, probability 0, space 0, times 0 14:11:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00'}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 1626.957406][T27412] CPU: 1 PID: 27412 Comm: syz-executor.1 Not tainted 5.6.0-rc1-syzkaller #0 [ 1626.966534][T27412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1626.979184][T27412] Call Trace: [ 1626.982558][T27412] dump_stack+0x11d/0x187 [ 1626.982585][T27412] should_fail.cold+0x5/0xf [ 1626.982616][T27412] __should_failslab+0x82/0xb0 [ 1626.982636][T27412] should_failslab+0x5/0xf [ 1626.982713][T27412] __kmalloc+0x54/0x640 [ 1626.982733][T27412] ? tomoyo_encode2.part.0+0xd0/0x240 14:11:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1626.982769][T27412] tomoyo_encode2.part.0+0xd0/0x240 14:11:59 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x13}]}) [ 1626.982791][T27412] tomoyo_encode+0x32/0x50 [ 1626.982813][T27412] tomoyo_realpath_from_path+0x11e/0x3d0 [ 1626.982842][T27412] tomoyo_path_number_perm+0xff/0x360 [ 1626.982860][T27412] ? _parse_integer+0x12f/0x150 [ 1626.982967][T27412] ? __fget_files+0xa2/0x1c0 [ 1626.982997][T27412] tomoyo_file_ioctl+0x28/0x40 [ 1626.983022][T27412] security_file_ioctl+0x69/0xa0 14:11:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1626.983096][T27412] ksys_ioctl+0x5a/0x150 [ 1626.983117][T27412] __x64_sys_ioctl+0x47/0x60 [ 1626.983141][T27412] do_syscall_64+0xc7/0x390 [ 1626.983167][T27412] entry_SYSCALL_64_after_hwframe+0x44/0xa9 14:11:59 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1626.983179][T27412] RIP: 0033:0x45c849 [ 1626.983200][T27412] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1626.983210][T27412] RSP: 002b:00007f1323566c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1626.983298][T27412] RAX: ffffffffffffffda RBX: 00007f13235676d4 RCX: 000000000045c849 [ 1626.983309][T27412] RDX: 0000000020000000 RSI: 0000000000005609 RDI: 0000000000000004 [ 1626.983320][T27412] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1626.983331][T27412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1626.983341][T27412] R13: 0000000000000372 R14: 00000000004c5e44 R15: 0000000000000001 [ 1627.041087][T27422] JFS: continue is an invalid error handler [ 1627.069371][T27412] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1627.337266][T27429] JFS: continue is an invalid error handler [ 1627.484043][T27432] JFS: continue is an invalid error handler 14:12:00 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:12:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:12:00 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x14}]}) 14:12:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:00 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xc, [@ptr={0xe, 0x0, 0x0, 0x2, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x9, [{0xa, 0x5, 0x8}]}]}, {0x0, [0x61, 0x5f, 0x30, 0x0, 0x1e, 0x5f, 0x61, 0x30, 0x61, 0x0]}}, &(0x7f00000000c0)=""/27, 0x48, 0x1b}, 0x20) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:00 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1628.046827][T27450] JFS: continue is an invalid error handler 14:12:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:12:00 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r1, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x7a, &(0x7f0000000080)={r4, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)={r4, 0x1a, "ab9e4aec8b198effc14f0e0a3ee8fcd5d75546eb0186ed8913e8"}, &(0x7f0000000080)=0x22) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={r5, 0x1}, 0x8) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1628.206109][T27456] JFS: continue is an invalid error handler 14:12:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:12:00 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x15}]}) 14:12:00 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfbc, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1628.510055][T27470] JFS: continue is an invalid error handler [ 1628.592392][T27474] JFS: continue is an invalid error handler 14:12:01 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xbc0f, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:12:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:01 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x2, 0x0, 0x5}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x74, 0x0, 0x8, 0x70bd28, 0x25dfdbff, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_macvtap\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'geneve1\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x4044800}, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGETD(r4, 0x5424, &(0x7f0000000180)) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r7) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x280026, &(0x7f0000000300)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@obj_type={'obj_type', 0x3d, 'geneve1\x00'}}]}}) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) close(r5) 14:12:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:12:01 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x16}]}) 14:12:01 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:12:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x24}}, 0x0) 14:12:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b2f, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1629.141083][T27487] JFS: continue is an invalid error handler [ 1629.293311][T27498] JFS: continue is an invalid error handler 14:12:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x24}}, 0x0) 14:12:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b30, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:01 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x17}]}) 14:12:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x24}}, 0x0) [ 1629.607932][T27508] JFS: continue is an invalid error handler [ 1629.714470][T27511] JFS: continue is an invalid error handler 14:12:02 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:12:02 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1f00, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:12:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b31, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x0) 14:12:02 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) r2 = socket(0x10, 0x802, 0x0) setsockopt$sock_int(r2, 0x1, 0x400000042, &(0x7f0000000000), 0x9e) r3 = accept4$packet(r2, &(0x7f0000000040), &(0x7f0000000080)=0x14, 0x800) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f00000000c0)={0x20000008}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000140)={0x5, 0x27, 0x1}) 14:12:02 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x18}]}) 14:12:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b32, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1630.301406][T27525] JFS: continue is an invalid error handler 14:12:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x0) 14:12:02 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000040)) syz_open_dev$tty20(0xc, 0x4, 0x1) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 14:12:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b33, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1630.483136][T27534] JFS: continue is an invalid error handler 14:12:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x0) 14:12:02 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x19}]}) [ 1630.822799][T27547] JFS: continue is an invalid error handler [ 1630.953860][T27549] JFS: continue is an invalid error handler 14:12:03 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xff00, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:12:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b34, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:03 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_uring_enter(r4, 0xbc3b, 0x9, 0x4, &(0x7f0000000100)={[0x4]}, 0x8) close(r1) socketpair(0x2f, 0x5, 0xf4f, &(0x7f00000000c0)) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000040)={0x0, 0x5, 0xffff, 0x2, 0x6, "631d2a9a196a2449"}) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00'}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x0) 14:12:03 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:12:03 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x1a}]}) 14:12:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00'}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x0) 14:12:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b35, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1631.367281][T27561] JFS: continue is an invalid error handler [ 1631.466647][T27567] JFS: continue is an invalid error handler 14:12:03 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, 0x0, 0x8, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40800) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBENT(r2, 0x5609, &(0x7f0000000000)={0x0, 0x7, 0x5}) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x60001) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000001400)="9635", 0x2}, {&(0x7f0000000340)='>U', 0x2}], 0x2) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000028442, 0x0) r5 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r5, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @adiantum, 0x3, "cce1cac5372700b1"}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) fsync(r4) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r6, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, r7, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000010}, 0x4004) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f00000004c0)={0x9c0000, 0x80000001, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000000480)={0x9d0ab9, 0x95, [], @ptr=0x9}}) 14:12:03 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x1b}]}) 14:12:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b36, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00'}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x28}}, 0x0) [ 1631.823029][T27584] JFS: continue is an invalid error handler [ 1631.943074][T27587] JFS: continue is an invalid error handler 14:12:04 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xff0f, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:12:04 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40000) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r1, 0xc0884113, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x3}) close(r1) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000040)={0x10004, 0x0, &(0x7f0000ffd000/0x2000)=nil}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000200)=""/181) ioctl$KDGKBENT(r2, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00'}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:12:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b37, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:04 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:12:04 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x1c}]}) 14:12:04 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f00000000c0)=""/194) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r6) ioctl$KDGKBENT(r6, 0x5609, &(0x7f0000000000)={0x4, 0xa2, 0x5}) [ 1632.519365][T27599] JFS: continue is an invalid error handler 14:12:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b3a, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00'}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1632.640938][T27606] JFS: continue is an invalid error handler 14:12:05 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x1d}]}) 14:12:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b3b, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00'}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1632.972646][T27621] JFS: continue is an invalid error handler [ 1633.089930][T27627] JFS: continue is an invalid error handler 14:12:05 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x80040, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:12:05 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0xc1, 0x8001, 0x20, 0x2, 0x7}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x4, 0x0, 0x8}) 14:12:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b3c, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:05 executing program 3 (fault-call:5 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:12:05 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2300, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:12:05 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x1e}]}) [ 1633.633545][T27642] FAULT_INJECTION: forcing a failure. [ 1633.633545][T27642] name failslab, interval 1, probability 0, space 0, times 0 [ 1633.642449][T27638] JFS: continue is an invalid error handler [ 1633.689416][T27642] CPU: 1 PID: 27642 Comm: syz-executor.3 Not tainted 5.6.0-rc1-syzkaller #0 [ 1633.698134][T27642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1633.708200][T27642] Call Trace: [ 1633.711601][T27642] dump_stack+0x11d/0x187 [ 1633.718174][T27642] should_fail.cold+0x5/0xf [ 1633.723730][T27642] __should_failslab+0x82/0xb0 [ 1633.728560][T27642] should_failslab+0x5/0xf [ 1633.733050][T27642] kmem_cache_alloc_node+0x35/0x680 [ 1633.738270][T27642] __alloc_skb+0x8d/0x360 [ 1633.742640][T27642] netlink_sendmsg+0x662/0x8a0 [ 1633.747423][T27642] ? netlink_unicast+0x4c0/0x4c0 [ 1633.752494][T27642] sock_sendmsg+0x98/0xc0 [ 1633.756855][T27642] ____sys_sendmsg+0x493/0x4c0 [ 1633.761778][T27642] ___sys_sendmsg+0xb5/0x100 [ 1633.766387][T27642] ? __rcu_read_unlock+0x66/0x2f0 [ 1633.771432][T27642] ? __fget_files+0xa2/0x1c0 [ 1633.776081][T27642] ? __fget_light+0xc0/0x1a0 [ 1633.780872][T27642] ? __fdget+0x29/0x30 [ 1633.785016][T27642] ? sockfd_lookup_light+0xa5/0x100 [ 1633.790247][T27642] __sys_sendmsg+0x9b/0x150 [ 1633.794782][T27642] __x64_sys_sendmsg+0x4c/0x60 [ 1633.799614][T27642] do_syscall_64+0xc7/0x390 [ 1633.804175][T27642] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1633.810090][T27642] RIP: 0033:0x45c849 [ 1633.814129][T27642] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:12:06 executing program 2: ioctl$KDGKBENT(0xffffffffffffffff, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1633.836928][T27642] RSP: 002b:00007f59badc8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1633.846002][T27642] RAX: ffffffffffffffda RBX: 00007f59badc96d4 RCX: 000000000045c849 [ 1633.855557][T27642] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1633.864575][T27642] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1633.873116][T27642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1633.881460][T27642] R13: 00000000000008f9 R14: 00000000004cb9cd R15: 0000000000000000 14:12:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b3d, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1633.960037][T27648] JFS: continue is an invalid error handler 14:12:06 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000040), &(0x7f0000001a40)=0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x240140, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r1, 0x101, 0xc, &(0x7f0000000040), &(0x7f0000001a40)=0x4) r2 = getpid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x1d, 0x6, @tid=r2}, 0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000100)=r2) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r3, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x86e}) 14:12:06 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x21}]}) 14:12:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b40, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:06 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x5, 0x0, 0x7}) [ 1634.237685][T27658] JFS: continue! is an invalid error handler [ 1634.374148][T27664] JFS: continue! is an invalid error handler 14:12:06 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x400000, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:12:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b41, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:06 executing program 3 (fault-call:5 fault-nth:1): perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:12:06 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x410400, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000002c0)=0x1e, 0x4) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000001c0)={0x4, 0xae, 0x0, 'queue1\x00', 0x8b}) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="00fb55022000000000000040000000000000000000bbcddd4a46f5314fa9670ed8c847c23088c6056d82c3ba8dc00c585576333bbdb0067797d1211cf11cf4906340e4af886bfa2157c586819fbb48f9621aba3029"], 0x1, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x424600, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000180)=@gcm_128={{0x303}, "c3179139de12be19", "4752d2263533668fadbf3b7e5cfe56f5", "90b34d74", "33269117bd11da9f"}, 0x28) r3 = socket$unix(0x1, 0x1, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r4) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = fcntl$dupfd(r3, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) iopl(0x6) ioctl$KVM_IRQ_LINE(r6, 0x4008ae61, &(0x7f0000000300)={0x8, 0x80000000}) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r7, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:06 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:12:06 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x22}]}) [ 1634.828061][T27677] FAULT_INJECTION: forcing a failure. [ 1634.828061][T27677] name failslab, interval 1, probability 0, space 0, times 0 [ 1634.847757][T27677] CPU: 1 PID: 27677 Comm: syz-executor.3 Not tainted 5.6.0-rc1-syzkaller #0 [ 1634.847778][T27677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1634.868168][T27677] Call Trace: [ 1634.868200][T27677] dump_stack+0x11d/0x187 [ 1634.868308][T27677] should_fail.cold+0x5/0xf [ 1634.868335][T27677] __should_failslab+0x82/0xb0 [ 1634.868352][T27677] should_failslab+0x5/0xf [ 1634.868373][T27677] kmem_cache_alloc_node_trace+0x37/0x610 14:12:07 executing program 3 (fault-call:5 fault-nth:2): perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1634.868399][T27677] ? memcg_kmem_put_cache+0x77/0xc0 [ 1634.868420][T27677] ? debug_smp_processor_id+0x3f/0x129 [ 1634.868441][T27677] ? kmem_cache_alloc_node+0x1bb/0x680 [ 1634.868468][T27677] __kmalloc_reserve.isra.0+0x43/0xd0 [ 1634.868563][T27677] __alloc_skb+0xbe/0x360 [ 1634.868590][T27677] netlink_sendmsg+0x662/0x8a0 [ 1634.868676][T27677] ? netlink_unicast+0x4c0/0x4c0 [ 1634.868745][T27677] sock_sendmsg+0x98/0xc0 [ 1634.868766][T27677] ____sys_sendmsg+0x493/0x4c0 [ 1634.868795][T27677] ___sys_sendmsg+0xb5/0x100 [ 1634.868876][T27677] ? __rcu_read_unlock+0x66/0x2f0 [ 1634.868907][T27677] ? __fget_files+0xa2/0x1c0 14:12:07 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x23}]}) [ 1634.868931][T27677] ? __fget_light+0xc0/0x1a0 14:12:07 executing program 3 (fault-call:5 fault-nth:3): perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1634.868952][T27677] ? __fdget+0x29/0x30 [ 1634.869000][T27677] ? sockfd_lookup_light+0xa5/0x100 [ 1634.869023][T27677] __sys_sendmsg+0x9b/0x150 [ 1634.869055][T27677] __x64_sys_sendmsg+0x4c/0x60 [ 1634.869121][T27677] do_syscall_64+0xc7/0x390 [ 1634.869147][T27677] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1634.869161][T27677] RIP: 0033:0x45c849 [ 1634.869182][T27677] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1634.869190][T27677] RSP: 002b:00007f59badc8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1634.869205][T27677] RAX: ffffffffffffffda RBX: 00007f59badc96d4 RCX: 000000000045c849 [ 1634.869215][T27677] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1634.869224][T27677] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1634.869233][T27677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1634.869242][T27677] R13: 00000000000008f9 R14: 00000000004cb9cd R15: 0000000000000001 [ 1634.879995][T27678] JFS: continue" is an invalid error handler [ 1634.975609][T27683] JFS: continue" is an invalid error handler [ 1635.073774][T27686] FAULT_INJECTION: forcing a failure. [ 1635.073774][T27686] name failslab, interval 1, probability 0, space 0, times 0 [ 1635.073803][T27686] CPU: 0 PID: 27686 Comm: syz-executor.3 Not tainted 5.6.0-rc1-syzkaller #0 [ 1635.073812][T27686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1635.073817][T27686] Call Trace: [ 1635.073914][T27686] dump_stack+0x11d/0x187 [ 1635.073941][T27686] should_fail.cold+0x5/0xf [ 1635.074013][T27686] __should_failslab+0x82/0xb0 [ 1635.074030][T27686] should_failslab+0x5/0xf [ 1635.074048][T27686] kmem_cache_alloc+0x23/0x5e0 [ 1635.074065][T27686] ? should_fail+0x7c/0x2fd [ 1635.074093][T27686] skb_clone+0xf4/0x280 [ 1635.074115][T27686] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1635.074196][T27686] netlink_deliver_tap+0x45a/0x4d0 [ 1635.074226][T27686] netlink_unicast+0x41f/0x4c0 [ 1635.074264][T27686] netlink_sendmsg+0x4cf/0x8a0 [ 1635.074292][T27686] ? netlink_unicast+0x4c0/0x4c0 [ 1635.074311][T27686] sock_sendmsg+0x98/0xc0 [ 1635.074332][T27686] ____sys_sendmsg+0x493/0x4c0 [ 1635.074375][T27686] ___sys_sendmsg+0xb5/0x100 [ 1635.074397][T27686] ? __rcu_read_unlock+0x66/0x2f0 [ 1635.074418][T27686] ? __fget_files+0xa2/0x1c0 [ 1635.074441][T27686] ? __fget_light+0xc0/0x1a0 [ 1635.074508][T27686] ? __fdget+0x29/0x30 [ 1635.074526][T27686] ? sockfd_lookup_light+0xa5/0x100 [ 1635.074549][T27686] __sys_sendmsg+0x9b/0x150 [ 1635.074580][T27686] __x64_sys_sendmsg+0x4c/0x60 [ 1635.074601][T27686] do_syscall_64+0xc7/0x390 [ 1635.074623][T27686] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1635.074635][T27686] RIP: 0033:0x45c849 [ 1635.074714][T27686] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1635.074723][T27686] RSP: 002b:00007f59badc8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1635.074739][T27686] RAX: ffffffffffffffda RBX: 00007f59badc96d4 RCX: 000000000045c849 [ 1635.074749][T27686] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1635.074759][T27686] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1635.074768][T27686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1635.074778][T27686] R13: 00000000000008f9 R14: 00000000004cb9cd R15: 0000000000000002 [ 1635.250453][T27691] FAULT_INJECTION: forcing a failure. [ 1635.250453][T27691] name failslab, interval 1, probability 0, space 0, times 0 [ 1635.281694][T27690] JFS: continue# is an invalid error handler [ 1635.288049][T27691] CPU: 0 PID: 27691 Comm: syz-executor.3 Not tainted 5.6.0-rc1-syzkaller #0 [ 1635.288060][T27691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1635.288065][T27691] Call Trace: [ 1635.288106][T27691] dump_stack+0x11d/0x187 [ 1635.655247][T27691] should_fail.cold+0x5/0xf [ 1635.655276][T27691] __should_failslab+0x82/0xb0 [ 1635.655294][T27691] should_failslab+0x5/0xf [ 1635.655313][T27691] kmem_cache_alloc+0x23/0x5e0 [ 1635.655334][T27691] ? delay_tsc+0x8a/0xb0 [ 1635.655401][T27691] skb_clone+0xf4/0x280 [ 1635.655464][T27691] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1635.655488][T27691] dev_queue_xmit_nit+0x2b8/0x600 [ 1635.655517][T27691] dev_hard_start_xmit+0x3ed/0x420 [ 1635.655543][T27691] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1635.655591][T27691] __dev_queue_xmit+0x14c4/0x1b80 [ 1635.655617][T27691] ? memcg_kmem_put_cache+0x77/0xc0 14:12:08 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1635.655639][T27691] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1635.655673][T27691] ? skb_clone+0x132/0x280 [ 1635.655696][T27691] dev_queue_xmit+0x1e/0x30 [ 1635.655795][T27691] netlink_deliver_tap+0x406/0x4d0 [ 1635.655865][T27691] netlink_unicast+0x41f/0x4c0 [ 1635.655891][T27691] netlink_sendmsg+0x4cf/0x8a0 [ 1635.655918][T27691] ? netlink_unicast+0x4c0/0x4c0 [ 1635.655938][T27691] sock_sendmsg+0x98/0xc0 [ 1635.655960][T27691] ____sys_sendmsg+0x493/0x4c0 [ 1635.656041][T27691] ___sys_sendmsg+0xb5/0x100 [ 1635.656064][T27691] ? __rcu_read_unlock+0x66/0x2f0 [ 1635.656086][T27691] ? __fget_files+0xa2/0x1c0 [ 1635.656109][T27691] ? __fget_light+0xc0/0x1a0 [ 1635.656129][T27691] ? __fdget+0x29/0x30 [ 1635.656157][T27691] ? sockfd_lookup_light+0xa5/0x100 [ 1635.656182][T27691] __sys_sendmsg+0x9b/0x150 [ 1635.656216][T27691] __x64_sys_sendmsg+0x4c/0x60 [ 1635.656240][T27691] do_syscall_64+0xc7/0x390 [ 1635.656266][T27691] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1635.656280][T27691] RIP: 0033:0x45c849 [ 1635.656354][T27691] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1635.656364][T27691] RSP: 002b:00007f59badc8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1635.656380][T27691] RAX: ffffffffffffffda RBX: 00007f59badc96d4 RCX: 000000000045c849 [ 1635.656389][T27691] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1635.656399][T27691] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1635.656409][T27691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1635.656418][T27691] R13: 00000000000008f9 R14: 00000000004cb9cd R15: 0000000000000003 14:12:08 executing program 3 (fault-call:5 fault-nth:4): perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:12:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b44, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1636.011783][T27699] JFS: continue# is an invalid error handler [ 1636.172388][T27704] FAULT_INJECTION: forcing a failure. [ 1636.172388][T27704] name failslab, interval 1, probability 0, space 0, times 0 [ 1636.246424][T27704] CPU: 0 PID: 27704 Comm: syz-executor.3 Not tainted 5.6.0-rc1-syzkaller #0 [ 1636.255614][T27704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1636.265924][T27704] Call Trace: [ 1636.269283][T27704] dump_stack+0x11d/0x187 [ 1636.273852][T27704] should_fail.cold+0x5/0xf [ 1636.278406][T27704] __should_failslab+0x82/0xb0 [ 1636.283177][T27704] should_failslab+0x5/0xf [ 1636.287615][T27704] kmem_cache_alloc_node_trace+0x37/0x610 [ 1636.293365][T27704] ? memcg_kmem_put_cache+0x77/0xc0 [ 1636.298586][T27704] ? debug_smp_processor_id+0x3f/0x129 [ 1636.304615][T27704] ? kmem_cache_alloc_node+0x1bb/0x680 [ 1636.310609][T27704] __kmalloc_reserve.isra.0+0x43/0xd0 [ 1636.317064][T27704] __alloc_skb+0xbe/0x360 [ 1636.321461][T27704] batadv_netlink_tp_meter_start+0xa6/0x240 [ 1636.329537][T27704] ? batadv_pre_doit+0x180/0x4b0 [ 1636.334537][T27704] genl_rcv_msg+0x409/0x8c0 [ 1636.339419][T27704] netlink_rcv_skb+0xaf/0x260 [ 1636.344169][T27704] ? genl_family_rcv_msg_attrs_parse+0x1f0/0x1f0 [ 1636.350526][T27704] genl_rcv+0x2e/0x40 [ 1636.355078][T27704] netlink_unicast+0x390/0x4c0 [ 1636.360362][T27704] netlink_sendmsg+0x4cf/0x8a0 [ 1636.366199][T27704] ? netlink_unicast+0x4c0/0x4c0 [ 1636.371365][T27704] sock_sendmsg+0x98/0xc0 [ 1636.375712][T27704] ____sys_sendmsg+0x493/0x4c0 [ 1636.380570][T27704] ___sys_sendmsg+0xb5/0x100 [ 1636.385237][T27704] ? __rcu_read_unlock+0x66/0x2f0 [ 1636.390286][T27704] ? __fget_files+0xa2/0x1c0 [ 1636.394890][T27704] ? __fget_light+0xc0/0x1a0 [ 1636.399938][T27704] ? __fdget+0x29/0x30 [ 1636.404016][T27704] ? sockfd_lookup_light+0xa5/0x100 [ 1636.409237][T27704] __sys_sendmsg+0x9b/0x150 [ 1636.413840][T27704] __x64_sys_sendmsg+0x4c/0x60 [ 1636.418617][T27704] do_syscall_64+0xc7/0x390 [ 1636.423147][T27704] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1636.429039][T27704] RIP: 0033:0x45c849 [ 1636.432965][T27704] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1636.453048][T27704] RSP: 002b:00007f59badc8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1636.461469][T27704] RAX: ffffffffffffffda RBX: 00007f59badc96d4 RCX: 000000000045c849 [ 1636.469526][T27704] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1636.478722][T27704] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1636.486758][T27704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 14:12:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:12:08 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x2000, 0x0) close(r1) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000280)={0x1, 0x0, 0x1000, 0xe0, &(0x7f00000003c0)="e7a71f00ced75d1e072aa5ca46d0a24f1a244e9fda56f7dc673e05ef90282e9f2fd1c1a271adea5e388f607371ae63045c9bb8c6ea1b4566273927c6c76a396ba3bfcb068b5eda7b2c3d41f717b507c4d04046450cb0ddde9d5b603475f9ff22f6f0530bd6a901c2ebe083189d54278ee2f12ff5746be4cab822c6a2526d80fd57116be7b6d5ccb188c5a8ee2f7f2f0403ea4b0d7072c47e3f4b700f30139a232f5d572877a6e9070b96874f8e61fd9c6f83823d79af5941734375b0b6cf7ec246461000f7e7127e16d120c6bca23e6f11d49dff06157671d82bdb340ccb4880", 0x3d, 0x0, &(0x7f0000000240)="3fa367cd4f15d95c4bedda8a36212a2e718431ec932accaef5cd9381260cc4c233fe7aef3b03e2d7f6d8e67d27da17e8ffb010879c816c4bc536546e2e"}) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000040)={0x87, 0xad4, 0x31, 0x2, 0x800, 0x8000}) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000340)='security.ima\x00', &(0x7f0000000380)=@v1={0x2, "0861ebdc102a7a31c6d9999f64ad9c"}, 0x10, 0x2) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x800, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r2, 0x4008550d, &(0x7f0000000100)) ioctl$SNDCTL_DSP_SETFRAGMENT(r2, 0xc004500a, &(0x7f0000000300)=0xffffffff) 14:12:08 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x24}]}) 14:12:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b45, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1636.494822][T27704] R13: 00000000000008f9 R14: 00000000004cb9cd R15: 0000000000000004 14:12:08 executing program 3 (fault-call:5 fault-nth:5): perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:12:08 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000140)=0x3) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x6, 0x9, 0x9}) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x3ed, 0x100, 0x70bd2b, 0x25dfdbfe, "a8bbce582d768f0362f0311a5f33606ab0e84e0dddb2c969", ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000004}, 0x888) [ 1636.639021][T27713] JFS: continue$ is an invalid error handler 14:12:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1636.726940][T27721] FAULT_INJECTION: forcing a failure. [ 1636.726940][T27721] name failslab, interval 1, probability 0, space 0, times 0 [ 1636.749990][T27722] JFS: continue$ is an invalid error handler [ 1636.765488][T27721] CPU: 1 PID: 27721 Comm: syz-executor.3 Not tainted 5.6.0-rc1-syzkaller #0 14:12:09 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1636.774214][T27721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1636.784458][T27721] Call Trace: [ 1636.784492][T27721] dump_stack+0x11d/0x187 [ 1636.784521][T27721] should_fail.cold+0x5/0xf [ 1636.784551][T27721] __should_failslab+0x82/0xb0 [ 1636.784571][T27721] should_failslab+0x5/0xf [ 1636.784592][T27721] kmem_cache_alloc_node_trace+0x37/0x610 [ 1636.784664][T27721] ? memcg_kmem_put_cache+0x77/0xc0 [ 1636.784685][T27721] ? debug_smp_processor_id+0x3f/0x129 14:12:09 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x25}]}) 14:12:09 executing program 3 (fault-call:5 fault-nth:6): perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1636.784707][T27721] ? kmem_cache_alloc_node+0x1bb/0x680 [ 1636.784795][T27721] __kmalloc_reserve.isra.0+0x43/0xd0 [ 1636.784833][T27721] __alloc_skb+0xbe/0x360 [ 1636.784861][T27721] batadv_netlink_tp_meter_start+0xa6/0x240 [ 1636.784900][T27721] ? batadv_pre_doit+0x180/0x4b0 [ 1636.784928][T27721] genl_rcv_msg+0x409/0x8c0 [ 1636.785078][T27721] netlink_rcv_skb+0xaf/0x260 [ 1636.785103][T27721] ? genl_family_rcv_msg_attrs_parse+0x1f0/0x1f0 [ 1636.785259][T27721] genl_rcv+0x2e/0x40 [ 1636.785279][T27721] netlink_unicast+0x390/0x4c0 [ 1636.785307][T27721] netlink_sendmsg+0x4cf/0x8a0 [ 1636.785366][T27721] ? netlink_unicast+0x4c0/0x4c0 [ 1636.785391][T27721] sock_sendmsg+0x98/0xc0 [ 1636.785476][T27721] ____sys_sendmsg+0x493/0x4c0 14:12:09 executing program 3 (fault-call:5 fault-nth:7): perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1636.785510][T27721] ___sys_sendmsg+0xb5/0x100 [ 1636.785533][T27721] ? __rcu_read_unlock+0x66/0x2f0 [ 1636.785556][T27721] ? __fget_files+0xa2/0x1c0 [ 1636.785581][T27721] ? __fget_light+0xc0/0x1a0 [ 1636.785603][T27721] ? __fdget+0x29/0x30 [ 1636.785621][T27721] ? sockfd_lookup_light+0xa5/0x100 [ 1636.785683][T27721] __sys_sendmsg+0x9b/0x150 [ 1636.785755][T27721] __x64_sys_sendmsg+0x4c/0x60 [ 1636.785786][T27721] do_syscall_64+0xc7/0x390 [ 1636.785813][T27721] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1636.785826][T27721] RIP: 0033:0x45c849 [ 1636.785847][T27721] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1636.785856][T27721] RSP: 002b:00007f59badc8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1636.785874][T27721] RAX: ffffffffffffffda RBX: 00007f59badc96d4 RCX: 000000000045c849 [ 1636.785932][T27721] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1636.785943][T27721] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1636.785959][T27721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1636.785969][T27721] R13: 00000000000008f9 R14: 00000000004cb9cd R15: 0000000000000005 [ 1637.093152][T27734] FAULT_INJECTION: forcing a failure. [ 1637.093152][T27734] name failslab, interval 1, probability 0, space 0, times 0 [ 1637.093174][T27734] CPU: 0 PID: 27734 Comm: syz-executor.3 Not tainted 5.6.0-rc1-syzkaller #0 [ 1637.093184][T27734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1637.093190][T27734] Call Trace: [ 1637.093218][T27734] dump_stack+0x11d/0x187 [ 1637.093241][T27734] should_fail.cold+0x5/0xf [ 1637.093279][T27734] __should_failslab+0x82/0xb0 [ 1637.093367][T27734] should_failslab+0x5/0xf [ 1637.093386][T27734] kmem_cache_alloc_trace+0x26/0x5f0 [ 1637.093439][T27734] ? batadv_tp_list_find+0x197/0x200 [ 1637.093462][T27734] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1637.093483][T27734] batadv_tp_start+0x1c4/0x880 [ 1637.093513][T27734] batadv_netlink_tp_meter_start+0x112/0x240 [ 1637.093664][T27734] genl_rcv_msg+0x409/0x8c0 [ 1637.093783][T27734] netlink_rcv_skb+0xaf/0x260 [ 1637.093807][T27734] ? genl_family_rcv_msg_attrs_parse+0x1f0/0x1f0 [ 1637.093835][T27734] genl_rcv+0x2e/0x40 [ 1637.093855][T27734] netlink_unicast+0x390/0x4c0 [ 1637.093890][T27734] netlink_sendmsg+0x4cf/0x8a0 [ 1637.093961][T27734] ? netlink_unicast+0x4c0/0x4c0 [ 1637.093984][T27734] sock_sendmsg+0x98/0xc0 [ 1637.094007][T27734] ____sys_sendmsg+0x493/0x4c0 [ 1637.094039][T27734] ___sys_sendmsg+0xb5/0x100 [ 1637.094080][T27734] ? __rcu_read_unlock+0x66/0x2f0 [ 1637.094103][T27734] ? __fget_files+0xa2/0x1c0 [ 1637.094129][T27734] ? __fget_light+0xc0/0x1a0 [ 1637.094153][T27734] ? __fdget+0x29/0x30 [ 1637.094172][T27734] ? sockfd_lookup_light+0xa5/0x100 [ 1637.094198][T27734] __sys_sendmsg+0x9b/0x150 [ 1637.094234][T27734] __x64_sys_sendmsg+0x4c/0x60 [ 1637.094279][T27734] do_syscall_64+0xc7/0x390 [ 1637.094306][T27734] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1637.094320][T27734] RIP: 0033:0x45c849 [ 1637.094403][T27734] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1637.094412][T27734] RSP: 002b:00007f59badc8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1637.094429][T27734] RAX: ffffffffffffffda RBX: 00007f59badc96d4 RCX: 000000000045c849 [ 1637.094439][T27734] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1637.094450][T27734] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1637.094461][T27734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1637.094472][T27734] R13: 00000000000008f9 R14: 00000000004cb9cd R15: 0000000000000006 [ 1637.108581][T27732] JFS: continue% is an invalid error handler [ 1637.191158][T27736] JFS: continue% is an invalid error handler [ 1637.256775][T27739] FAULT_INJECTION: forcing a failure. [ 1637.256775][T27739] name failslab, interval 1, probability 0, space 0, times 0 14:12:09 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x26}]}) [ 1637.561259][T27739] CPU: 1 PID: 27739 Comm: syz-executor.3 Not tainted 5.6.0-rc1-syzkaller #0 [ 1637.570904][T27739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1637.570923][T27739] Call Trace: [ 1637.585224][T27739] dump_stack+0x11d/0x187 [ 1637.589652][T27739] should_fail.cold+0x5/0xf [ 1637.594247][T27739] ? batadv_tp_receiver_shutdown+0x310/0x310 [ 1637.600289][T27739] __should_failslab+0x82/0xb0 [ 1637.605064][T27739] should_failslab+0x5/0xf [ 1637.609587][T27739] kmem_cache_alloc_trace+0x26/0x5f0 [ 1637.609607][T27739] ? chacha_block_generic+0x103/0x130 [ 1637.609638][T27739] ? batadv_tp_receiver_shutdown+0x310/0x310 [ 1637.609658][T27739] __kthread_create_on_node+0x9f/0x2b0 [ 1637.609685][T27739] ? batadv_tp_receiver_shutdown+0x310/0x310 [ 1637.609706][T27739] kthread_create_on_node+0x72/0xa0 [ 1637.609729][T27739] ? batadv_tp_list_find+0x197/0x200 [ 1637.609769][T27739] ? init_timer_key+0x7c/0x170 [ 1637.609792][T27739] batadv_tp_start+0x726/0x880 [ 1637.609830][T27739] batadv_netlink_tp_meter_start+0x112/0x240 [ 1637.609859][T27739] genl_rcv_msg+0x409/0x8c0 [ 1637.609904][T27739] netlink_rcv_skb+0xaf/0x260 14:12:10 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:12:10 executing program 3 (fault-call:5 fault-nth:8): perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:12:10 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) [ 1637.609927][T27739] ? genl_family_rcv_msg_attrs_parse+0x1f0/0x1f0 [ 1637.609956][T27739] genl_rcv+0x2e/0x40 [ 1637.610047][T27739] netlink_unicast+0x390/0x4c0 [ 1637.610075][T27739] netlink_sendmsg+0x4cf/0x8a0 [ 1637.610102][T27739] ? netlink_unicast+0x4c0/0x4c0 14:12:10 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x27}]}) 14:12:10 executing program 3 (fault-call:5 fault-nth:9): perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1637.610123][T27739] sock_sendmsg+0x98/0xc0 [ 1637.610145][T27739] ____sys_sendmsg+0x493/0x4c0 [ 1637.610248][T27739] ___sys_sendmsg+0xb5/0x100 [ 1637.610273][T27739] ? __rcu_read_unlock+0x66/0x2f0 [ 1637.610297][T27739] ? __fget_files+0xa2/0x1c0 [ 1637.610324][T27739] ? __fget_light+0xc0/0x1a0 [ 1637.610348][T27739] ? __fdget+0x29/0x30 [ 1637.610368][T27739] ? sockfd_lookup_light+0xa5/0x100 [ 1637.610393][T27739] __sys_sendmsg+0x9b/0x150 [ 1637.610468][T27739] __x64_sys_sendmsg+0x4c/0x60 [ 1637.610493][T27739] do_syscall_64+0xc7/0x390 [ 1637.610518][T27739] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1637.610531][T27739] RIP: 0033:0x45c849 [ 1637.610553][T27739] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1637.610562][T27739] RSP: 002b:00007f59badc8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1637.610579][T27739] RAX: ffffffffffffffda RBX: 00007f59badc96d4 RCX: 000000000045c849 [ 1637.610590][T27739] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1637.610600][T27739] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1637.610611][T27739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1637.610622][T27739] R13: 00000000000008f9 R14: 00000000004cb9cd R15: 0000000000000007 [ 1637.623883][T27739] batman_adv: batadv: cannot create tp meter kthread [ 1637.657688][T27741] JFS: continue& is an invalid error handler [ 1637.756326][T27746] JFS: continue& is an invalid error handler [ 1637.890051][T27749] FAULT_INJECTION: forcing a failure. [ 1637.890051][T27749] name failslab, interval 1, probability 0, space 0, times 0 [ 1637.890097][T27749] CPU: 1 PID: 27749 Comm: syz-executor.3 Not tainted 5.6.0-rc1-syzkaller #0 [ 1637.890106][T27749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1637.890111][T27749] Call Trace: [ 1637.890139][T27749] dump_stack+0x11d/0x187 [ 1637.890164][T27749] should_fail.cold+0x5/0xf [ 1637.890250][T27749] __should_failslab+0x82/0xb0 [ 1637.890279][T27749] should_failslab+0x5/0xf [ 1637.890297][T27749] kmem_cache_alloc+0x23/0x5e0 [ 1637.890321][T27749] ? skb_free_head+0x6a/0x80 [ 1637.890345][T27749] skb_clone+0xf4/0x280 [ 1637.890368][T27749] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1637.890424][T27749] netlink_deliver_tap+0x45a/0x4d0 [ 1637.890445][T27749] ? netlink_attachskb+0x1d8/0x4a0 [ 1637.890490][T27749] __netlink_sendskb+0x3b/0x70 [ 1637.890509][T27749] netlink_unicast+0x46d/0x4c0 [ 1637.890589][T27749] batadv_netlink_tp_meter_start+0x1d5/0x240 [ 1637.890614][T27749] genl_rcv_msg+0x409/0x8c0 [ 1637.890722][T27749] netlink_rcv_skb+0xaf/0x260 [ 1637.890743][T27749] ? genl_family_rcv_msg_attrs_parse+0x1f0/0x1f0 [ 1637.890767][T27749] genl_rcv+0x2e/0x40 [ 1637.890786][T27749] netlink_unicast+0x390/0x4c0 [ 1637.890833][T27749] netlink_sendmsg+0x4cf/0x8a0 [ 1637.890859][T27749] ? netlink_unicast+0x4c0/0x4c0 [ 1637.890931][T27749] sock_sendmsg+0x98/0xc0 [ 1637.890952][T27749] ____sys_sendmsg+0x493/0x4c0 [ 1637.891060][T27749] ___sys_sendmsg+0xb5/0x100 [ 1637.891163][T27749] ? __rcu_read_unlock+0x66/0x2f0 [ 1637.891188][T27749] ? __fget_files+0xa2/0x1c0 [ 1637.891211][T27749] ? __fget_light+0xc0/0x1a0 [ 1637.891232][T27749] ? __fdget+0x29/0x30 [ 1637.891251][T27749] ? sockfd_lookup_light+0xa5/0x100 [ 1637.891286][T27749] __sys_sendmsg+0x9b/0x150 [ 1637.891346][T27749] __x64_sys_sendmsg+0x4c/0x60 [ 1637.891368][T27749] do_syscall_64+0xc7/0x390 [ 1637.891392][T27749] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1637.891405][T27749] RIP: 0033:0x45c849 [ 1637.891426][T27749] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1637.891435][T27749] RSP: 002b:00007f59badc8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1637.891453][T27749] RAX: ffffffffffffffda RBX: 00007f59badc96d4 RCX: 000000000045c849 [ 1637.891463][T27749] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1637.891473][T27749] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1637.891483][T27749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1637.891493][T27749] R13: 00000000000008f9 R14: 00000000004cb9cd R15: 0000000000000008 [ 1638.079584][T27757] JFS: continue' is an invalid error handler [ 1638.090520][T27759] FAULT_INJECTION: forcing a failure. [ 1638.090520][T27759] name failslab, interval 1, probability 0, space 0, times 0 [ 1638.090541][T27759] CPU: 0 PID: 27759 Comm: syz-executor.3 Not tainted 5.6.0-rc1-syzkaller #0 [ 1638.090551][T27759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1638.090555][T27759] Call Trace: [ 1638.090585][T27759] dump_stack+0x11d/0x187 [ 1638.090642][T27759] should_fail.cold+0x5/0xf [ 1638.090670][T27759] __should_failslab+0x82/0xb0 [ 1638.090689][T27759] should_failslab+0x5/0xf [ 1638.090708][T27759] kmem_cache_alloc+0x23/0x5e0 [ 1638.090731][T27759] ? __kthread_create_on_node+0x23f/0x2b0 [ 1638.090752][T27759] ? skb_free_head+0x6a/0x80 [ 1638.090775][T27759] skb_clone+0xf4/0x280 [ 1638.090817][T27759] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1638.090843][T27759] netlink_deliver_tap+0x45a/0x4d0 [ 1638.090866][T27759] ? netlink_attachskb+0x1d8/0x4a0 [ 1638.090967][T27759] __netlink_sendskb+0x3b/0x70 [ 1638.090989][T27759] netlink_unicast+0x46d/0x4c0 [ 1638.091018][T27759] batadv_netlink_tp_meter_start+0x1d5/0x240 [ 1638.091044][T27759] genl_rcv_msg+0x409/0x8c0 [ 1638.091159][T27759] netlink_rcv_skb+0xaf/0x260 [ 1638.091183][T27759] ? genl_family_rcv_msg_attrs_parse+0x1f0/0x1f0 [ 1638.091207][T27759] genl_rcv+0x2e/0x40 [ 1638.091227][T27759] netlink_unicast+0x390/0x4c0 [ 1638.091254][T27759] netlink_sendmsg+0x4cf/0x8a0 [ 1638.091283][T27759] ? netlink_unicast+0x4c0/0x4c0 [ 1638.091318][T27759] sock_sendmsg+0x98/0xc0 [ 1638.091417][T27759] ____sys_sendmsg+0x493/0x4c0 [ 1638.091453][T27759] ___sys_sendmsg+0xb5/0x100 [ 1638.091488][T27759] ? __rcu_read_unlock+0x66/0x2f0 [ 1638.091512][T27759] ? __fget_files+0xa2/0x1c0 [ 1638.091608][T27759] ? __fget_light+0xc0/0x1a0 [ 1638.091631][T27759] ? __fdget+0x29/0x30 [ 1638.091651][T27759] ? sockfd_lookup_light+0xa5/0x100 [ 1638.091675][T27759] __sys_sendmsg+0x9b/0x150 [ 1638.091728][T27759] __x64_sys_sendmsg+0x4c/0x60 [ 1638.091751][T27759] do_syscall_64+0xc7/0x390 [ 1638.091775][T27759] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1638.091788][T27759] RIP: 0033:0x45c849 [ 1638.091810][T27759] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1638.091819][T27759] RSP: 002b:00007f59badc8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1638.091872][T27759] RAX: ffffffffffffffda RBX: 00007f59badc96d4 RCX: 000000000045c849 [ 1638.091883][T27759] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1638.091894][T27759] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1638.091905][T27759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1638.091916][T27759] R13: 00000000000008f9 R14: 00000000004cb9cd R15: 0000000000000009 [ 1638.187276][T27761] JFS: continue' is an invalid error handler 14:12:11 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x80040, 0x0) ioctl$KDENABIO(r1, 0x4b36) 14:12:11 executing program 3 (fault-call:5 fault-nth:10): perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:12:11 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x28}]}) 14:12:11 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:12:11 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:12:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b47, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1639.442625][T27772] JFS: continue( is an invalid error handler 14:12:11 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000080)={0x0, 0xfe, 0xbf84}) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x800000000003f, 0x82400) r1 = socket$unix(0x1, 0x2, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r4, 0x40045532, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r4, 0xc10c5541, &(0x7f00000000c0)={0x2, 0xce}) ioctl$PIO_CMAP(r3, 0x4b71, &(0x7f0000000000)={0x0, 0x9, 0x3ef, 0xdd, 0x401, 0x10}) [ 1639.564518][T27783] JFS: continue( is an invalid error handler 14:12:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b48, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:11 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000040)=""/139) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000180)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r5, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x100}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x60}]}, 0x44}, 0x1, 0x0, 0x0, 0x4004000}, 0x20000014) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCL_BLANKSCREEN(r3, 0x541c, &(0x7f0000000100)) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x7a, &(0x7f0000000080)={r8, 0x0, 0x0, 0x7bcf}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000002c0)={r8, 0x7, 0x9}, 0x8) 14:12:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:12:12 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x29}]}) 14:12:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:12 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBENT(r2, 0x5609, &(0x7f0000000000)={0x0, 0x7f, 0x9}) 14:12:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1639.957887][T27799] JFS: continue) is an invalid error handler [ 1640.064809][T27806] JFS: continue) is an invalid error handler 14:12:12 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:12:12 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, r2, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_DOMAIN={0xe, 0x1, ':security\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast2}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @rand_addr="ad0fdd04a6bf7d8184f4baa221bfebe3"}]}, 0x88}, 0x1, 0x0, 0x0, 0x450}, 0x8002) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b4a, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:12 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:12:12 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2a}]}) 14:12:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1640.546113][T27823] JFS: continue* is an invalid error handler 14:12:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b4b, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:12 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x5609, &(0x7f0000000000)={0x0, 0x0, 0x5}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$SNDCTL_DSP_GETTRIGGER(r1, 0x80045010, &(0x7f0000000040)) 14:12:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1640.661200][T27832] JFS: continue* is an invalid error handler 14:12:13 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2b}]}) 14:12:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:12:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b4c, &(0x7f0000000000)={0x0, 0x0, 0x5}) [ 1640.943434][T27845] JFS: continue+ is an invalid error handler [ 1641.034509][T27852] JFS: continue+ is an invalid error handler 14:12:13 executing program 5: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}]}) 14:12:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x6, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:12:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b4d, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:13 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f0000000200)={[{@discard_size={'discard'}}], [{@hash='hash'}]}) 14:12:13 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue'}]}) 14:12:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x7, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:12:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b4e, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b52, &(0x7f0000000000)={0x0, 0x0, 0x5}) 14:12:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x8, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) 14:12:14 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@errors_continue='errors=continue', 0x2d}]}) [ 1642.021390][ T4424] ================================================================== [ 1642.029502][ T4424] BUG: KCSAN: data-race in ps2_do_sendbyte / ps2_handle_ack [ 1642.037467][ T4424] [ 1642.039801][ T4424] write to 0xffff8881290e8040 of 8 bytes by interrupt on cpu 1: [ 1642.047433][ T4424] ps2_handle_ack+0xe0/0x220 [ 1642.052132][ T4424] atkbd_interrupt+0x628/0xcc0 [ 1642.056911][ T4424] serio_interrupt+0x66/0xf0 [ 1642.061706][ T4424] i8042_interrupt+0x2dd/0x510 14:12:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000180)={0x0, 0x9, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) [ 1642.067307][ T4424] __handle_irq_event_percpu+0x99/0x430 [ 1642.072872][ T4424] handle_irq_event_percpu+0x4b/0xd0 [ 1642.078266][ T4424] handle_irq_event+0x7e/0xbe [ 1642.082950][ T4424] handle_edge_irq+0x170/0x460 [ 1642.087722][ T4424] do_IRQ+0x76/0x120 [ 1642.091630][ T4424] ret_from_intr+0x0/0x21 [ 1642.095968][ T4424] _raw_spin_unlock_irqrestore+0x4d/0x80 [ 1642.102622][ T4424] hrtimer_start_range_ns+0x467/0x680 [ 1642.108188][ T4424] do_nanosleep+0xfa/0x320 [ 1642.112610][ T4424] hrtimer_nanosleep+0x136/0x230 [ 1642.117553][ T4424] __x64_sys_nanosleep+0x14b/0x190 [ 1642.122678][ T4424] do_syscall_64+0xc7/0x390 [ 1642.127198][ T4424] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1642.133087][ T4424] [ 1642.135436][ T4424] read to 0xffff8881290e8040 of 8 bytes by task 4424 on cpu 0: [ 1642.143005][ T4424] ps2_do_sendbyte+0x116/0x320 [ 1642.147784][ T4424] __ps2_command+0x2b8/0x9f0 [ 1642.153178][ T4424] ps2_command+0x5c/0xc0 [ 1642.158383][ T4424] atkbd_set_repeat_rate+0x1f0/0x240 [ 1642.164739][ T4424] atkbd_event_work+0xa9/0xf0 [ 1642.169427][ T4424] process_one_work+0x424/0x930 [ 1642.175247][ T4424] worker_thread+0x9a/0x7e0 [ 1642.179802][ T4424] kthread+0x1cb/0x1f0 [ 1642.183903][ T4424] ret_from_fork+0x1f/0x30 [ 1642.188312][ T4424] [ 1642.190637][ T4424] Reported by Kernel Concurrency Sanitizer on: [ 1642.196796][ T4424] CPU: 0 PID: 4424 Comm: kworker/0:5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1642.205149][ T4424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1642.215223][ T4424] Workqueue: events atkbd_event_work [ 1642.221471][ T4424] ================================================================== [ 1642.229562][ T4424] Kernel panic - not syncing: panic_on_warn set ... [ 1642.236163][ T4424] CPU: 0 PID: 4424 Comm: kworker/0:5 Not tainted 5.6.0-rc1-syzkaller #0 [ 1642.244528][ T4424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1642.254911][ T4424] Workqueue: events atkbd_event_work [ 1642.254922][ T4424] Call Trace: [ 1642.254952][ T4424] dump_stack+0x11d/0x187 [ 1642.254979][ T4424] panic+0x210/0x640 [ 1642.255003][ T4424] ? vprintk_func+0x89/0x13a [ 1642.255030][ T4424] kcsan_report.cold+0xc/0xf [ 1642.255058][ T4424] kcsan_setup_watchpoint+0x3fb/0x440 [ 1642.255083][ T4424] ps2_do_sendbyte+0x116/0x320 [ 1642.255106][ T4424] ? finish_wait+0x80/0x80 [ 1642.255130][ T4424] __ps2_command+0x2b8/0x9f0 [ 1642.255160][ T4424] ? __update_load_avg_cfs_rq+0x280/0x2f0 [ 1642.255182][ T4424] ps2_command+0x5c/0xc0 [ 1642.255203][ T4424] atkbd_set_repeat_rate+0x1f0/0x240 [ 1642.255235][ T4424] atkbd_event_work+0xa9/0xf0 [ 1642.255256][ T4424] process_one_work+0x424/0x930 [ 1642.255285][ T4424] worker_thread+0x9a/0x7e0 [ 1642.255317][ T4424] ? rescuer_thread+0x6a0/0x6a0 [ 1642.255333][ T4424] kthread+0x1cb/0x1f0 [ 1642.255351][ T4424] ? kthread_unpark+0xd0/0xd0 [ 1642.255371][ T4424] ret_from_fork+0x1f/0x30 [ 1642.256812][ T4424] Kernel Offset: disabled [ 1642.354366][ T4424] Rebooting in 86400 seconds..