cute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:24 executing program 0: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f00000000c0)=0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x1d, 0x3, 0x7, "3ad65c18497496ec3e324c56ed0f42af", "abeeca0970b190b7"}, 0x1d, 0x1) 03:19:24 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffff,fffffffd']) 03:19:24 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xff%ffffffffffffd']) 03:19:24 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:24 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x0, 0x1, 0x4, 0x0}, 0x20) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000000)=""/23) getpid() [ 1978.085892] gfs2: invalid mount option: statfs_quantum=0xff%ffffffffffffd [ 1978.094362] gfs2: invalid mount option: fffffffd [ 1978.115190] gfs2: can't parse mount arguments [ 1978.120569] gfs2: can't parse mount arguments 03:19:24 executing program 0: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x7, 0x8200, 0x3f, 0x1, r1}, &(0x7f0000000140)=0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) 03:19:24 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 1978.218311] gfs2: invalid mount option: statfs_quantum=0xff%ffffffffffffd [ 1978.226615] gfs2: invalid mount option: fffffffd [ 1978.231607] gfs2: can't parse mount arguments [ 1978.254278] gfs2: can't parse mount arguments 03:19:24 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xff,ffffffffffffd']) 03:19:24 executing program 0: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, 0x6, [@default, @bcast, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) fallocate(r3, 0x40, 0x0, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000980)={0x8, 0x5}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x1, 0x0) migrate_pages(r1, 0x6e4, &(0x7f00000009c0)=0x6, &(0x7f0000000a00)=0x2) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000200)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getuid() stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = geteuid() getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) write$FUSE_DIRENTPLUS(r4, &(0x7f00000006c0)={0x2a8, 0xfffffffffffffffe, 0x2, [{{0x6, 0x1, 0x100000000, 0x9, 0x800, 0x2c, {0x4, 0x1f, 0x9, 0x3, 0x400, 0x0, 0x7, 0x2, 0xa6, 0x0, 0x8001, r5, r6, 0xffffffff, 0x3ff}}, {0x2, 0x6, 0x25, 0x6, 'ppp0@md5sum\'em0,-wlan0\\vboxnet0eth1:@'}}, {{0xaf, 0x1, 0x3, 0x6, 0x8459, 0x4, {0x6, 0x5ddb, 0xc8be000000, 0x6, 0x8001, 0x4, 0x100000001, 0x1f, 0x6, 0x80000000, 0xfffffffffffffff7, r7, r8, 0xc85, 0x7fffffff}}, {0x0, 0x200, 0x0, 0x6}}, {{0x2, 0x0, 0x9, 0x7, 0x40, 0x2a, {0x3, 0xff, 0x4, 0x40, 0x9, 0x7fff, 0x0, 0x3, 0x4, 0x8, 0xfffffffffffffffb, r9, r10, 0x5, 0x7fffffff}}, {0x3, 0x4, 0xf, 0x9, 'locpuset{%bdev-'}}, {{0x4, 0x3, 0x3, 0x4c, 0x7ddc, 0x6000000000000, {0x0, 0x100, 0x20, 0x4cf3, 0x6, 0x9, 0xfffffffffffffffa, 0x6, 0x0, 0x7, 0x8000000000000, r11, r12, 0xf58, 0xff}}, {0x6, 0x3, 0x0, 0x235b}}]}, 0x2a8) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f0000000080)) socket$kcm(0x29, 0x1, 0x0) 03:19:24 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 1978.457853] gfs2: invalid mount option: ffffffffffffd [ 1978.497337] gfs2: can't parse mount arguments [ 1978.561194] gfs2: invalid mount option: ffffffffffffd [ 1978.579419] gfs2: can't parse mount arguments 03:19:25 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) r1 = open(&(0x7f0000000200)='./file0\x00', 0x400, 0x108) perf_event_open(0x0, 0x0, 0x0, r1, 0xfffffffffffffffe) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xfe27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r5, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000300)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000340)=0x20) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setns(r4, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r4, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r7, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r7, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$CAPI_GET_SERIAL(r3, 0xc0044308, &(0x7f0000000240)=0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x660c, 0xfffffffffffffffe) 03:19:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:25 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffff.fffffffd']) 03:19:25 executing program 0: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @loopback}, &(0x7f0000000080)=0xc) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, 0x0, 0x5, 0x3, 0x400, 0x80000000, 0x0, r2}) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) 03:19:25 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xff.ffffffffffffd']) 03:19:25 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) recvfrom$ax25(r0, &(0x7f0000000500)=""/116, 0x74, 0x40000001, &(0x7f0000000580)={{0x3, @null, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000000)='c\x00\x00\x00\x00\x00\x00\x00\xff\x00'/19, 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000080)) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r3, 0x600, 0x1, 0x4, 0x0, 0xfffffffffffffdfc}, 0x4) r4 = request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000200)='%(@vboxnet1cpusetwlan1,\x00', 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000240)='encrypted\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) fstat(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r4, r5, r6) prctl$PR_SET_ENDIAN(0x14, 0x1) select(0x40, &(0x7f0000000400)={0xfffffffffffff000, 0x326, 0x6, 0x6275, 0x7, 0x6, 0x1, 0xffffffff}, &(0x7f0000000440)={0x8, 0x3, 0x401, 0x9, 0x9, 0x1, 0x3, 0x200}, &(0x7f0000000480)={0x7, 0xb2, 0x4, 0x7, 0x3f, 0x20, 0x3, 0x9}, &(0x7f00000004c0)={0x77359400}) getpid() [ 1979.201938] gfs2: invalid mount option: statfs_quantum=0xfffffff.fffffffd [ 1979.206254] gfs2: invalid mount option: statfs_quantum=0xff.ffffffffffffd [ 1979.228472] gfs2: can't parse mount arguments 03:19:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 1979.283092] gfs2: invalid mount option: statfs_quantum=0xff.ffffffffffffd [ 1979.287935] gfs2: can't parse mount arguments [ 1979.305470] gfs2: can't parse mount arguments 03:19:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:25 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xff/ffffffffffffd']) 03:19:25 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='/gr%\xeb6\xfc\x86e\xeb\xbd\x1f\x04\x00\x00\x00\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE h\b\xcf\x1f\x9b\xb6\xbd\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej*\xf8]\xe9\xdfyZ8\xfa\xbb\xe7[\xdc\xfc\x9b&\xf1&\x9f\x1f\xee\xf7\xb6p\x14\xc2\xa7B\x9c\vY\xf4\x8d\xc1\xc1\xa3\x856\xefh\x1f+\"\x01\x8e', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:25 executing program 0: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x402000, 0x0) recvfrom$ax25(r0, &(0x7f0000000500)=""/4096, 0x1000, 0x100, &(0x7f0000000080)={{0x3, @bcast, 0x4}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) [ 1979.415590] gfs2: invalid mount option: statfs_quantum=0xfffffff.fffffffd [ 1979.423317] gfs2: can't parse mount arguments 03:19:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 1979.536433] gfs2: invalid mount option: statfs_quantum=0xff/ffffffffffffd [ 1979.543821] gfs2: can't parse mount arguments [ 1979.671268] gfs2: invalid mount option: statfs_quantum=0xff/ffffffffffffd [ 1979.701596] gfs2: can't parse mount arguments 03:19:26 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='opicfr'], 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x0, 0x2, 0x4000000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) syncfs(r1) write$FUSE_BMAP(r1, &(0x7f00000000c0)={0x18, 0xffffffffffffffda, 0x5, {0x5}}, 0x18) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000200)) 03:19:26 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000300)=""/227) 03:19:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:26 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffff/fffffffd']) 03:19:26 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffeffffffffffffd']) 03:19:26 executing program 0: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='attr\x00') r1 = openat$cgroup_ro(r0, 0x0, 0x26e1, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000200)=0x4, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r2, 0x0, 0x67, &(0x7f0000000080)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4'}, 0x30) setpriority(0x0, r3, 0x77f) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) r5 = pkey_alloc(0x0, 0x0) pkey_free(r5) socket$kcm(0x29, 0x0, 0x0) ioctl$EVIOCSABS3F(r4, 0x401845ff, &(0x7f0000000000)={0x6, 0xffffffff, 0x7, 0x0, 0x54, 0x6}) 03:19:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 1980.059048] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 1980.086695] gfs2: invalid mount option: statfs_quantum=0xfffffff/fffffffd [ 1980.128592] gfs2: can't parse mount arguments [ 1980.148540] gfs2: can't parse mount arguments 03:19:26 executing program 0: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x8, 0xc010, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) [ 1980.251361] gfs2: statfs_quantum mount option requires a non-negative numeric argument 03:19:26 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffefffffffd']) 03:19:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 1980.328387] gfs2: can't parse mount arguments 03:19:26 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffgffffffffffffd']) 03:19:26 executing program 0: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, {0x48, 0x0, 0x8000000, 0x0, 0x1, 0x5}}, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) [ 1980.552629] gfs2: invalid mount option: statfs_quantum=0xffgffffffffffffd [ 1980.575382] gfs2: can't parse mount arguments [ 1980.621034] gfs2: invalid mount option: statfs_quantum=0xffgffffffffffffd [ 1980.659324] gfs2: can't parse mount arguments 03:19:27 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) write$USERIO_CMD_REGISTER(r2, &(0x7f00000000c0)={0x0, 0x4}, 0x2) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000004c0)={0x0, 0x4}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000540)={r6, 0x8}, 0x8) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_sys\x00', 0x2761, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e4) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r7, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r7, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000580)) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x2, {0x7ff, 0x1, "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", 0x9c, 0x5, 0x8001, 0xfffffffffffffffb, 0x9, 0x0, 0x8, 0x1}, r8}}, 0x128) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0xfffffffffffffffe) 03:19:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:27 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/mixer\x00', 0x7e, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x0, 0x0, [0x3, 0x6, 0x3, 0x81]}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(0x0, r2, 0x2, r3, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x58, &(0x7f0000000500)=[@in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e23, 0x7fff, @dev={0xfe, 0x80, [], 0x1a}, 0x800}, @in6={0xa, 0x4e22, 0x4, @ipv4={[], [], @loopback}, 0xff}]}, &(0x7f0000000300)=0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000580)={r7, 0xf9}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r6, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$sock_bt_bnep_BNEPGETCONNLIST(r4, 0x800442d2, &(0x7f0000000680)={0x2, &(0x7f0000000000)=[{}, {0x0, 0x0, 0x0, @dev}]}) setxattr$security_smack_entry(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='security.SMACK64MMAP\x00', &(0x7f0000000640)='memory.stat\x00', 0xc, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0x3cbc, 0x30, 0x3, 0x2, 0x10001}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000440)={r8, 0x100000000, 0x8}, 0x8) 03:19:27 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffgfffffffd']) 03:19:27 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfff\nfffffffffffd']) 03:19:27 executing program 0: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) 03:19:27 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0xffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 1980.871821] gfs2: invalid mount option: statfs_quantum=0xfff [ 1980.871821] fffffffffffd [ 1980.901969] gfs2: invalid mount option: statfs_quantum=0xfffffffgfffffffd [ 1980.959001] gfs2: can't parse mount arguments [ 1980.978024] gfs2: can't parse mount arguments 03:19:27 executing program 0: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) socket$kcm(0x29, 0x0, 0x0) 03:19:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:27 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfff\"fffffffffffd']) [ 1981.117296] gfs2: invalid mount option: statfs_quantum=0xfffffffgfffffffd [ 1981.154466] gfs2: can't parse mount arguments 03:19:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:27 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='/pids@\x00cpu /idma '], 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:19:27 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffff\nffffffd']) [ 1981.246784] gfs2: invalid mount option: statfs_quantum=0xfff"fffffffffffd [ 1981.254178] gfs2: can't parse mount arguments 03:19:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 1981.309243] gfs2: invalid mount option: statfs_quantum=0xfff"fffffffffffd [ 1981.348023] gfs2: can't parse mount arguments 03:19:27 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r2 = getpid() ptrace$cont(0x19, r2, 0x9, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:27 executing program 0: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000000)=r2, 0x12) socket$kcm(0x29, 0x0, 0x0) [ 1981.398460] gfs2: invalid mount option: statfs_quantum=0xffffffff [ 1981.398460] ffffffd 03:19:27 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfff%fffffffffffd']) [ 1981.452458] gfs2: can't parse mount arguments 03:19:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 1981.542103] gfs2: invalid mount option: statfs_quantum=0xffffffff [ 1981.542103] ffffffd [ 1981.552021] gfs2: invalid mount option: statfs_quantum=0xfff%fffffffffffd [ 1981.584701] gfs2: can't parse mount arguments [ 1981.589670] gfs2: can't parse mount arguments 03:19:28 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffff\"ffffffd']) 03:19:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 1981.696119] gfs2: invalid mount option: statfs_quantum=0xfff%fffffffffffd [ 1981.736104] gfs2: can't parse mount arguments 03:19:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:28 executing program 2: socket$kcm(0xa, 0x4000000003, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000080)={0x1, 0x5, 0x5da, 0x7, 0x8, 0x5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000380)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) r2 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f00000000c0)={0x2}) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:28 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfff,fffffffffffd']) [ 1981.940523] gfs2: invalid mount option: fffffffffffd [ 1981.971877] gfs2: can't parse mount arguments [ 1982.043225] gfs2: invalid mount option: fffffffffffd [ 1982.060395] gfs2: can't parse mount arguments 03:19:28 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='dma '], 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r6 = openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r6, 0xc02c5341, &(0x7f0000000200)) 03:19:28 executing program 0: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda5002c3) socket$kcm(0x29, 0x0, 0x0) 03:19:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:28 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000080)=0x1e) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:28 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfff.fffffffffffd']) 03:19:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 1982.305611] gfs2: invalid mount option: statfs_quantum=0xfff.fffffffffffd [ 1982.358934] gfs2: can't parse mount arguments [ 1982.365963] device bridge_slave_1 left promiscuous mode [ 1982.380179] bridge0: port 2(bridge_slave_1) entered disabled state [ 1982.414152] gfs2: invalid mount option: statfs_quantum=0xfff.fffffffffffd [ 1982.433852] gfs2: can't parse mount arguments [ 1982.445699] device bridge_slave_0 left promiscuous mode [ 1982.459858] bridge0: port 1(bridge_slave_0) entered disabled state 03:19:29 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfff/fffffffffffd']) [ 1982.628812] gfs2: invalid mount option: statfs_quantum=0xfff/fffffffffffd [ 1982.684782] gfs2: can't parse mount arguments [ 1982.758142] gfs2: invalid mount option: statfs_quantum=0xfff/fffffffffffd [ 1982.784181] gfs2: can't parse mount arguments [ 1982.908601] device hsr_slave_1 left promiscuous mode [ 1982.969825] device hsr_slave_0 left promiscuous mode [ 1983.019412] team0 (unregistering): Port device team_slave_1 removed [ 1983.062055] team0 (unregistering): Port device team_slave_0 removed [ 1983.103002] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1983.184167] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1983.370385] bond0 (unregistering): Released all slaves [ 1984.462784] IPVS: ftp: loaded support on port[0] = 21 [ 1984.676204] chnl_net:caif_netlink_parms(): no params data found [ 1984.737679] bridge0: port 1(bridge_slave_0) entered blocking state [ 1984.750861] bridge0: port 1(bridge_slave_0) entered disabled state [ 1984.758504] device bridge_slave_0 entered promiscuous mode [ 1984.777527] bridge0: port 2(bridge_slave_1) entered blocking state [ 1984.810525] bridge0: port 2(bridge_slave_1) entered disabled state [ 1984.819865] device bridge_slave_1 entered promiscuous mode [ 1984.872055] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1984.906746] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1984.947696] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1984.965584] team0: Port device team_slave_0 added [ 1984.972076] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1984.995708] team0: Port device team_slave_1 added [ 1985.001265] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1985.025354] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1985.097872] device hsr_slave_0 entered promiscuous mode [ 1985.136126] device hsr_slave_1 entered promiscuous mode [ 1985.205210] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1985.212420] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1985.267403] bridge0: port 2(bridge_slave_1) entered blocking state [ 1985.273849] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1985.280691] bridge0: port 1(bridge_slave_0) entered blocking state [ 1985.287471] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1985.425514] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1985.431750] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1985.467625] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1985.503648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1985.511688] bridge0: port 1(bridge_slave_0) entered disabled state [ 1985.535695] bridge0: port 2(bridge_slave_1) entered disabled state [ 1985.561197] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1985.580814] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1985.604711] 8021q: adding VLAN 0 to HW filter on device team0 [ 1985.627206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1985.636047] bridge0: port 1(bridge_slave_0) entered blocking state [ 1985.642424] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1985.649833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1985.657713] bridge0: port 2(bridge_slave_1) entered blocking state [ 1985.664091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1985.688622] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1985.697226] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1985.705506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1985.727165] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1985.735638] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1985.742945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1985.766177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1985.775402] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1985.781514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1985.815052] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1985.847617] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1985.923611] gfs2: invalid mount option: statfs_quantum=0xffffffff"ffffffd [ 1985.938087] gfs2: can't parse mount arguments [ 1986.001391] gfs2: invalid mount option: statfs_quantum=0xffffffff"ffffffd [ 1986.012623] gfs2: can't parse mount arguments 03:19:32 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffff%ffffffd']) 03:19:32 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f00000000c0)={0x3, r1}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$VIDIOC_G_AUDOUT(r2, 0x80345631, &(0x7f0000000000)) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000080)=0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r3, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:32 executing program 0: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0xda4fff08) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) 03:19:32 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) r2 = getpgrp(0xffffffffffffffff) write$FUSE_LK(r1, &(0x7f0000000440)={0x28, 0x0, 0x5, {{0xb67a, 0x7, 0x2, r2}}}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB='/pids \x00cpu /{dma '], 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r5, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f00000000c0)='.\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getegid() write$FUSE_ENTRY(r4, &(0x7f0000000340)={0x90, 0xfffffffffffffff5, 0x2, {0x5, 0x2, 0xe7c4, 0xff, 0x1ff, 0x1, {0x4, 0x4, 0x6, 0xfff, 0x100000001, 0x3, 0x8000, 0x73c8, 0x7, 0x7, 0x9, r6, r7, 0xff, 0x1}}}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r4, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r9, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r9, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x660c, 0xfffffffffffffffe) 03:19:32 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffefffffffffffd']) 03:19:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(0x0) [ 1986.118384] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 1986.154523] gfs2: can't parse mount arguments 03:19:32 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f00000000c0)={0x1, 0x3, 0x6, 0xb3a, 0x4, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r5, &(0x7f0000000c40)='cpua|\x14\'\x0eqE\xdcsagk_all\x00\xd8~\xf5\xad`x\x05\x00\x04\x00\x00\x00\x00\xc8\x11o\xb0\x0f\xd6\xc5\xeb\xa1\xc5r,\xe8\x93\xe5>\x89]\x9e,=\x98\xa5\x9d\xf0M?\x0e\xf5:;\xc6\x0e\x83\xb8\x932\x02\x9azk6\xef\xff\xe3\xd7\x7f$G\xcb\xfb)\x90\x947^\xb6\x03\xdd\x05\x91\xdd\xb2a\xa5!\xc4\x92\xb5\x9b\xeaA$\xea\xf1W\xca)\xb5DnD\xb2\xae\xd3ql2\xbd\xf4\xc3z]\xbb\xc7Z\xed\xd1\xcd\x96+\xc5\xe8\x1b\x8d\x85P4\xee\xec\xa0w\fa{? \xd7,1\xe7\xf3\xd4\xbf\xa7\x0e\xc4N\xe0<\'hQS\xd2C\f\xf7MG\xe1\x8a\xb6\xd5\xba\x1b\xdaE\xa7.\x86\n\xfd\xdb\xbb\x009_\xc1\xf4\x88\xe2\xe3\x8d)\x92\xe3\x19\xe7\xbc\x1e;a\xbc\x8da\r\xc0\\i\xee7\'\xdd\x95\f/2\xca\x9a\x95d\xa4\xc6Z\xbc\b*!\xff\x81\x9f\xeb\xfd\xaap\xcfq\x7f9\xe3\xdc}\x9d\x19n[2\xb9\x9dTu\x9c\x17\xe5\xf8\x8f\x02\xb0%\x9d\x8d\xf1q\x8f\xbe\xa3\x11_Q\x9bY\xdf\xba\xf6u\xbaN\x0f\x8d\v1z\\?<\xcdmJ\xc9\xed \xa3Bn6\xd4\xbd\xcfx\x8e!\xcd\x15\xe0i\xc8o\'\xcb\x10\'\xcd\xf7zy\x10\xc0\x8e\xb7\v\xb6\xe5S\xfc\x9c\xf2\x16\x12i\xb3\xdb\v\x0f\xa0/g\x8bDd\x16\x02\xea\xc6r8\x0f\x11#H\xd5a\xa5\x9eD', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000200)='memory.swap.current\x00', 0x0, 0x0) ioctl$KDSKBMETA(r5, 0x4b63, &(0x7f0000000000)=0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:19:32 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xe1e, 0x8000) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff17) socket$kcm(0x29, 0x0, 0x0) [ 1986.178182] gfs2: invalid mount option: statfs_quantum=0xffffffff%ffffffd [ 1986.200033] gfs2: can't parse mount arguments 03:19:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(0x0) [ 1986.256064] gfs2: invalid mount option: statfs_quantum=0xffffffff%ffffffd [ 1986.273274] gfs2: can't parse mount arguments 03:19:32 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffgfffffffffffd']) 03:19:32 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffff,ffffffd']) 03:19:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(0x0) [ 1986.515758] gfs2: invalid mount option: statfs_quantum=0xfffgfffffffffffd [ 1986.552544] gfs2: can't parse mount arguments 03:19:33 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r2, 0x1}}, 0x18) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r3, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:33 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06120900a84306910200000b000f0035020000060003d91902154002000001d40240dc1338d54400009b84136ef75afb83de44110016000d0006000000060cec4faba7d4", 0x55}], 0x1}, 0x0) 03:19:33 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffff\nffffffffffd']) 03:19:33 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffff.ffffffd']) 03:19:33 executing program 0: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000000580)=[{&(0x7f0000000200)="970070155d6148e95a93ad7919a938112803d266effcbeae80f083d76eed38e0925488f53979bcc140e0704fbf2d79424904b9064274212e8a0a8bc899c3fd66f42b61b9aadb406125234474283134764d5089abf9bd0b64438b9bb784c51bcd", 0x60, 0x9}, {&(0x7f0000000280)="af998324b01d7353b86a577d61e287e04d99a64e0925489bb0a8b0c2755219d2d001d230b4a28fda2f512cea22ed4723fd366ca8ac5ef8826957aee1f1e3038846ab964cdbf44e6e8efc1431e23cdd02adfb60e6959d8e9020cf1c778f9ac2f35dcc23b5b00cf4203e9344329085057ff2a44d9d1ed9ebe41f1a097601273b1a546379a4487912b996c1f2718c02e447cef21bee3f00c393d8e6306139f1088d3651aa5b2db9d56c6839526cf17e704004cffed91d237f2c6cbcd00e52710e94083b4b17e8fcb2ed78114f7d284ffcaa28d07a476ae6b8fae9c8b6597b2445f7d1359e1d2537d5ed5fe4109cee22", 0xee, 0xffff}, {&(0x7f0000000380)="937a6fb8d6b5842654be843796e9c0bf7a7d1d1a4bc98212f39a93b9153c1ca0eb0acbc1b8a04c5624ff406c667549a20ec2d5fbeb5ee3a03b3716548828e002188f6e02856242282666b95027a331efe8a6ac1406623e3ff56b6a51878f2502df4000ad2c435c45f0d32899b0afc589cefc73f753e20ef516c2c4dde8283c153ab282473692e3898280219e1ea926349d5fbee1e893c75ca4d059e32af15dfe77ff9fb437d59dcc6cc7f558d659575060c1b8d5bcb333c350f3df63a3ec0c072052b6ed129ce80c75c51d4b3ebbe3db2187ba7ac5b19b9a4c0e4347522b9f0fd43d", 0xe2, 0x5}, {&(0x7f0000000500)="809ee42224609a4caa1748562aa180938550c9b56427333584605425fa506a0be49791d3226c7ef3bb7d421ec6b242d5d4ae070f04d7f8a00dd2a50f85423fd3337b0309d46995e2350f85c7fb156e84af0acc35ff39460803ed", 0x5a, 0x101}], 0x104000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) 03:19:33 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2f706964d456c9ad62e156bc781926cb5e732000637071202f72646d61c64d91788b25997e2942267920"], 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000200)='\x00') [ 1986.832348] netlink: 'syz-executor.1': attribute type 15 has an invalid length. [ 1986.864097] gfs2: invalid mount option: statfs_quantum=0xffffffff.ffffffd [ 1986.866913] gfs2: invalid mount option: statfs_quantum=0xffff [ 1986.866913] ffffffffffd 03:19:33 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfaW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x8, 0x1}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x4}, 0x8) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() [ 1986.884195] netlink: 45 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1986.905364] gfs2: can't parse mount arguments [ 1986.912592] gfs2: can't parse mount arguments 03:19:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1987.019818] gfs2: invalid mount option: statfs_quantum=0xffffffff.ffffffd [ 1987.039327] gfs2: invalid mount option: statfs_quantum=0xffff [ 1987.039327] ffffffffffd [ 1987.059469] gfs2: can't parse mount arguments [ 1987.082063] gfs2: can't parse mount arguments 03:19:33 executing program 1: unshare(0x400) unshare(0x40000400) 03:19:33 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffff/ffffffd']) 03:19:33 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffff\"ffffffffffd']) 03:19:33 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x6, 0x20, 0x4, 0x1f, 0x7, 0xd1, 0x2, 0x0, 0x3, 0x9}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() [ 1987.255556] IPVS: ftp: loaded support on port[0] = 21 [ 1987.435783] gfs2: invalid mount option: statfs_quantum=0xffff"ffffffffffd [ 1987.452797] gfs2: invalid mount option: statfs_quantum=0xffffffff/ffffffd [ 1987.471854] gfs2: can't parse mount arguments [ 1987.492315] gfs2: can't parse mount arguments 03:19:34 executing program 1: open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') 03:19:34 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffeffffffd']) 03:19:34 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffff%ffffffffffd']) [ 1987.759183] gfs2: invalid mount option: statfs_quantum=0xffff%ffffffffffd 03:19:34 executing program 1: openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) [ 1987.802610] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 1987.813772] gfs2: can't parse mount arguments [ 1987.834760] gfs2: can't parse mount arguments [ 1987.929052] gfs2: invalid mount option: statfs_quantum=0xffff%ffffffffffd [ 1987.947168] gfs2: can't parse mount arguments 03:19:34 executing program 0: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) 03:19:34 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x400000, 0x0) sendmsg$key(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)={0x2, 0x15, 0x4, 0xf, 0xe, 0x0, 0x70bd26, 0x25dfdbfd, [@sadb_x_nat_t_port={0x1, 0x17, 0x4e21}, @sadb_x_nat_t_type={0x1, 0x14, 0x2}, @sadb_ident={0x2, 0xa, 0x997, 0x0, 0x44}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e24}, @sadb_x_sa2={0x2, 0x13, 0xfffffffffffffbff, 0x0, 0x0, 0x70bd25}, @sadb_x_filter={0x5, 0x1a, @in=@empty, @in=@loopback, 0x13, 0x4, 0x4}]}, 0x70}}, 0x4080) r1 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r5, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4028641b, &(0x7f0000000400)={&(0x7f0000ffe000/0x2000)=nil, 0x8, 0x0, 0x2, &(0x7f0000fff000/0x1000)=nil, 0x5}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r4, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r7, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r7, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x660c, 0xfffffffffffffffe) 03:19:34 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffgffffffd']) 03:19:34 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0xee) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:34 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffff,ffffffffffd']) [ 1988.433942] gfs2: invalid mount option: statfs_quantum=0xffffffffgffffffd [ 1988.436410] gfs2: invalid mount option: ffffffffffd [ 1988.453096] gfs2: can't parse mount arguments [ 1988.525770] gfs2: invalid mount option: statfs_quantum=0xffffffffgffffffd [ 1988.526245] gfs2: can't parse mount arguments [ 1988.539444] gfs2: can't parse mount arguments 03:19:35 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffff\nfffffd']) [ 1988.684331] gfs2: invalid mount option: ffffffffffd [ 1988.702413] gfs2: can't parse mount arguments 03:19:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffff.ffffffffffd']) [ 1988.776485] gfs2: invalid mount option: statfs_quantum=0xfffffffff [ 1988.776485] fffffd [ 1988.799804] gfs2: can't parse mount arguments [ 1988.925836] gfs2: invalid mount option: statfs_quantum=0xfffffffff [ 1988.925836] fffffd [ 1988.942029] gfs2: can't parse mount arguments [ 1988.951594] gfs2: invalid mount option: statfs_quantum=0xffff.ffffffffffd 03:19:35 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0xb, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() [ 1988.991674] gfs2: can't parse mount arguments 03:19:35 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffff\"fffffd']) 03:19:35 executing program 0: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x1) r1 = openat$cgroup_ro(r0, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) getgroups(0x3, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setregid(r2, r3) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000340)=0x2, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x5, 0x8, 0x10001, 0x0, 0x0, 0x81, 0x0, 0x5, 0xb91, 0x6, 0xe7, 0x7, 0x10, 0x9, 0x330, 0x2, 0x62, 0x3ff, 0x9, 0xef5, 0x3, 0x24f, 0x3f, 0x4, 0x1, 0x4, 0x44b6, 0x0, 0xffffffffffff0000, 0x3f, 0x924, 0x7, 0x7, 0x0, 0x2, 0x4, 0x0, 0x9, 0x5, @perf_config_ext={0x8, 0xffffffffffff6a7d}, 0x10, 0x3, 0x6f, 0x8, 0x8, 0x3e22, 0x4}, r4, 0x7, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10800, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x3f, 0x4, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x0, 0x401}, r5, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r6, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) [ 1989.098385] gfs2: invalid mount option: statfs_quantum=0xffff.ffffffffffd [ 1989.148830] gfs2: can't parse mount arguments 03:19:35 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x2, 0x2, 0xcf8, 0x0, 0x7}) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) [ 1989.198566] gfs2: invalid mount option: statfs_quantum=0xfffffffff"fffffd [ 1989.271917] gfs2: can't parse mount arguments [ 1989.934706] Bluetooth: hci0: command 0x1003 tx timeout [ 1989.940200] Bluetooth: hci0: sending frame failed (-49) [ 1992.014714] Bluetooth: hci0: command 0x1001 tx timeout [ 1992.020128] Bluetooth: hci0: sending frame failed (-49) [ 1994.094694] Bluetooth: hci0: command 0x1009 tx timeout 03:19:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffff/ffffffffffd']) 03:19:44 executing program 0: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f00000000c0)={0x0, 0x7f, 0x10000, [], &(0x7f0000000080)=0x100}) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) 03:19:44 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffff%fffffd']) 03:19:44 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x0, 0xa0000000000}) 03:19:44 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="54010000100001050000000000000000000000000000000000000000000010000000000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x154}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:44 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f00000000c0)={0x1000, 0x401, 0x6, 0x6}) write$cgroup_pid(r6, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r6, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0xfffffffffffffffe) prctl$PR_SVE_GET_VL(0x33, 0x1a99b) [ 1998.238045] gfs2: invalid mount option: statfs_quantum=0xffff/ffffffffffd [ 1998.250604] gfs2: invalid mount option: statfs_quantum=0xfffffffff%fffffd [ 1998.255036] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1998.275430] gfs2: can't parse mount arguments [ 1998.287223] gfs2: can't parse mount arguments [ 1998.374131] gfs2: invalid mount option: statfs_quantum=0xffff/ffffffffffd [ 1998.387056] gfs2: can't parse mount arguments [ 1998.394079] gfs2: invalid mount option: statfs_quantum=0xfffffffff%fffffd [ 1998.408343] gfs2: can't parse mount arguments 03:19:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffeffffffffffd']) 03:19:44 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffff,fffffd']) 03:19:44 executing program 1: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, {0x48, 0x0, 0x8000000, 0x0, 0x1, 0x5}}, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) [ 1998.576955] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 1998.593245] gfs2: can't parse mount arguments [ 1998.662097] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 1998.670979] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 1998.684020] gfs2: can't parse mount arguments [ 1998.708175] gfs2: can't parse mount arguments 03:19:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffgffffffffffd']) [ 1998.821560] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 1998.838601] gfs2: invalid mount option: statfs_quantum=0xffffgffffffffffd [ 1998.850528] gfs2: can't parse mount arguments [ 1998.854830] gfs2: can't parse mount arguments 03:19:45 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffff.fffffd']) 03:19:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffff\nfffffffffd']) [ 1999.033626] netlink: 100 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1999.035865] gfs2: invalid mount option: statfs_quantum=0xfffffffff.fffffd [ 1999.074795] gfs2: can't parse mount arguments [ 1999.084189] gfs2: invalid mount option: statfs_quantum=0xfffff [ 1999.084189] fffffffffd [ 1999.109799] gfs2: can't parse mount arguments [ 1999.122960] gfs2: invalid mount option: statfs_quantum=0xfffffffff.fffffd [ 1999.133576] gfs2: can't parse mount arguments 03:19:45 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffff/fffffd']) [ 1999.194026] gfs2: invalid mount option: statfs_quantum=0xfffff [ 1999.194026] fffffffffd [ 1999.223175] gfs2: can't parse mount arguments 03:19:45 executing program 0: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000000)={0x3, "e02632"}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x7, 0x0) 03:19:45 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000240)=""/54, &(0x7f0000000300)=0x36) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0xb6, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000080)=""/82, &(0x7f0000000000)=0x52) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) openat$cgroup(r1, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:45 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300), 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) ioctl$SIOCX25GFACILITIES(r3, 0x89e2, &(0x7f0000000340)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e22, 0x3, @mcast1, 0xc2e}], 0x3c) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000200)={'ip6gre0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}}) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x2010, r1, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r6, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000240)='rdma') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000300)={0x4, 0x25, 0x1, 0x5, 0x9, 0x8, 0x4, 0x11d, 0x1}) 03:19:45 executing program 1: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, {0x48, 0x0, 0x8000000, 0x0, 0x1, 0x5}}, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) 03:19:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffff\"fffffffffd']) [ 1999.309391] gfs2: invalid mount option: statfs_quantum=0xfffffffff/fffffd [ 1999.336234] gfs2: can't parse mount arguments [ 1999.438464] gfs2: invalid mount option: statfs_quantum=0xfffff"fffffffffd [ 1999.449858] gfs2: invalid mount option: statfs_quantum=0xfffffffff/fffffd [ 1999.467676] gfs2: can't parse mount arguments [ 1999.472677] gfs2: can't parse mount arguments 03:19:45 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffefffffd']) [ 1999.569811] gfs2: invalid mount option: statfs_quantum=0xfffff"fffffffffd [ 1999.593018] gfs2: can't parse mount arguments 03:19:46 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffff%fffffffffd']) [ 1999.670877] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 1999.714868] gfs2: can't parse mount arguments 03:19:46 executing program 1: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, {0x48, 0x0, 0x8000000, 0x0, 0x1, 0x5}}, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) 03:19:46 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="6db96fe4c9b8e01121e9eb00378577381502b67e08aef1cddeee1338f759f8d1d65d52bc22e60f02020b7de9947c7ce934b056071f0a848134b53f2d33c8918cc3bfc8c7957ca37573c52f18d226e1771ea371c18d01f3ad8c916b976cdfdab59db423c84d3dbf2a82e5f3c2cba6a5cde6c31e478dd85bf48b69335c110360dc6b2784438267f7b2ea224c2d710a859fdfea701070f0e9c9", 0x98}, {&(0x7f00000003c0)="490d6bf86c8cc4965b9d1de15ed585577150ebe7dc6d2467791e7a809a58145b47adf90965ed8c133d18c404f66fa3e1127f8f23eaf73033b95df752760ede5ac2206bec5806d17fbcd2d775446885a798d5232f218ce521b7efb8a6c72526bcc5d60ae56ae59e4e5bfd59dc74c59247983770ae457f1ca5978ab9051ece874675908165a7600ea5b205b5dfff3101ac3843acc0b5d4293ebb17155f709e33a1ef58c5170ce3fef350e8927bf9f678", 0xaf}, {&(0x7f0000000500)="9f37efb81a0936776ea8134b320bbe6af4ad46f7bda4e0175c95ca51b6c549693ac39c15004a01cb885cd0855f6e27c42964d66e0fada681c7f08df67a99a3574b0daa5db32d29fb8088bf956006ebe6195f6b50fd850903ef8881ed68bad9709e4d1bd53e290cf5bef69eda0d258e9d4b6e9881f5cc1731407b329e258e6324cc8d5fbe949956e69a6e993527811ce93fe70e352d446cf7d5279286ad688846f1", 0xa1}, {&(0x7f00000005c0)="6de80251cace426a516c8cde8434e020d51602c2078d4743d8a27aa88850350122fc13adac97676ec3683745e13a4b0e4157da3e6528ac5b49bf8120eb0e620ce5eb0ba4b2994fda03862f4988f89ee3b341fec7f5870b6984016326f813ed744c43390b90204d004f07fbf8b438a4a928fed2ef587fc9fc37324244e12dc248ae3cad8e082a73b864efbda3610b99fa68bd6ce7db8a5edb024803a341139986c416ccb10649254336a8cd6be8d8d06a257bc3a59ff5fc84c479d811c8917e0fc1", 0xc1}, {&(0x7f0000000000)="f69d1512580027b84a54", 0xa}], 0x5, &(0x7f00000006c0)=[{0x70, 0x11f, 0x2, "9f3c5af08c35069cd182a06685a8f98642d71cbede4d58bb8254f2276edfc7f8a63db55ce09e6a8736f675f33e5e185a57c886203328a3c7c2c3bd78c560a104874f357d42a2e55c9f1f4f73b2ed3dc2146015d8b2a2060b50d6e8"}, {0x10, 0x116, 0x7}, {0x30, 0x13f, 0x101, "f701d4819c5b5379a98484046b31b66dbcac312549d86e0b63"}, {0x1010, 0x11b, 0x8, "e83e6ba7f9b8c04ebf888cf4774e5043acc3c4a9898dd0ee6141626e085b75659d32696417dfc33823d582474b29927df2a1c9bb4ef6977915fe5f2cff3f9d2ba84a6da2d890eb745cf2314db3412e9082e4cdbf0f893bb3a2d66f9fc1eecbd8a269617be769eb1afad2ffa5856ed8f2f5941a991987640846bd22e11a2b813675d9ec733005acb36bd39c479de2b8c26d3b0c87da2fc57eaf41a4e5618cd3420f6714405a33568363bd4416d102b1ec506009e65ee196d19e8076f875400aeb03441b0011acd25c6b47af464bd82e8c6cbf27ae77025ec1aef28af92263e4f23e52d178a205821d8df388b15c6252410e7be08859ca5a9a072d3843b50084d39ff260bf41641b88d755ed2a4f73a9487e2e20a5f308f91828feeeb4a0d2970fc4cdaed20c9573bcf906f4fbbde25ffb95e6bb6202fa930436eaca0952b4ae93e11999dca9c342dab3218f8079ff8fa527a0ffa54781b9ea464b4bb016b07861d2c7c5fb815838786131de99127a53ba9545cb6d15e1d1a887e2ae8a04617120f699d62d329f4c7ad5f7c36b065e622a04e1c2c4449a2b27771172914322a7319b7f049d05e9f18490b93741fa74e4d469c8b1682b2a2c5dfaad722d8f55d081dd85a3223cb981d32c8f0dabff11118d8c69c9c4fa97efa9782a25fd9e075b827f942d07766fa89c760bd22964aa99db6831912f90fc5c4ba3ae27b054242415fe864140295e51a9d0856fda2911a0a32312a44efd04787c9daf0890315bc37f304596ecd76f4af4cdfa8ecaec2b88a4efb1d9f2e84021157adc1fecfc9263fc57e86065e786fffe36ed5886b684daf76c5025fcd53587ea1b46099466594778e39248f95e08cf7873d340c2fe67f3242496714f89524699b9c3a0e7f588dff0edffa9e34dd819f57d0929f9b496de64c2bf542524ca1961793524c3aba48a0a7571839a542f0e881aa85e25d272b22a15693e1326409d935aff58f930c54d863ecb4498d21744272ff952f79c6747c616f81ebdaaa0c2c7904f7028d78148876778ddf9c9a64b5b7d1471c3e057cac8be8b1b08373bed58dd1bf034b538eca9427c72eb62e780c009e7c5f8b206107575076d9f22c030f02a467de41a33fda3e83f13b6facf60e4c34df654685fe7303f58f40def3531f9e657f4b12ed01ec6f7c02a7cf76a5daf09028d7c4e4fd372773770ba2f4121072c6f310d873a5879eacc0f6660f0bd5e40087159070fa2c5a603383b015720f8766188e1959677b8f1d3697de5fc0e409faebe5dc9548474d7a862acdee1dd4fdf48137cae622ac07d5b9bfde966a4cc8208b59dc23a49b1ab7417cb1c0e1a55d3665975d54ad385f1db64c06b5fb8fec539986b738380e3cb0939597aa4c0cb09dd8357580d883d5fed26515df71a98bf54ba778639ab4c68293c2194f5cec26cefa6b5e687886548c22920f128bf7e12155deba89a0c5571f4e59d158f447a6d7b15544d8387eefa192aa958a4935c7f38f27cf62cc1890db1030d4de979d90ee94a945cc4e266c46d5f6a7d98d1a704b981585bc7ac87f788efbb7853b6005d30b2e2a07264d2f9b8789a1880ebf28c9b495a1f27de7c8c8e1a0c6bd96c5b0d4898a2b4cb8fd20b3df00fab4c4cedf2052c740c1d3a666acbc551be0611881cbf9abbf02d50db5d370e4933dddf143d38cfc90189599610a35870327051c0128b9d1bf70ab22c44f36d75d3eb868d29142857dcc96ff81c622bed13b2f872c165208df453746de375ec863293993ed533d738ee37724afcb4124a1b765894cde317661b114420beecc49151a27de96bcb15792799b19ecf87d650618ebc197e6b0e8db1f5204a21b58db7b55ab77374c072b1bb95499ee718d7d5491b6c24abf060c9fe3fb32901eaabcdb49945f6ee7fac2aeb268ca0f2e07596a56bf0afc3f5ed37914770ef04697451a2f914bfe8222865e8b1e7dada66589a5a487116380a7f648e1ccbc6bb9f4415dcccbd2fa8039d01029cfbce2b004bdf45dc453345e7b65a452be331269447bcbc1cb51b8aaa3be80ac49fc813cdf13d8b54e50b836e45560459024463200ab961f0ce92c883e5a42b99cf58307c2f6fcdf3e4fdefb1f5beee548160cb86e010ea21f2982180c3e9e278c74b164521ca6710e37986e8b0869a19f8efa698b1fbb1c042db9d8281daa065c2ef95d5b7e09f6bf8514fc440ebc4fb1ea27a334742af1a8d825217d6821131d9ec545a0f075b7525c051f818cbbf44d2a88b0d6934cc64b32b786667e702aa8b1b533e0b3fc2835cb1e6953492b1748cd5631b0166bf64ea02c420e095d19e9de2e4e90789e1e774813afe7776e870a0e2f4040fb13feea5f14e2b8776914fa5d878bead92ff56a5cc19f298f9c5e402c03b8b6ac877178449ecc6401222f1b2daba1550c010721d134b3d8ddc5b6f9798808b670abe774772a7cdc8647ee3d68fd27e2d7592ce4bdcdb6026996fba6cdb95208cdbbb19e0d7031b2502db29baeb2c91d89f17fcaa0f58bb3cb31733542483248e54a8472420b155b2b10ff4af0893fe09e46b028055673a9e78e4539107e3024b8acc26f82165781c1db533f43b05a5215bf4a88d4ee772a4cad5869fbc6141e1429bf5b3faf429300602318fcf5c9d5785aa25f9800e90cc82f847cb4a0817cf5ce2406dc77dfc0e5c2b62135b5c396b63f57c7e686dd2ae918bf2e9be9872a1bce3985ae841acaf320b310e87facbd959ccab1351e1aff485b54578a7c2238c622c444d944bc51d841f5285f5a0b021103467c7483ed9fed15993e1b7442e67f3b92432053574a2768d434971ffd926c2522f8d807c2731568149aa912e1794094150fdf3df786128356b8897dbe1ffd2b7004c26beb9766a2ebe5be080734d95bbcd1735b994a44678b7fb67f2756219a98e53a78ff7abb70b113813289db86ad5399548d84cdfc912b4acc2831371187db023e7d25b370a713694c0c1e6b60c7ce740aecfaa5c87439cd2b601820b49527e6e3ae3a5afca1ffa2135670e990845ec009603906a6de8bb37601fbff86fc7da91bd8bbde8d2574a058d8fa47c1b7d82fed07f4455c0c264de3d18a87afd320959ace159786f77deda9a9464ffa6be7fd68cb74996f72f4161cce5ce624ee688f634298058cff8ab27e811a217e1741e6a8b681f6fcf6ff675c5a04cb848da2da56c03aceb8ae62d253d750f8a65b1f821dcab049dc3a627222250dcaa9360e71d16e67871260d382bc42246a977ea3c4939ecfecc985ce19915f6d1345d07d8e06372467000b60f507cf35a7f2090f000fb75575c2a9ae1a10b9256134b38201670a8ffe64e837e9042e210ee2c325e882603f85e12342c22c1519985ce0826f6996a0b5e74ba97c155db8fd7b491779f208f9656bebecf03b43470f3040bc54267d0a2094fc17ac21b636b49c595c0fcf736a8db9d064c850b33b1ff71c30bd1e543240f2a466221407ef9ea15f3e5044ed611607aa006ae3737ece9a9cbb700e51c84cc8f3efb8b69e3b52b448f534f733138dc84320b0783227c050d5df387d85e17b0fbc158b50e3842099ce13516e719b3dff7bcf5b420094f695610c449028b9f8952091fcee446dc3fd6d7ad7b68dc04fc9079932dcb754456dedeb1848813ead0252b3d98de445dc4ee8139de16d714bcfd43ff804f551a1cd24f1e707d22a6aedd744473cf232660549b3614f5e80a281bba0c166b23e2e3a62c7f8446e07a628cd08f0ca3359e2e419b205cb02d0f52d62bb6feb3ca3da98042e41f2e173b4d62d0f6e32c52ecdbc83ea00d1bb3b06b1b036d3c462ed483c775b9a8cf536db34cd49b0c46f2e9bd7c5804baa090a0ab52c7181822c28a423d94621fe8f385dc8075c23c1645d1f42f96cb4e047587f2b44a755bab28dc24f31f2010db31190a34cf379997289f9883905cc4061db3d77360a096ceb6b2403ba53be2f741912357d5968f498508f627d6e750014b2197b9946aebb4b3a92b255fcee2a4e935d3f53ca07b3e6e8d26cbfd493ceda882ba3f1ca103392afca69e1c27a6e2c3c39fa32b693df65edf80ceca71fa1c81c06a55049667c3accdb9c03bb94dfa6e59313554e5d138b2cd59cde276b87145ac12be6d6aa5037469fc361a7c83cef79d1008e67b32f20d4a5d397142e094867365e74471027582653714e95410b61a9affef9a93b01f571c01b625fde0abc7b17fe779f65c5de077b8c5a34e9d25acee1466e9886ef3b29a3ed3b43382af7e4a449b507976708639d600f4d8331fa67fd6b32e0d90be1672a1b9b31c1846830cb711805443cc4827105b8e6242082a2cdd1ed681e015c7a1c73321a989b809a10cc45d83cdc7356eb2c1dfd7cd6d8617b0d5b41fd4cf69deedba78af4113dcc5b9050144249ebb739b84be84229b04587d7c98d2af3b7b349888d4320ebf96a3ba5b99e0894745c7369193147385bb0b137374d37bad9feba4916eb7212afe6aeaaac882b1467d08ab387f67ffcb5c15d23efc0649e96038577d70f9935be2b49b540866ca880c2a1cad58e2c0023b3450d92cb741259be2b9d34afd4af9c142b6b9fcb0ffd4013ac32e35aa44c025293e5077859991fb0fb954e5ffffca34fec5401de83b38315b1a81b8d46299eaccac159233a5c95d620215a002f3e6cf129ada216a53bf939a3917735beb6bb436598bad8c9b35b605a3685f4903d2a8d67fa436eea4a39f0ade5c9541927c3de5228286999913992a9e488d2edb42f478cbfb4b10cafdab8dd10ddb898b722ce7fa893d9adb4c3d53f62be0828a3f4edcccde1c2fa066eebb6f3ec3b62a5051b9fa8ff129290e4f3cef0d78e416bfa753c5a7de60872e56ca10045f505b0b5fd260274a44c11fd4a3d4a882bb54a74e1655efdfff3f73e607d774a516dc561e8158c6bd465c29688df9e71e52fe41c2a5895570947beef354a3f58c98f8b952f2780a9ecde8b1a15b08a5a5ee1b896d38e8abbb1c890dfaf745d4d069cdf6684507abbb50da49828e958cc39968e80d50b3f18794a9282e9476eb6ab1b90e81ce02346dd289aadc95505e155307b21d331ed28209ea7cad6ecb46b7fd6eafc0bd3d682da4e2563ddede939017f010c6828072fbfd0a204d6f2a9221c04d82c2cb2cfa08dccfe06f4c478529f3d00f7fe4f97bdd806623744daf858d228bb56c2cfaa25ffc446807b5ef90e84c6e33f15d7e5813bff15e7d01fdcfe545519cd758297ac6b22ff00c448589b3a16438d119d7616b6ee27d926f27922da4575900cc92edc18f3bbba77f8faca6b4d673fad8ddf1a6478da2f19f1e8cfc92d8ba4dd519fe28eb411ada97e612adaec2f7233d9c418d4f1465ba4d93870da4b9779e4076e4b10406ea465275b6cd64c4b0aa0399101186d8e7749f3ced6e839ba31d5e2ae0a9c8b9440be868c1e9b4aa7a503787fee46da68be59fc3850859132ddc5b8495581c9ae58b66c3b046b6c7a3ae85fd5b5169dd13b2585f9767f2b1dbdc739712a6a1c667834f84ca9515a71d945ca54d645c9c627aa863bae1145f8446d86fa60879b51d2818b60fce90f4338cebd13091039fe473e61284d17ac8ac1814df04f2add38a881b4a8afdc0884614a353758a91afdb7ede5260123f139120cba214fb46bb20d1899a0715b7e4a635cdaaae1d61f6297617bd5262d004272df568cf1bd056dddee1ac97711251800d127df75eaf1998e5ea9c456308b921c98464e7854e6fe8098ef61643614c088ef32f56e4f178ecf11ec61accaabbe23103ca56566eb040"}, {0xc8, 0x1ff, 0x6, "9a7424b7ac99aedef459e26dfd6cc94126cccd1f48e6ed45687324e28165c4073fb1e12a95ddd03b941a13ad2fe8b631b9ab2bb260a248e42330cfdbbf2c90641ea64fc9f4fcf93bee7b4f2328eb9691131fed0778f7cb07790de9c77cb764abf2aff2f5638cf45f6d0c3d40b5f1ca54fed5735adcc25279a29bc28a8f2f9887db01fcce20f9b2ae6b4a4b434a11409d5c515a711f28c5647b53e24e937519478095626a2f6e800e282aa06d50d22f700aab61"}, {0xc0, 0x11f, 0x4, "91ddc3ae29d8368c43aa8ea026dd6a7450e6c7418a3ba1e5cf5668cb0158302123ba9aba4dd421e1f1e620ac206b81ca6dcea31db5bb0ff4709de411a1df93fa83ed1926123462a5dc86b63f91447fc08ba31bda913a090ace76e133d9957a74520d2d9c81c1dca9b843b8cb70e8538608f8dec3583381c6433f831326ffde3652a7cc73f91d56710ee76094d4dc64ba25a326c9745f73957680c679ec18bb5010d22116a4d73bfa030e4ad881ca4fa5"}], 0x1248}, 0x20000000) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() [ 1999.780148] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 1999.806142] gfs2: can't parse mount arguments 03:19:46 executing program 0: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000300)=""/227) [ 1999.830901] gfs2: invalid mount option: statfs_quantum=0xfffff%fffffffffd [ 1999.845444] gfs2: can't parse mount arguments 03:19:46 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:19:46 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffgfffffd']) [ 1999.921729] gfs2: invalid mount option: statfs_quantum=0xfffff%fffffffffd [ 1999.950051] gfs2: can't parse mount arguments 03:19:46 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffff,fffffffffd']) [ 2000.017657] gfs2: invalid mount option: statfs_quantum=0xfffffffffgfffffd [ 2000.048742] gfs2: can't parse mount arguments [ 2000.128400] gfs2: invalid mount option: statfs_quantum=0xfffffffffgfffffd [ 2000.140020] gfs2: can't parse mount arguments [ 2000.166394] gfs2: invalid mount option: fffffffffd 03:19:46 executing program 0: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000300)=""/227) [ 2000.188939] gfs2: can't parse mount arguments 03:19:46 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffff\nffffd']) 03:19:46 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)=0xbf) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e22, @multicast1}, 0x307, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x7, 0x8, 0x9}) 03:19:46 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r2, &(0x7f0000000200)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000580)={0x8, 0x6, 0x7}) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r3, &(0x7f0000000340)="fd085a894bc0a9cca17fdc5f7d7932bcd9282d9968ce6d3caa3f4521982a78ce197098bf41cb05ac6f822c8267de63b12fde1b5462936e891cfe2534113f4b21ebd6acc24553c5c666019dfe4e17d5285353dc0d77992613a00eb0c651a80a8fc8f508bf6f9326eda5ad6cf1b6979bd8843d5ef57b4596c730937ce22cf08364ba55de6f866929bdf847fd6e5e75f2e2f30be806c67a2f82d5de05a90267528b2bbf9d313e7cc4625f37597114da3d0ec7dbd2143b2d348edc50aec6c11a1ed0427b991e85c7144912", &(0x7f0000000500)=""/84}, 0x18) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000000c0)=0x1, 0x4) write$cgroup_pid(r6, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/validatetrans\x00', 0x1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r6, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0xfffffffffffffffe) 03:19:46 executing program 3: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000340)=0x7fffffff, &(0x7f0000000380)=0x4) r1 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r5, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, &(0x7f00000000c0)=0x401, 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r4, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r7, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r7, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x660c, 0xfffffffffffffffe) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x200, 0x0) 03:19:46 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffff.fffffffffd']) [ 2000.381175] gfs2: invalid mount option: statfs_quantum=0xffffffffff [ 2000.381175] ffffd [ 2000.424764] gfs2: can't parse mount arguments [ 2000.436520] gfs2: invalid mount option: statfs_quantum=0xfffff.fffffffffd [ 2000.472000] gfs2: can't parse mount arguments [ 2000.544206] gfs2: invalid mount option: statfs_quantum=0xffffffffff [ 2000.544206] ffffd [ 2000.569163] gfs2: invalid mount option: statfs_quantum=0xfffff.fffffffffd [ 2000.583829] gfs2: can't parse mount arguments [ 2000.588997] gfs2: can't parse mount arguments 03:19:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffff/fffffffffd']) 03:19:47 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffff\"ffffd']) 03:19:47 executing program 0: socket$kcm(0xa, 0x3, 0x11) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/28, 0x1c}], 0x1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() [ 2000.780582] gfs2: invalid mount option: statfs_quantum=0xfffff/fffffffffd [ 2000.821369] gfs2: can't parse mount arguments [ 2000.831518] gfs2: invalid mount option: statfs_quantum=0xffffffffff"ffffd 03:19:47 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x284200, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() [ 2000.881507] gfs2: invalid mount option: statfs_quantum=0xfffff/fffffffffd [ 2000.914730] gfs2: can't parse mount arguments [ 2000.928598] gfs2: can't parse mount arguments 03:19:47 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r2, &(0x7f0000000200)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000580)={0x8, 0x6, 0x7}) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r3, &(0x7f0000000340)="fd085a894bc0a9cca17fdc5f7d7932bcd9282d9968ce6d3caa3f4521982a78ce197098bf41cb05ac6f822c8267de63b12fde1b5462936e891cfe2534113f4b21ebd6acc24553c5c666019dfe4e17d5285353dc0d77992613a00eb0c651a80a8fc8f508bf6f9326eda5ad6cf1b6979bd8843d5ef57b4596c730937ce22cf08364ba55de6f866929bdf847fd6e5e75f2e2f30be806c67a2f82d5de05a90267528b2bbf9d313e7cc4625f37597114da3d0ec7dbd2143b2d348edc50aec6c11a1ed0427b991e85c7144912", &(0x7f0000000500)=""/84}, 0x18) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000000c0)=0x1, 0x4) write$cgroup_pid(r6, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/validatetrans\x00', 0x1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r6, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0xfffffffffffffffe) 03:19:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffefffffffffd']) 03:19:47 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffff%ffffd']) [ 2001.140423] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2001.186426] gfs2: invalid mount option: statfs_quantum=0xffffffffff%ffffd [ 2001.193565] gfs2: can't parse mount arguments [ 2001.208638] gfs2: can't parse mount arguments 03:19:47 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffff,ffffd']) [ 2001.314063] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2001.375843] gfs2: can't parse mount arguments 03:19:47 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) getsockname$tipc(r0, &(0x7f00000000c0)=@name, &(0x7f0000000200)=0x10) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000240)={'ip6gre0\x00', 0x34}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:19:47 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffgfffffffffd']) [ 2001.473720] gfs2: statfs_quantum mount option requires a non-negative numeric argument 03:19:47 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0f61200000000000000000000000001051be82ba4fe4deffac198b5fc0bb0000"], 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000200)) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:19:48 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r2, &(0x7f0000000200)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000580)={0x8, 0x6, 0x7}) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r3, &(0x7f0000000340)="fd085a894bc0a9cca17fdc5f7d7932bcd9282d9968ce6d3caa3f4521982a78ce197098bf41cb05ac6f822c8267de63b12fde1b5462936e891cfe2534113f4b21ebd6acc24553c5c666019dfe4e17d5285353dc0d77992613a00eb0c651a80a8fc8f508bf6f9326eda5ad6cf1b6979bd8843d5ef57b4596c730937ce22cf08364ba55de6f866929bdf847fd6e5e75f2e2f30be806c67a2f82d5de05a90267528b2bbf9d313e7cc4625f37597114da3d0ec7dbd2143b2d348edc50aec6c11a1ed0427b991e85c7144912", &(0x7f0000000500)=""/84}, 0x18) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000000c0)=0x1, 0x4) write$cgroup_pid(r6, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/validatetrans\x00', 0x1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r6, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0xfffffffffffffffe) [ 2001.534761] gfs2: can't parse mount arguments 03:19:48 executing program 2: socket$kcm(0xa, 0x3, 0x11) chmod(&(0x7f00000000c0)='./file0\x00', 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x0, 0x7530}}, 0x100) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000400)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000200)={[{0x6, 0x2, 0xb8a, 0x2, 0x4, 0x20, 0x7, 0x7, 0x4, 0x7, 0x7fff, 0x7, 0xa3c0}, {0xffffffffffffffca, 0x3f, 0x2, 0x425484cf, 0x5, 0x61b5, 0xe6, 0x7, 0x8001, 0x2, 0x5, 0x6, 0x200}, {0x4, 0x2, 0x6, 0x0, 0x6, 0x401, 0x29, 0x3, 0x100, 0x4, 0x5, 0x8, 0x614b}], 0xb03e}) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:48 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f00000000c0)={0x1, 0x0, [{0x80000008, 0x401, 0x3, 0x400, 0x0, 0x80, 0xa60}]}) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) [ 2001.604327] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2001.635721] gfs2: invalid mount option: statfs_quantum=0xfffffgfffffffffd [ 2001.651151] gfs2: can't parse mount arguments [ 2001.667310] gfs2: can't parse mount arguments 03:19:48 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffff.ffffd']) [ 2001.765932] gfs2: invalid mount option: statfs_quantum=0xfffffgfffffffffd [ 2001.772923] gfs2: can't parse mount arguments 03:19:48 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r0, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() [ 2001.907435] gfs2: invalid mount option: statfs_quantum=0xffffffffff.ffffd 03:19:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffff\nffffffffd']) [ 2001.948569] gfs2: can't parse mount arguments [ 2002.015440] gfs2: invalid mount option: statfs_quantum=0xffffffffff.ffffd [ 2002.022433] gfs2: can't parse mount arguments [ 2002.047654] gfs2: invalid mount option: statfs_quantum=0xffffff [ 2002.047654] ffffffffd [ 2002.069676] gfs2: can't parse mount arguments 03:19:48 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffff/ffffd']) 03:19:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffff\"ffffffffd']) [ 2002.243073] gfs2: invalid mount option: statfs_quantum=0xffffffffff/ffffd [ 2002.271427] gfs2: invalid mount option: statfs_quantum=0xffffff"ffffffffd [ 2002.287007] gfs2: can't parse mount arguments [ 2002.304719] gfs2: can't parse mount arguments [ 2002.382910] gfs2: invalid mount option: statfs_quantum=0xffffff"ffffffffd [ 2002.394182] gfs2: can't parse mount arguments [ 2002.405295] gfs2: invalid mount option: statfs_quantum=0xffffffffff/ffffd [ 2002.416086] gfs2: can't parse mount arguments 03:19:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffff%ffffffffd']) 03:19:48 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0f61200000000000000000000000001051be82ba4fe4deffac198b5fc0bb0000"], 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000200)) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:19:48 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='a \x00'/17], 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:19:48 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffeffffd']) 03:19:48 executing program 1: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) getrusage(0x0, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) 03:19:49 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000000)=0xfff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) r2 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() [ 2002.617199] gfs2: invalid mount option: statfs_quantum=0xffffff%ffffffffd [ 2002.650418] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2002.654276] gfs2: can't parse mount arguments [ 2002.659229] gfs2: can't parse mount arguments 03:19:49 executing program 1: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) getrusage(0x0, &(0x7f0000000200)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) [ 2002.785884] gfs2: invalid mount option: statfs_quantum=0xffffff%ffffffffd [ 2002.798468] gfs2: can't parse mount arguments [ 2002.812002] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2002.834815] gfs2: can't parse mount arguments 03:19:49 executing program 1 (fault-call:2 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:49 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffff,ffffffffd']) 03:19:49 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000000)=""/47, &(0x7f0000000080)=0x2f) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:49 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffgffffd']) [ 2002.968501] FAULT_INJECTION: forcing a failure. [ 2002.968501] name failslab, interval 1, probability 0, space 0, times 0 [ 2002.980287] CPU: 0 PID: 12781 Comm: syz-executor.1 Not tainted 4.19.37 #5 [ 2002.987246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2002.996619] Call Trace: [ 2002.999229] dump_stack+0x172/0x1f0 [ 2003.002883] should_fail.cold+0xa/0x1b [ 2003.006803] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2003.011925] ? __sigqueue_alloc+0x173/0x4d0 [ 2003.016361] ? find_held_lock+0x35/0x130 [ 2003.020443] __should_failslab+0x121/0x190 [ 2003.024689] should_failslab+0x9/0x14 [ 2003.028501] kmem_cache_alloc+0x47/0x700 [ 2003.032586] ? kasan_check_read+0x11/0x20 [ 2003.036759] __sigqueue_alloc+0x268/0x4d0 [ 2003.041007] __send_signal+0x20f/0x14a0 [ 2003.044992] ? lock_acquire+0x16f/0x3f0 [ 2003.048987] send_signal+0x49/0xd0 [ 2003.052541] force_sig_info+0x251/0x310 [ 2003.056716] force_sig_info_fault.constprop.0+0x215/0x360 [ 2003.062359] ? is_prefetch.isra.0+0x470/0x470 [ 2003.066899] ? trace_hardirqs_on+0x67/0x230 [ 2003.071232] __bad_area_nosemaphore+0x2db/0x3f0 [ 2003.075919] ? vmacache_find+0x65/0x310 [ 2003.079926] bad_area+0x69/0x80 [ 2003.083223] __do_page_fault+0xae1/0xe90 [ 2003.087315] ? vmalloc_fault+0x770/0x770 [ 2003.091392] ? trace_hardirqs_off_caller+0x65/0x220 [ 2003.096423] ? trace_hardirqs_on_caller+0x6a/0x220 [ 2003.101367] ? page_fault+0x8/0x30 [ 2003.104929] do_page_fault+0x71/0x581 [ 2003.108739] ? page_fault+0x8/0x30 [ 2003.112297] page_fault+0x1e/0x30 [ 2003.115867] RIP: 0033:0x20000005 03:19:49 executing program 0 (fault-call:6 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2003.119256] Code: Bad RIP value. [ 2003.122640] RSP: 002b:00007fc0fbd8bbd8 EFLAGS: 00010213 [ 2003.128274] RAX: fffffffffffffffd RBX: 0000000000000009 RCX: 0000000020000005 [ 2003.135736] RDX: 2acdc86ce46bc268 RSI: 0000000000000000 RDI: 00007fc0fbd8c608 [ 2003.143019] RBP: 0000000020000000 R08: 0000000000000005 R09: 0000000000000006 [ 2003.150297] R10: 0000000000000007 R11: 0000000000000213 R12: 000000000000000b [ 2003.157574] R13: 000000000000000c R14: 000000000000000d R15: 0000000000000004 [ 2003.199061] gfs2: invalid mount option: ffffffffd [ 2003.207714] gfs2: can't parse mount arguments 03:19:49 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) r3 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x7, 0x3, 0xffff, 0xfec, 0x0, 0x4, 0x21, 0x8, 0x6ca, 0x1, 0x5, 0x6, 0x1, 0x8, 0xd8f, 0x66, 0x9000000000000000, 0x425b, 0x7fffffff, 0x9, 0x1ff, 0x6, 0x0, 0x3f, 0x100000001, 0x401, 0x4, 0x1, 0x3, 0x1, 0x3, 0xfff, 0xffffffffffff5485, 0x0, 0xf2b, 0xfffffffffffeffff, 0x0, 0x6, 0x0, @perf_config_ext={0x7bd, 0x2b}, 0x4, 0x6, 0xfffffffffffffff9, 0xb, 0x7f, 0x97, 0x6}, r2, 0x5, r3, 0x8) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000200)=0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r4, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:49 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2f706964a5e3b637ca4fde09a0c769f867fa732000637075202f72646d6120"], 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r7, r8) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r6, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0xfffffffffffffffe) [ 2003.249042] FAULT_INJECTION: forcing a failure. [ 2003.249042] name failslab, interval 1, probability 0, space 0, times 0 [ 2003.279770] gfs2: invalid mount option: ffffffffd [ 2003.286300] gfs2: invalid mount option: statfs_quantum=0xffffffffffgffffd [ 2003.293304] gfs2: can't parse mount arguments [ 2003.305081] gfs2: can't parse mount arguments [ 2003.309856] CPU: 1 PID: 12789 Comm: syz-executor.0 Not tainted 4.19.37 #5 [ 2003.316802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2003.326171] Call Trace: [ 2003.328804] dump_stack+0x172/0x1f0 [ 2003.332456] should_fail.cold+0xa/0x1b [ 2003.336384] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2003.341612] ? lock_downgrade+0x810/0x810 [ 2003.345787] ? ___might_sleep+0x163/0x280 [ 2003.349974] __should_failslab+0x121/0x190 [ 2003.354227] should_failslab+0x9/0x14 [ 2003.358050] __kmalloc_track_caller+0x2e1/0x750 [ 2003.362741] ? __check_object_size+0x3d/0x42f [ 2003.367253] ? wait_for_completion+0x440/0x440 [ 2003.371860] ? strndup_user+0x77/0xd0 [ 2003.375691] memdup_user+0x26/0xb0 [ 2003.379253] strndup_user+0x77/0xd0 [ 2003.382917] __x64_sys_add_key+0x19d/0x4f0 [ 2003.387179] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 2003.393087] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2003.397870] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2003.403262] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2003.407871] ? trace_hardirqs_on+0x67/0x230 [ 2003.412217] do_syscall_64+0x103/0x610 [ 2003.416122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2003.421318] RIP: 0033:0x458da9 [ 2003.424519] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2003.443521] RSP: 002b:00007fa53691bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 03:19:49 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) move_pages(r2, 0x3, &(0x7f00000000c0)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil], &(0x7f0000000140)=[0x10001, 0x6, 0x9, 0x101, 0x40, 0x9, 0x9, 0x3], &(0x7f0000000200)=[0x0], 0x6) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x0, 0x1, 0x4, 0x0}, 0x20) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20040, 0x0) getpid() 03:19:49 executing program 1 (fault-call:2 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:49 executing program 2: socket$kcm(0xa, 0x3, 0x11) r0 = syz_open_dev$video4linux(&(0x7f00000002c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000080)={0x0, 0x0, 0x0, [], 0x0}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2003.451256] RAX: ffffffffffffffda RBX: 00007fa53691bc90 RCX: 0000000000458da9 [ 2003.458555] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000080 [ 2003.465870] RBP: 000000000073bf00 R08: fffffffffffffffb R09: 0000000000000000 [ 2003.473179] R10: 00000000000fffff R11: 0000000000000246 R12: 00007fa53691c6d4 [ 2003.480556] R13: 00000000004becd7 R14: 00000000004cfa68 R15: 0000000000000004 03:19:50 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffff.ffffffffd']) [ 2003.572286] gfs2: invalid mount option: statfs_quantum=0xffffffffffgffffd [ 2003.587777] gfs2: can't parse mount arguments 03:19:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c404791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:50 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffff\nfffd']) [ 2003.698091] gfs2: invalid mount option: statfs_quantum=0xffffff.ffffffffd [ 2003.727702] gfs2: can't parse mount arguments 03:19:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4024c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:50 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0xa04c0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0xa0001, 0x0) perf_event_open(0x0, r1, 0x0, r3, 0x400000000000000) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r6, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$P9_RRENAMEAT(r2, &(0x7f00000003c0)={0x7, 0x4b, 0x2}, 0x7) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r5, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r8, &(0x7f0000000100), 0xda4fff08) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f00000000c0)={'ifb0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}}) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r8, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x660c, 0xfffffffffffffffe) 03:19:50 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) write$P9_RSTATFS(r1, &(0x7f0000000200)={0x43, 0x9, 0x1, {0x8, 0xa16, 0x2, 0x9a, 0x8001, 0x2, 0x2, 0xf5, 0x7}}, 0x43) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000340)='TRUE', 0x4, 0x2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000380)={0x6, 0x7, 0x2, 0x4, 'syz0\x00', 0x3f}) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') getpid() [ 2003.795993] gfs2: invalid mount option: statfs_quantum=0xfffffffffff [ 2003.795993] fffd [ 2003.811334] gfs2: invalid mount option: statfs_quantum=0xffffff.ffffffffd [ 2003.823194] gfs2: can't parse mount arguments [ 2003.837242] gfs2: can't parse mount arguments 03:19:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4044c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:50 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffff/ffffffffd']) [ 2003.935995] gfs2: invalid mount option: statfs_quantum=0xfffffffffff [ 2003.935995] fffd [ 2003.957411] Invalid option length (1048446) for dns_resolver key 03:19:50 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)={r0}) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) ioctl$sock_inet_SIOCSIFPFLAGS(r5, 0x8934, &(0x7f00000000c0)={'dummy0\x00', 0x33}) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:19:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='\nns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2003.980754] gfs2: invalid mount option: statfs_quantum=0xffffff/ffffffffd [ 2003.985466] gfs2: can't parse mount arguments [ 2003.991324] gfs2: can't parse mount arguments 03:19:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4054c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:50 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffff\"fffd']) [ 2004.085497] gfs2: invalid mount option: statfs_quantum=0xffffff/ffffffffd [ 2004.092870] gfs2: can't parse mount arguments 03:19:50 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffeffffffffd']) 03:19:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='#ns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0298860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2004.272070] gfs2: invalid mount option: statfs_quantum=0xfffffffffff"fffd [ 2004.319183] gfs2: can't parse mount arguments [ 2004.375709] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2004.399900] gfs2: invalid mount option: statfs_quantum=0xfffffffffff"fffd [ 2004.424884] gfs2: can't parse mount arguments [ 2004.433788] gfs2: can't parse mount arguments 03:19:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0498860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2004.474264] gfs2: statfs_quantum mount option requires a non-negative numeric argument 03:19:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='%ns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2004.520878] gfs2: can't parse mount arguments 03:19:51 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffff%fffd']) 03:19:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffgffffffffd']) 03:19:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0598860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2004.782885] gfs2: invalid mount option: statfs_quantum=0xffffffgffffffffd [ 2004.793976] gfs2: invalid mount option: statfs_quantum=0xfffffffffff%fffd [ 2004.815760] gfs2: can't parse mount arguments [ 2004.820469] gfs2: can't parse mount arguments 03:19:51 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000000c0)={0xa, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000000440)={r5, 0x1, &(0x7f0000000340)=[0x3], &(0x7f0000000380)=[0x1, 0xe2, 0x43f, 0x2, 0xfffffffffffffff7, 0x8], 0x30, 0x1, 0x7fffffff, &(0x7f00000003c0)=[0x8], &(0x7f0000000400)=[0x9ca, 0x101]}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000500)=0x200, 0x4) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r7, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r7, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x660c, 0xfffffffffffffffe) 03:19:51 executing program 2: socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() fcntl$lock(r0, 0x5, &(0x7f0000000000)={0x3, 0x3, 0xffffffff, 0x8, r1}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r2, 0x0, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='*ns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x2, 0x400) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000100)={0x8}) ioctl(r0, 0x8, &(0x7f0000000180)="5e35595f457fbd3c02eaa6871399888bfc8db2f4f0930499f634a26c930dc5f7bbfa2fb9123cb3cec2b29e932d584c156f3d9fbde39c61aaaa025a0549cf31b7cdf268e82322901761aea37d5386b626a87ce274961a9b4791c357de49b0f65fc786b84232c40a0a6622d9ce78d5147293b9f8c158265510a0c9f3e7182150626c09d10a3ee7312afab0f719333ae5a609be76ea0b357b54d7d11a") ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000140)) 03:19:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='+ns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffff\nfffffffd']) [ 2004.929164] gfs2: invalid mount option: statfs_quantum=0xfffffffffff%fffd [ 2004.954881] gfs2: can't parse mount arguments 03:19:51 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffff,fffd']) 03:19:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000000c0)) 03:19:51 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x2) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000300)={{0x6, 0xffffffff}, 'port0\x00', 0x15, 0x20800, 0x2, 0x4, 0x7, 0xfff, 0x0, 0x0, 0x6, 0xfff}) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r6, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0xfffffffffffffffe) 03:19:51 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='a \x00'/17], 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) [ 2005.060781] gfs2: invalid mount option: statfs_quantum=0xfffffff [ 2005.060781] fffffffd [ 2005.099871] gfs2: can't parse mount arguments [ 2005.119036] gfs2: statfs_quantum mount option requires a non-negative numeric argument 03:19:51 executing program 1: r0 = accept(0xffffffffffffff9c, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000140)=0x80) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r1, 0x200, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0xc011) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2005.163272] gfs2: invalid mount option: statfs_quantum=0xfffffff [ 2005.163272] fffffffd [ 2005.181095] gfs2: can't parse mount arguments [ 2005.200321] gfs2: can't parse mount arguments 03:19:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='-ns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffff\"fffffffd']) 03:19:51 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffff.fffd']) 03:19:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='.ns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x101000, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f00000001c0)={0x0, 0x6, 0x1, &(0x7f0000000100)=0x7fff}) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2005.436933] gfs2: invalid mount option: statfs_quantum=0xfffffff"fffffffd [ 2005.443925] gfs2: can't parse mount arguments 03:19:51 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='a \x00'/17], 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:19:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='0ns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:52 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) mq_open(&(0x7f00000000c0)='cgroupvmnet1trusted\x00', 0xc0, 0x72, &(0x7f0000000200)={0x20, 0x8, 0x8, 0x0, 0xc0b, 0xffffffff, 0x3}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r6 = openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000100), 0x12) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:19:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x80000, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e22, 0x44bb, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xd8}, {0xa, 0x4e24, 0x80, @empty}, 0x581985bd, [0x7, 0xffffffffffffffff, 0x8, 0x7, 0x5, 0xffffffff, 0x5, 0x401]}, 0x5c) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100)={0x9, 0x100000000, 0x9, 0x3, 0x7, 0x6, 0x2, 0xcb, 0x800, 0x7ff, 0xffffffffffffffcd}, 0xb) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2005.533489] gfs2: invalid mount option: statfs_quantum=0xfffffff"fffffffd [ 2005.553304] gfs2: invalid mount option: statfs_quantum=0xfffffffffff.fffd [ 2005.567348] gfs2: can't parse mount arguments [ 2005.609912] gfs2: can't parse mount arguments 03:19:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffff%fffffffd']) 03:19:52 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffff/fffd']) 03:19:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x140, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000180)="ddca9e201d0ef7297d22023ca967f6953750056a1f0c62ea58ef3d5800c89b212ec744015f034762bfa262e9e746b64831592445c1776b9ed9ca3b0823925963785484d7c8c953dfe042b6d3645ddc18b4cb419896f1b6e2da45917143e019951fe146a2da0b8eb0acdcd121f305fb506794d73744b5e4d4418c73a4b20b609cdc1713cc158dcbf3ef474bc0e4bd2bd6de7559094bda08c9e81615a76b18e5") 03:19:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='Xns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000003c0)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014e8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fcc42179e8bef77f0000c1d72121c6899255852cc37c454317ef2e0fbb0198860026660ff9543200bfce0f73d531cc81f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc18f6920962525d8aa3d82a66aa33e11bd110f0000") [ 2005.822853] gfs2: invalid mount option: statfs_quantum=0xfffffff%fffffffd [ 2005.855233] gfs2: can't parse mount arguments 03:19:52 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) r1 = syz_open_dev$midi(&(0x7f00000017c0)='/dev/midi#\x00', 0x3, 0x80) setsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f0000001800)="6e051d885588e53b7362aa76247c077fbfc09dc0be291d2191798701e0e7354ff429315bf6543adb2a417da11db5f957e7fa41f9e1aa59a3a83f65c99389fbee0896f2c57448c71d91b643f500a30f1f3d704b16d7c5498f89fda863390bb2b19fdf9a93448cdd7e5b23b62433dd7df15f42982d5b53f446663e66ea177bcb1b4d107f27b5ca54802d28cd17c444eedf28a6e5693d51108160d9719c9a35bcdc81ec16c9ee92de3bbedc0811a527a97ecb16e132642eaadb58c713a5ea3eb41f1f83abd0deab99e4560862b8cd71bc4a00a8fcd0029993b846129e95b154ad4a43bb833f7420bb9e306fb5b1c47f2dc536f48a28f3723caa", 0xf8) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="000069647320f9030c01202f79ed2e7872746d6120"], 0x11) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000200)=0x1e) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) fadvise64(r2, 0x0, 0x6, 0x1) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$KVM_GET_SREGS(r2, 0x8138ae83, &(0x7f0000000300)) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='cns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2005.897585] gfs2: invalid mount option: statfs_quantum=0xfffffff%fffffffd [ 2005.907233] gfs2: can't parse mount arguments 03:19:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x2845, 0x2000) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000100)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast}) 03:19:52 executing program 2: r0 = socket(0x6000800000000010, 0x3, 0x0) write(r0, &(0x7f0000000180)="fc0000001a000700ab092500090007000aab80ff010052020000369321000100fd8ed69ad84e3d951e6a598514fe050000000000ba6da9edf27595057d0000030510fa2c1e998656aa0700000046fe0000020704020800008c0000036c6c256f1a272f2e117c35ebc20521400000040000897f78746758400600000000000000d7d556272f5baa000005de0d5b32c6436e7fbf6ab82088f8e1039fe280fc83ab82f605f30c9ddef2fe082038f4f8b29d03ff463283170e5bbab2ccd243f295ed94e0ad91bd388e712f3e26ad7e25d42dd16b57e583df150c3b0000000046a6a1ed7cf80a00"/252, 0xffffffffffffff3f) 03:19:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffff,fffffffd']) [ 2005.995249] gfs2: invalid mount option: statfs_quantum=0xfffffffffff/fffd [ 2006.002247] gfs2: can't parse mount arguments 03:19:52 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffefffd']) 03:19:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='ins_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000003c0)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7cfc4e1f8c421fcc48105d5ab71d83855c1d72121c681925585c3c36645430fef2e0fbb019845770c26660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd46028122828460009d9e20cc10cc182c4c31d4246000e6aa33e11bd110f0000") munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 03:19:52 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x100, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000040)) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0xaf02, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) r2 = geteuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) write$FUSE_ENTRY(r1, &(0x7f0000000180)={0x90, 0x0, 0x1, {0x6, 0x2, 0x8, 0x4, 0x80, 0x4, {0x5, 0x8001, 0x1, 0x81, 0x20a89f67, 0x5, 0x1ff, 0x8001, 0x2, 0x6, 0x1, r2, r3, 0x7c9, 0xffffffffffffff00}}}, 0x90) [ 2006.148456] gfs2: invalid mount option: fffffffd [ 2006.153273] gfs2: can't parse mount arguments 03:19:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='lns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2006.255576] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2006.266164] gfs2: invalid mount option: fffffffd [ 2006.278067] gfs2: can't parse mount arguments 03:19:52 executing program 1: ioctl(0xffffffffffffffff, 0x1000008913, &(0x7f0000000180)="0adc1f223c123f319bd070a29272e5a3bec553955d648a8192c23ef4e62995d0cc92e21fd8acabf969cdc0d6eea0d954a83aa4c3b7455992aee1f139d70879a4af16e4e4550b9cffac5cccbf3b844953a753f86fb4fd5c7888b6a9da4a7a9693af31a35f32f1c85f4944079a5280a96b57a97a4b88a09b53189f4be64a35f7c0a195d33d132b18483c86a2519ae1ee0b8f39cc42dc9321669deec38c567b26967754a6adca24269fb847228a8227f207c2e9911deb504853a2222bcb8e91560506298b2851cb4a9071f80b6cf9b60161b6") syz_execute_func(&(0x7f00000000c0)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffaff2001000a0e5bee7d1c4e1f8c4c421d1c6ad4c4a0000d27122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2006.310840] gfs2: can't parse mount arguments 03:19:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8b8f, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) sendto$isdn(r1, &(0x7f00000000c0)={0x4, 0x9, "808f1c265b39a9715b0cb58df70e06d5c37e90238cba1fe7b346aa43662951de4836d3388e36ace8bf0687f5e7f5ef1cfe2d8f02"}, 0x3c, 0x804, &(0x7f0000000100)={0x22, 0xc3, 0x7, 0x20, 0x4}, 0x6) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.syz\x00') [ 2006.398572] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2006.408070] gfs2: can't parse mount arguments 03:19:53 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x7) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000440), &(0x7f0000000700)=0x10) r1 = socket$kcm(0xa, 0x7, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8982, &(0x7f0000000040)) r2 = add_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000340)="28c745ef7006e9eb00202422241c8eb687123e20a5d739aad0499210983920b21c53e75a5fa1659a50cde409695254d9b5dfd42e0cb2cc05acdc7341863ee56ed3e786b92447b9def3a35620ca8cc4e050bb8302ece890e7da1dfb2bc1f6bfc07015be01d5246156acefb52dd12ca1863e5fc692a14292edaf50f293b15bc12718d3cd0dcdfb73a0589df93e63faad91a05bbb2ded51481a0c919d69cf41d5aba12423dfd596b7a83d484f601b9fb94d6eab52cdfdd2939ef205333b87df3f369524f2", 0xc3, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000240)={r2, 0xcff, 0xbfc4}, &(0x7f0000000500)={'enc=', 'pkcs1', ' hash=', {'sha512\x00'}}, &(0x7f0000000580)="c26bac6d71ab9d779359657f5f33e8e774e359ef95c3856fb7715919b0ec554b9af3faa075db6552adc9ed127f385ff18d9989d2f48e1de468b286b7001d0b3203a496c4f4845e055318924f9da8568ad7eb5268ff72974f132553dde95127c02222b45440ea571ecdb5", &(0x7f0000000600)=""/123) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="2f706924732000637075202f7264016120"], 0x11) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r4, 0xc0585604, &(0x7f0000000680)={0x1, 0x0, {0x5, 0x5, 0x301f, 0x3, 0x0, 0x0, 0x3, 0x7}}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r6, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000740)=""/85, 0x55) openat$cgroup_ro(r5, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r8, &(0x7f0000000100), 0xda4fff08) sched_setparam(r6, &(0x7f00000007c0)=0x3f) socket$kcm(0x29, 0x0, 0x0) kcmp(r6, r6, 0x7, r4, r3) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r8, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x660c, 0xfffffffffffffffe) 03:19:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffff.fffffffd']) 03:19:53 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffgfffd']) 03:19:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x210040) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f00000000c0)) umount2(&(0x7f0000000040)='./file0\x00', 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1da990000010082a66aa33e11bd110f0000") 03:19:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='ons_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0xe4, r2, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000000}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x15}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff800}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x45}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x66}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb}]}, 0xe4}, 0x1, 0x0, 0x0, 0x40}, 0x80) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000000)={0x7d, 0x600000000000000, [0xc0000100], [0xc2]}) 03:19:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x400, 0x40200) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080), &(0x7f0000000180)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000300)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") flistxattr(r0, &(0x7f00000000c0)=""/180, 0xfebc) [ 2006.768151] gfs2: invalid mount option: statfs_quantum=0xfffffff.fffffffd [ 2006.792551] gfs2: invalid mount option: statfs_quantum=0xfffffffffffgfffd 03:19:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2006.835112] gfs2: can't parse mount arguments [ 2006.840173] gfs2: can't parse mount arguments 03:19:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123d123f319bd04eda3f70") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2006.929665] gfs2: invalid mount option: statfs_quantum=0xfffffff.fffffffd [ 2006.937810] gfs2: invalid mount option: statfs_quantum=0xfffffffffffgfffd [ 2006.944867] gfs2: can't parse mount arguments [ 2006.954674] gfs2: can't parse mount arguments 03:19:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x80000002202, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x78, 0x15}) write$binfmt_aout(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000400000000000000000000000000000000000000000000000000000ce09b485e2e69d4cdaef1c8eff0104000000000000789cb905fc006de339c6db50f3a1385f310d39ae7fed4bac036c6daf01e05668f20624453b19c9873f01a2d6633a10cabbeae9ab5599a0a2726577b8d22b031c89abcfcee1384e555c84067e6f344cab922e1d21a2211bca29e96657e6da6dc200430fe5e37fcea755a28745de11b81655d81d93"], 0x20) r1 = syz_open_pts(r0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x200000, 0x1) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000000280)) fstat(r1, &(0x7f00000000c0)) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x15, 0x1c000000, 0x4, 0x0, 0x0, 0x413}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x100, 0x0) 03:19:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='sns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:53 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffff\nffd']) [ 2007.257373] gfs2: invalid mount option: statfs_quantum=0xffffffffffff [ 2007.257373] ffd [ 2007.288564] gfs2: can't parse mount arguments 03:19:53 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000240)='\x00'}, 0x30) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000300)={0xffffffff, 0x9, 0x400, 0x5, 0x2}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="2f7065c96964732000637075202f09646d4720"], 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r5, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r8 = openat$cgroup_ro(r4, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r7, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r7, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x660c, 0xfffffffffffffffe) getpeername$inet6(r8, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) 03:19:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffff/fffffffd']) 03:19:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x341000, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000380)) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f00000003c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105511, &(0x7f0000000240)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff81"], 0x2) syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x40) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f00000008c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2800000}, 0xc, &(0x7f0000000880)={&(0x7f00000006c0)={0x198, r3, 0x500, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xc000000000000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9015}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x92ba}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_LINK={0xa0, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd4b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_REF={0x8}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x800}, 0x800) close(r2) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffd000/0x2000)=nil) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x0) setxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000580)=@known='trusted.syz\x00', &(0x7f00000005c0)='syz0\x00', 0x5, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000440)={{0x3, 0x2, 0xde0, 0x1, 0x3}, 0x8}) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000640)='fou\x00') epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r4) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xfd3b, &(0x7f0000000400)={&(0x7f0000000280)={0x34, r5, 0x800, 0x70bd28, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3c}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000500), &(0x7f0000000540)=0x4) readv(r4, &(0x7f0000000080)=[{&(0x7f0000000180)=""/217, 0x20000259}], 0x1) 03:19:53 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x48, 0x5, 0x1, "cde7c8f1876f36a5c250572fcbf9fca9", "a96520a45feca179ebc23b9914cb58c89cd237634c78b2650338869eb2ef5f447d7c48777f47e5f066c689d6803cf06720aa75"}, 0x48, 0x1) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='uns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:53 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffff\"ffd']) 03:19:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x15, 0x5, 0x3) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2007.498586] gfs2: invalid mount option: statfs_quantum=0xfffffff/fffffffd [ 2007.521440] gfs2: invalid mount option: statfs_quantum=0xffffffffffff"ffd [ 2007.524072] gfs2: can't parse mount arguments [ 2007.558654] gfs2: can't parse mount arguments 03:19:54 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) accept$netrom(r5, &(0x7f0000000200)={{0x3, @default}, [@default, @default, @netrom, @netrom, @remote, @default, @bcast, @default]}, &(0x7f0000000340)=0x48) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r6, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:19:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='xns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffefffffffd']) 03:19:54 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x40101, 0x0) write$capi20(r0, &(0x7f0000000100)={0x10, 0x5cf, 0x7, 0x81, 0x5, 0x100000000000000}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000140)) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='d\ns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2007.678223] gfs2: invalid mount option: statfs_quantum=0xffffffffffff"ffd [ 2007.715014] gfs2: can't parse mount arguments 03:19:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x341000, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000380)) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f00000003c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105511, &(0x7f0000000240)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff81"], 0x2) syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x40) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f00000008c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2800000}, 0xc, &(0x7f0000000880)={&(0x7f00000006c0)={0x198, r3, 0x500, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xc000000000000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9015}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x92ba}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_LINK={0xa0, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd4b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_REF={0x8}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x800}, 0x800) close(r2) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffd000/0x2000)=nil) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x0) setxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000580)=@known='trusted.syz\x00', &(0x7f00000005c0)='syz0\x00', 0x5, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000440)={{0x3, 0x2, 0xde0, 0x1, 0x3}, 0x8}) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000640)='fou\x00') epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r4) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xfd3b, &(0x7f0000000400)={&(0x7f0000000280)={0x34, r5, 0x800, 0x70bd28, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3c}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000500), &(0x7f0000000540)=0x4) readv(r4, &(0x7f0000000080)=[{&(0x7f0000000180)=""/217, 0x20000259}], 0x1) 03:19:54 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffff%ffd']) [ 2007.752904] gfs2: statfs_quantum mount option requires a non-negative numeric argument 03:19:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff138f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c781925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c44ff8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2007.805088] gfs2: can't parse mount arguments 03:19:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='d%s_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x341000, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000380)) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f00000003c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105511, &(0x7f0000000240)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff81"], 0x2) syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x40) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f00000008c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2800000}, 0xc, &(0x7f0000000880)={&(0x7f00000006c0)={0x198, r3, 0x500, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xc000000000000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9015}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x92ba}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_LINK={0xa0, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd4b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_REF={0x8}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x800}, 0x800) close(r2) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffd000/0x2000)=nil) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x0) setxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000580)=@known='trusted.syz\x00', &(0x7f00000005c0)='syz0\x00', 0x5, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000440)={{0x3, 0x2, 0xde0, 0x1, 0x3}, 0x8}) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000640)='fou\x00') epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r4) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xfd3b, &(0x7f0000000400)={&(0x7f0000000280)={0x34, r5, 0x800, 0x70bd28, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3c}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000500), &(0x7f0000000540)=0x4) readv(r4, &(0x7f0000000080)=[{&(0x7f0000000180)=""/217, 0x20000259}], 0x1) 03:19:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = open(&(0x7f00000000c0)='./file0\x00', 0x200000, 0x40) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000100)={"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"}) [ 2007.989684] gfs2: invalid mount option: statfs_quantum=0xffffffffffff%ffd [ 2007.998666] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2008.052951] gfs2: can't parse mount arguments [ 2008.058262] gfs2: can't parse mount arguments 03:19:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x341000, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000380)) setsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f00000003c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105511, &(0x7f0000000240)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff81"], 0x2) syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x40) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f00000008c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2800000}, 0xc, &(0x7f0000000880)={&(0x7f00000006c0)={0x198, r3, 0x500, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xc000000000000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9015}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x92ba}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_LINK={0xa0, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd4b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_REF={0x8}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x800}, 0x800) close(r2) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffd000/0x2000)=nil) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x0) setxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000580)=@known='trusted.syz\x00', &(0x7f00000005c0)='syz0\x00', 0x5, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000440)={{0x3, 0x2, 0xde0, 0x1, 0x3}, 0x8}) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000640)='fou\x00') epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r4) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xfd3b, &(0x7f0000000400)={&(0x7f0000000280)={0x34, r5, 0x800, 0x70bd28, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3c}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000500), &(0x7f0000000540)=0x4) readv(r4, &(0x7f0000000080)=[{&(0x7f0000000180)=""/217, 0x20000259}], 0x1) [ 2008.171878] gfs2: invalid mount option: statfs_quantum=0xffffffffffff%ffd [ 2008.204756] gfs2: can't parse mount arguments 03:19:54 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffff9c, 0x8982, &(0x7f0000000000)={r0}) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3f7069647320e162700500000000000000"], 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000340)=0x14) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000200)=0xe7d, 0x4) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000000c0)={0x1, 0x6, 0x1, 0x623, 0x2c36, 0x4}) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) getpeername$inet6(r6, &(0x7f0000000500)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000540)=0x1c) openat$cgroup_ro(r3, &(0x7f0000000600)='cpuacct.usage_all\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000400)={0x10, 0x30, 0xfa00, {&(0x7f00000003c0)={0xffffffffffffffff}, 0x3, {0xa, 0x4e22, 0x3, @dev={0xfe, 0x80, [], 0x11}, 0x4}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000440)={0x11, 0x10, 0xfa00, {&(0x7f0000000380), r7}}, 0x18) write$cgroup_pid(r6, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r6, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0xfffffffffffffffe) 03:19:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x8, 0x2) sendmsg$rds(r1, &(0x7f0000001e40)={&(0x7f0000000100)={0x2, 0x4e20}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000140)=""/200, 0xc8}], 0x1, &(0x7f0000001c80)=[@rdma_args={0x48, 0x114, 0x1, {{0x100000001, 0x100}, {&(0x7f0000000280)=""/189, 0xbd}, &(0x7f0000001500)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/153, 0x99}, {&(0x7f0000001400)=""/224, 0xe0}], 0x3, 0x62, 0x7}}, @cswp={0x58, 0x114, 0x7, {{0x1000, 0x3}, &(0x7f0000001540)=0x3, &(0x7f0000001580)=0x7, 0x80000000, 0x12, 0x0, 0x1, 0x1, 0x200}}, @rdma_dest={0x18, 0x114, 0x2, {0x0, 0x9}}, @mask_cswp={0x58, 0x114, 0x9, {{0x3, 0x4f5}, &(0x7f00000015c0)=0x2b, &(0x7f0000001600)=0xffffffffffff2687, 0x7, 0x9, 0x3f, 0x0, 0x0, 0x3}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000001640)=""/152, 0x98}, &(0x7f0000001700), 0x10}}, @rdma_args={0x48, 0x114, 0x1, {{0xa1e, 0xfff}, {&(0x7f0000001740)=""/156, 0x9c}, &(0x7f0000001c00)=[{&(0x7f0000001800)=""/90, 0x5a}, {&(0x7f0000001880)=""/136, 0x88}, {&(0x7f0000001940)=""/11, 0xb}, {&(0x7f0000001980)=""/191, 0xbf}, {&(0x7f0000001a40)=""/169, 0xa9}, {&(0x7f0000001b00)=""/242, 0xf2}], 0x6, 0xb, 0x9}}, @rdma_dest={0x18, 0x114, 0x2, {0xd74a, 0x8}}], 0x1a0, 0x40}, 0x44845) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dn\n_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffgfffffffd']) 03:19:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x26, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="000000000000000012000000000000000000cbb0a22c222fdc2f3bef0000000000000000000000180000000000000000c0a1a2e4c8e6fe56e36f079e19d8dfb025a7cee9946c8424f6ac9f7024b729ee600839600f9dcbd5c8b4b2da7ba86c50a6ecd7734f385959043a2e79a0839d54"], 0x0, 0x0, 0x0}) 03:19:54 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffff,ffd']) [ 2008.447088] gfs2: invalid mount option: statfs_quantum=0xfffffffgfffffffd [ 2008.449256] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2008.459224] gfs2: can't parse mount arguments [ 2008.467324] binder: 13157:13161 unknown command 0 03:19:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dn%_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2008.491325] binder: 13157:13161 ioctl c0306201 20000440 returned -22 [ 2008.522084] binder: 13157:13173 unknown command 0 [ 2008.530879] gfs2: invalid mount option: statfs_quantum=0xfffffffgfffffffd 03:19:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x6, &(0x7f00000000c0)='\n\a\x00\x00\x00\x00\x00\x00\x00\x00\x00') syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x40, 0x0) getsockname$unix(r1, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) [ 2008.543163] binder: 13157:13173 ioctl c0306201 20000440 returned -22 [ 2008.543982] gfs2: can't parse mount arguments [ 2008.592096] gfs2: can't parse mount arguments 03:19:55 executing program 2: r0 = socket$unix(0x1, 0x4, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') r3 = shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ff9000/0x4000)=nil) shmat(r3, &(0x7f0000ffc000/0x4000)=nil, 0x0) sendfile(r0, r2, 0x0, 0x800000bf) getpeername$unix(r0, &(0x7f0000000000)=@abs, &(0x7f0000000100)=0x6e) 03:19:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffff\nffffffd']) 03:19:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns\tresolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2008.675955] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2008.684410] gfs2: can't parse mount arguments 03:19:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000280)="952ccc0f056466420f6e4709911441298f17955bf9c462f907d7ff130fc4014c6566410fe1b8feefffffbff6000000a0e5bee7d1c6e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c1460009c4a1f96e32042d82a66aa33e11bd110f0000") openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0xc0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x2, 0x2) r1 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x1) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000040)=""/29) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000140)=0xfff, 0x4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000100)) [ 2008.772615] gfs2: invalid mount option: statfs_quantum=0xffffffff [ 2008.772615] ffffffd [ 2008.842941] gfs2: can't parse mount arguments 03:19:55 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:19:55 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffff.ffd']) 03:19:55 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/enforce\x00', 0x109101, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000440)=0x23, 0x4) r1 = semget$private(0x0, 0x7ef562735f5a176e, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @broadcast, @empty}, &(0x7f0000000100)=0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="b400000000000000140ac2ff000000009500000080000000"], &(0x7f0000000180)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000000280)=""/195, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x201}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101}, 0x10}, 0x70) keyctl$set_reqkey_keyring(0xe, 0x1) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f0000000040)={0x222457e8, 0x10000, 0x5}) r4 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x2, 0x10000) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0x1) 03:19:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns\nresolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns%resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2008.906670] gfs2: invalid mount option: statfs_quantum=0xffffffff [ 2008.906670] ffffffd [ 2008.945233] gfs2: can't parse mount arguments [ 2008.947710] gfs2: invalid mount option: statfs_quantum=0xffffffffffff.ffd 03:19:55 executing program 2: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x4, 0x3, 0x0, 0x0, 0x3, 0x100a, 0x6, 0xe1c, 0x0, 0x2, 0x1ff, 0x7661, 0xfff, 0xb562, 0x6, 0x4eb, 0xffffffffffffffe0, 0x2770, 0x5, 0x5, 0x9, 0x1, 0x7, 0x2e, 0x1, 0x1, 0x9, 0x1, 0xac, 0x100, 0x2d25, 0x8, 0x1, 0x3, 0x1, 0x0, 0x1, 0x3, @perf_bp={&(0x7f0000000000), 0xa}, 0x80, 0x8, 0x5, 0x0, 0xfffffffffffffff9, 0x20, 0x893}, 0x0, 0xe, 0xffffffffffffff9c, 0x1) r0 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0x9, 0x10000) r1 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[], 0x10000000f) lstat(&(0x7f0000000080)='./file0/file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000340)=0xf8, 0x4) mknod(0x0, 0x0, 0x0) r3 = gettid() setgid(r2) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000000c0)=0x0) sendmsg$rds(r0, &(0x7f0000000980)={&(0x7f0000000380)={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/223, 0xdf}, {&(0x7f0000000440)=""/100, 0x64}, {&(0x7f00000003c0)=""/64, 0x40}, {&(0x7f0000000600)=""/155, 0x9b}], 0x4, &(0x7f00000008c0)=[@rdma_args={0x48, 0x114, 0x1, {{0x1ff, 0x1}, {&(0x7f0000000700)=""/45, 0x2d}, &(0x7f0000000880)=[{&(0x7f0000000740)=""/17, 0x11}, {&(0x7f0000000780)=""/222, 0xde}], 0x2, 0x4, 0x90c9fb9}}, @rdma_dest={0x18, 0x114, 0x2, {0xe957, 0xfff}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x400}, @rdma_dest={0x18, 0x114, 0x2, {0x3, 0x3}}], 0x90, 0x4040004}, 0x20000000) rt_tgsigqueueinfo(r3, r4, 0x38, &(0x7f0000000140)={0x23, 0x81, 0x10001}) 03:19:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = getpid() sched_getscheduler(r1) [ 2008.989868] gfs2: can't parse mount arguments 03:19:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffff\"ffffffd']) 03:19:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dnscresolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) read$alg(r1, &(0x7f0000000140)=""/38, 0xfffffeba) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000180)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="725d81a78f1d4bf89da5925d300e7bc1afc1b91ce9bd1305f36bc4694ff0a96b4481dbdbf0b3790fc41c81a507edaebe", 0x30) 03:19:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001280)='/dev/snapshot\x00', 0x4040, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000012c0)={0x2, [0x0, 0x0]}, &(0x7f0000001300)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000001340)={r2, 0x9, 0xeb, "190483e74291eed15207920090e221c8baf3da2db0aeea15f2def1fde4f6968c839dbd5516071815ce282effcc4998885e36d80ac5f93bd2adea4f8060719882ee70721275204710384af17a2f97771681f8c4004c18769825d50ab1a62d0b16bd93bcfc2a4eaf60aeb910bc5d4210964fa9d404d4cdd4dce65b5e97a5e937a64e5f047cfddcb2fe337fbba263a5779604d1a9e153bc58a1b3de000bc5a72174b359d522e98480f9e082a9b04f2d69e3ecd9d45da1e1d811b1530e2070ba06a61427eac45a7b19d46ed24abc65d60af43a1be33b5ec7004edeca0883fa7c91d8924f5e3aea915e0f68449c"}, 0xf3) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000001440)=0x63, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x60400, 0x0) name_to_handle_at(r3, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x1008, 0x1, "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"}, &(0x7f0000001240), 0x1400) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r0}) bind$unix(r4, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_\nesolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2009.158966] gfs2: invalid mount option: statfs_quantum=0xffffffffffff.ffd [ 2009.184983] gfs2: can't parse mount arguments [ 2009.297560] gfs2: invalid mount option: statfs_quantum=0xffffffff"ffffffd [ 2009.344725] gfs2: can't parse mount arguments [ 2009.423045] gfs2: invalid mount option: statfs_quantum=0xffffffff"ffffffd [ 2009.442573] gfs2: can't parse mount arguments 03:19:55 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:19:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_%esolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adce95081f53f319bd0f0") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000100)="b3ee72dbec110d5d90656b21895cd56c474b69e75e61c739eacf962cdb1cf15708fe0589cb68cda129155176d683eb7ddc47e980396dad85415e7f4db6720f1dd3a3059bd4a112a95e7036f5f448d15cd08265a8cfb86e5ec6e48ccd8ea8ec274a6f0989383afede36438cee3983fa749d810728184abd6ad49f43a397bd800e873ad5b9a2c5bb7d4bc5045cf7b504511318163d1dff2fd335739c73edbc41ea57b4701f177ec0645b04a54e228bcc5dab3513bb1690b9e8ff44bdfa674ff3b2072601d88e2471e2a1ed1ea71a945fff7a87920836e37e3b7569c9fa56a1b4b40794733f5821") 03:19:56 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffff/ffd']) 03:19:56 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffff%ffffffd']) 03:19:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_\nesolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_\nesolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_r\nsolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2009.616627] gfs2: invalid mount option: statfs_quantum=0xffffffffffff/ffd [ 2009.645702] gfs2: invalid mount option: statfs_quantum=0xffffffff%ffffffd [ 2009.657103] gfs2: can't parse mount arguments [ 2009.670087] gfs2: can't parse mount arguments 03:19:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10008000}, 0xc, &(0x7f0000000100)={0xfffffffffffffffd}, 0x1, 0x0, 0x0, 0x4000}, 0x40040) 03:19:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_r%solver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_\nesolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2009.759424] gfs2: invalid mount option: statfs_quantum=0xffffffffffff/ffd [ 2009.774306] gfs2: can't parse mount arguments [ 2009.780338] gfs2: invalid mount option: statfs_quantum=0xffffffff%ffffffd [ 2009.809483] gfs2: can't parse mount arguments 03:19:56 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffeffd']) [ 2009.970575] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2009.991330] gfs2: can't parse mount arguments 03:19:56 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000340)={0x0, 0x4, 0x8000, 0x0, 0x0, [], [], [], 0x7, 0x8000}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:19:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x0, 0x0) setsockopt$inet6_dccp_int(r1, 0x21, 0x10, &(0x7f0000000280)=0x94a, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='uid_map\x00') ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000180)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) preadv(r3, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/54, 0x36}], 0x1, 0x0) 03:19:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_re\nolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:56 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffff,ffffffd']) 03:19:56 executing program 2: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) [ 2010.051886] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2010.077646] gfs2: can't parse mount arguments 03:19:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_re%olver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") syz_init_net_socket$rose(0xb, 0x5, 0x0) [ 2010.112887] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2010.138128] gfs2: can't parse mount arguments 03:19:56 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffgffd']) [ 2010.195878] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2010.236839] gfs2: can't parse mount arguments 03:19:56 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffff.ffffffd']) 03:19:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_res\nlver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = dup(r0) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f00000000c0)) 03:19:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2a37d493, &(0x7f0000000400)="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") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000180)=0x7) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000002c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000540), r4, 0x3}}, 0x18) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {}]}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x3f, 0x0) fcntl$setflags(r3, 0x2, 0x1) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f00000001c0)=ANY=[@ANYBLOB="04010000ff7f0800066fec40ade95d9792af46eee45af6fade6ce1950446a1be96edf127a434dbbae96f66dfa8574849f7d44b2e98e7fc5d267a9eb04cc9cfa4e55e44140d"], 0xc) dup2(r1, r2) [ 2010.469412] gfs2: invalid mount option: statfs_quantum=0xffffffff.ffffffd [ 2010.482378] gfs2: invalid mount option: statfs_quantum=0xffffffffffffgffd [ 2010.511118] gfs2: can't parse mount arguments [ 2010.533372] gfs2: can't parse mount arguments 03:19:57 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:19:57 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffff\nfd']) 03:19:57 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0xc0200, 0x0) bind$llc(r0, &(0x7f0000000100)={0x1a, 0x328, 0x0, 0x5ff, 0x0, 0x7c3, @broadcast}, 0x10) syz_execute_func(&(0x7f0000000140)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = userfaultfd(0x800) fcntl$notify(r1, 0x402, 0x20) 03:19:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_res%lver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2010.592333] sp0: Synchronizing with TNC 03:19:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000280)=0x100, 0x4) r1 = syz_open_dev$dmmidi(&(0x7f0000000440)='/dev/dmmidi#\x00', 0x4, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000480), &(0x7f00000004c0)=0x4) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x100) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x74, "b10c54fd4868c3c4a289c16dfc816bb135103e8e47f99adf5bb4cc9d3f009faedb13cb30c31f98c83fb1df7b9b8dfb9354f92034220e13cdb929961aeb3903b061de553e46d5eaa9b412feebc2204968888c935c43b2e580abbcf420b78d54e7d1b1a6a3dc4777af71f7c76de17c29fed5480fa6"}, &(0x7f0000000180)=0x7c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e22, @remote}}, 0x7ff, 0x2, 0x5, 0x1, 0x1e}, 0x98) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:57 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") prctl$PR_GET_THP_DISABLE(0x2a) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, 0x0) 03:19:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_reso\nver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2010.670997] gfs2: invalid mount option: statfs_quantum=0xffffffff.ffffffd [ 2010.709211] gfs2: can't parse mount arguments 03:19:57 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffff/ffffffd']) [ 2010.783050] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff [ 2010.783050] fd 03:19:57 executing program 1: userfaultfd(0x200000000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000200)=""/95) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000000c0)={0x5, 0x0, &(0x7f0000ffb000/0x3000)=nil}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x40, 0x0) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f0000000280)={0x0, 0xc6ea, 0x100}) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") ioctl$PPPIOCSNPMODE(r2, 0x4008744b, &(0x7f0000000180)={0xc0ff, 0x3}) 03:19:57 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x9, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000080)) 03:19:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_reso%ver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2010.827416] gfs2: can't parse mount arguments [ 2010.902052] gfs2: invalid mount option: statfs_quantum=0xffffffff/ffffffd [ 2010.925259] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff [ 2010.925259] fd [ 2010.940418] gfs2: can't parse mount arguments 03:19:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x5, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x35}, 0xb) sendmsg$rds(r1, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) [ 2010.948761] gfs2: can't parse mount arguments 03:19:57 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)=0x0) write$cgroup_pid(r2, &(0x7f0000000200)=r3, 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r5, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r4, 0x0, 0x40000000800000) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r4, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r7, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r7, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x660c, 0xfffffffffffffffe) 03:19:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x50000, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000080)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:19:57 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffff\"fd']) [ 2011.093306] gfs2: invalid mount option: statfs_quantum=0xffffffff/ffffffd [ 2011.101135] gfs2: can't parse mount arguments 03:19:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_reso.ver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:57 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffeffffffd']) 03:19:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x400000, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2011.206178] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff"fd [ 2011.228292] gfs2: can't parse mount arguments 03:19:57 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x303b279d}, 0xffffff70) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x1) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x1) getpeername(r1, &(0x7f0000000100)=@alg, &(0x7f0000000180)=0x80) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000000240)=@pptp={0x3a5, 0x5}, 0x80, &(0x7f0000003b80), 0xba, &(0x7f00000002c0)=[{0x0, 0x10f, 0x400, "7fa3a9cbf6f33398ccd1f9742d123cacce6132c673b09e9252c771e5b8c378adfeacb0d89c9dfc9846fe0390889f13ba2944fed01605fd90c3"}, {0x0, 0x0, 0xe1, "9cdf52"}, {0x0, 0x11b, 0xfffffffffffffff7, "6512457e0fdcab97292783e584ebddbc0ca8734987dff02f6cac82176b61dee96b8ed669e809b7d64e8776260f9227bf225de72e9f9864704abf31c0b0db"}]}}], 0x1, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400000, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f00000000c0)={{0x80, 0x2}, 0x9}, 0x10) 03:19:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resoLver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:57 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(r5, 0x8004745a, &(0x7f00000000c0)) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) [ 2011.301856] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff"fd [ 2011.307483] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2011.315879] gfs2: can't parse mount arguments 03:19:57 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffff%fd']) 03:19:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x0, 0x80) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000180)=0xb, 0x4) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x2, 0x2) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000100)={0x400, 0x4, 0x9}) write$binfmt_elf32(r2, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x2, 0x2, 0x4, 0x50, 0x2, 0x3e, 0x5, 0x9c, 0x38, 0x3e7, 0x6, 0x1, 0x20, 0x2, 0xffffffff, 0x40, 0x80}, [{0x1, 0x7, 0x8, 0x1, 0x2c, 0x3, 0x3f, 0x81}, {0x7, 0x0, 0x9, 0x7f6a, 0x8, 0x7fffffff, 0x5, 0x6dfe}], "6dd15accb76dc5e4dc826db7c12de2ffd1cdb134b62e6c7df69c6aecd781c97886ef971e3b64d2f8f36761d24506caafccfe06ca0d156a90c85d", [[], [], [], [], [], [], [], [], []]}, 0x9b2) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000b80)={0x17bb4977, 0x8000, 0x5, 0x1, 0x0}, &(0x7f0000000bc0)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000c00)={r3, @in6={{0xa, 0x4e24, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x10001}}, 0x1f, 0xa1aa}, 0x90) [ 2011.382568] gfs2: can't parse mount arguments 03:19:57 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x8000000000001, 0x20280a1) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000600)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}]}]}, 0x34}}, 0x0) write$evdev(r0, &(0x7f0000000040)=[{}, {{0x0, 0x7530}}], 0xff3e) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 2011.453841] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2011.471837] gfs2: can't parse mount arguments 03:19:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resouver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:57 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x521500, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000280), &(0x7f00000002c0)=0x4) removexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@known='trusted.overlay.upper\x00') prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000380)) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x2, 0x180) getpeername$inet(r0, &(0x7f0000000400)={0x2, 0x0, @dev}, &(0x7f0000000440)=0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000480)={0x0, 0xfff, 0x0, 0x22, 0x2}, &(0x7f0000000140)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000180)={r2, 0xffff, 0x30}, &(0x7f00000001c0)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000200)={0x9, 0x6}) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r4 = getpid() ptrace$getregset(0x4204, r4, 0x6, &(0x7f0000000580)={&(0x7f00000005c0)=""/148, 0x94}) [ 2011.513507] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff%fd 03:19:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffgffffffd']) [ 2011.601046] gfs2: can't parse mount arguments 03:19:58 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:19:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resol\ner\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:58 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x400000, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2011.703506] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff%fd [ 2011.718449] gfs2: invalid mount option: statfs_quantum=0xffffffffgffffffd [ 2011.729272] gfs2: can't parse mount arguments [ 2011.754836] gfs2: can't parse mount arguments 03:19:58 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffff,fd']) 03:19:58 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2011.818747] rtc_cmos 00:00: Alarms can be up to one day in the future 03:19:58 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000200)={r1, 0x1, 0xd6, r1}) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:19:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resol%er\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:58 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/178, 0xb2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2011.870298] gfs2: invalid mount option: statfs_quantum=0xffffffffgffffffd [ 2011.893352] gfs2: can't parse mount arguments 03:19:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffff\nfffffd']) 03:19:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolv\nr\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2011.985491] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2012.042255] gfs2: can't parse mount arguments 03:19:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f00000000c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000140)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x5}, &(0x7f00000001c0)=0x8) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000280)=0x60, 0x2) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000200)={r2, 0x5}, &(0x7f0000000240)=0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2012.066759] rtc_cmos 00:00: Alarms can be up to one day in the future 03:19:58 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2012.122662] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2012.146796] gfs2: can't parse mount arguments 03:19:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolv%r\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:58 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffff.fd']) [ 2012.175003] gfs2: invalid mount option: statfs_quantum=0xfffffffff [ 2012.175003] fffffd [ 2012.200630] gfs2: can't parse mount arguments 03:19:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = dup3(r0, r0, 0x80000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000300)=[@in6={0xa, 0x4e21, 0x1, @remote, 0x2}, @in6={0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @in6={0xa, 0x4e23, 0x3, @mcast1, 0x1ff}], 0x54) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000380)={0x2, 0x1, 0xffffffff, 0x9, 0x5, 0xfffffffffffffffb}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f00000004c0)) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000002c0)=0x2) getsockname$ax25(r2, &(0x7f0000000200)={{0x3, @null}, [@null, @netrom, @netrom, @null, @remote, @netrom, @null, @rose]}, &(0x7f0000000280)=0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={0x0, r3, 0xf, 0x2}, 0x14) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000580)) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000540)={0x1d, 0xc3, 0x3, 0x1ff, 0xe, 0x8, 0x2, 0x1, 0x4, 0x2af58e29}) fsetxattr$trusted_overlay_nlink(r2, &(0x7f00000003c0)='trusted.overlay.nlink\x00', &(0x7f0000000500)={'U-', 0x5}, 0x28, 0x2) ioctl(r0, 0x5, &(0x7f0000000140)="723ca35cfd7a33a3aa3a239957fc7f5ad25662ccb58c38f0f9f2e1d7f9cebcae0b2a691e9719d04e9d4f147b2e8d7dd27351e034b1126ecce1bd97cb847289b0a400290c488b81393b90f9e27bc94ab6c855cb951d931fce4773386a939c2239e8a665c3de763ba1cd7bac19a5725bcbb5b60a0d1b835d3ccf032811a862f70bff645a36d98d8b76eb771bff1f4df410eff96656f4") 03:19:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolve\n\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:19:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffff\"fffffd']) [ 2012.359637] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff.fd [ 2012.375988] gfs2: can't parse mount arguments [ 2012.430440] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff.fd [ 2012.441028] gfs2: can't parse mount arguments [ 2012.505358] gfs2: invalid mount option: statfs_quantum=0xfffffffff"fffffd [ 2012.535435] gfs2: can't parse mount arguments [ 2012.606074] gfs2: invalid mount option: statfs_quantum=0xfffffffff"fffffd [ 2012.613127] gfs2: can't parse mount arguments 03:19:59 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) getpid() write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="2f09eaed00"/17], 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000200)={0x2, @time={0x77359400}, 0x6, {0x60e1ba5c, 0x4}, 0x5, 0x2, 0x3}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() 03:19:59 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:19:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") request_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='\x00', 0xfffffffffffffff9) 03:19:59 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffff/fd']) 03:19:59 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffff%fffffd']) 03:19:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="952ccc59fe2402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000c482b5aef521fc7122c1d72121c681925585c3c36645430fef2e0fbb01988600d101c40101f1eeee73d539c481f8521f5726c4018df6a8d7000000f0811549e3e038f8000000622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2012.800575] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff/fd [ 2012.825165] gfs2: can't parse mount arguments [ 2012.838240] gfs2: invalid mount option: statfs_quantum=0xfffffffff%fffffd [ 2012.880332] gfs2: can't parse mount arguments 03:19:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x12001, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x80, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000100)=0x6) ftruncate(r2, 0x80) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0xffffffff}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000200)={r3, 0x4a, "21fa222d0b6e41e23c2ead4e6b5c7992f5938311905e477420c291f9355ffc11e324a8b852b10998a1f7fd98837c86d829f6315dddd7d288d8d65db8367585fe533ae8796177dea1a779"}, &(0x7f0000000280)=0x52) [ 2012.950194] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff/fd [ 2012.962570] gfs2: invalid mount option: statfs_quantum=0xfffffffff%fffffd [ 2012.972471] gfs2: can't parse mount arguments [ 2012.982694] gfs2: can't parse mount arguments 03:19:59 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffefd']) 03:19:59 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffff,fffffd']) 03:19:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") timerfd_gettime(r0, &(0x7f00000000c0)) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x141, 0x42) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2013.173160] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2013.189973] gfs2: can't parse mount arguments [ 2013.238959] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2013.254350] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2013.271189] gfs2: can't parse mount arguments [ 2013.279541] gfs2: can't parse mount arguments [ 2013.655552] device bridge_slave_1 left promiscuous mode [ 2013.661230] bridge0: port 2(bridge_slave_1) entered disabled state [ 2013.735588] device bridge_slave_0 left promiscuous mode [ 2013.741145] bridge0: port 1(bridge_slave_0) entered disabled state [ 2013.937990] device hsr_slave_1 left promiscuous mode [ 2014.004084] device hsr_slave_0 left promiscuous mode [ 2014.059234] team0 (unregistering): Port device team_slave_1 removed [ 2014.096887] team0 (unregistering): Port device team_slave_0 removed [ 2014.108869] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2014.181189] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2014.348303] bond0 (unregistering): Released all slaves [ 2015.273095] IPVS: ftp: loaded support on port[0] = 21 [ 2015.430810] chnl_net:caif_netlink_parms(): no params data found [ 2015.470354] bridge0: port 1(bridge_slave_0) entered blocking state [ 2015.476919] bridge0: port 1(bridge_slave_0) entered disabled state [ 2015.484287] device bridge_slave_0 entered promiscuous mode [ 2015.505836] bridge0: port 2(bridge_slave_1) entered blocking state [ 2015.512297] bridge0: port 2(bridge_slave_1) entered disabled state [ 2015.519800] device bridge_slave_1 entered promiscuous mode [ 2015.559351] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2015.576561] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2015.608418] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2015.618595] team0: Port device team_slave_0 added [ 2015.624357] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2015.632047] team0: Port device team_slave_1 added [ 2015.637522] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2015.650829] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2015.717573] device hsr_slave_0 entered promiscuous mode [ 2015.755008] device hsr_slave_1 entered promiscuous mode [ 2015.795262] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2015.802340] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2015.842097] bridge0: port 2(bridge_slave_1) entered blocking state [ 2015.848542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2015.855250] bridge0: port 1(bridge_slave_0) entered blocking state [ 2015.861615] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2015.992933] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2015.999413] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2016.009836] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2016.020008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2016.028300] bridge0: port 1(bridge_slave_0) entered disabled state [ 2016.041831] bridge0: port 2(bridge_slave_1) entered disabled state [ 2016.049347] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2016.067530] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2016.073646] 8021q: adding VLAN 0 to HW filter on device team0 [ 2016.091290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2016.109132] bridge0: port 1(bridge_slave_0) entered blocking state [ 2016.115685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2016.147862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2016.156816] bridge0: port 2(bridge_slave_1) entered blocking state [ 2016.163210] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2016.171560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2016.180189] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2016.201005] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2016.208853] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2016.222496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2016.242549] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2016.261659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2016.284706] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2016.297409] 8021q: adding VLAN 0 to HW filter on device batadv0 03:20:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolve%\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bd070") r1 = fcntl$dupfd(r0, 0x406, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) pread64(r0, &(0x7f00000000c0)=""/188, 0xbc, 0xe) r3 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x7, 0x8001) ioctl$KDGKBTYPE(r3, 0x4b33, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:02 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffgfd']) [ 2016.390585] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffgfd [ 2016.433949] gfs2: can't parse mount arguments [ 2016.491158] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffgfd [ 2016.500685] gfs2: can't parse mount arguments [ 2022.559967] IPVS: ftp: loaded support on port[0] = 21 [ 2023.167085] chnl_net:caif_netlink_parms(): no params data found [ 2023.461764] bridge0: port 1(bridge_slave_0) entered blocking state [ 2023.477378] bridge0: port 1(bridge_slave_0) entered disabled state [ 2023.491286] device bridge_slave_0 entered promiscuous mode [ 2023.499915] device bridge_slave_1 left promiscuous mode [ 2023.512135] bridge0: port 2(bridge_slave_1) entered disabled state [ 2023.555750] device bridge_slave_0 left promiscuous mode [ 2023.561281] bridge0: port 1(bridge_slave_0) entered disabled state [ 2024.127648] device hsr_slave_1 left promiscuous mode [ 2024.169640] device hsr_slave_0 left promiscuous mode [ 2024.229161] team0 (unregistering): Port device team_slave_1 removed [ 2024.250243] team0 (unregistering): Port device team_slave_0 removed [ 2024.273402] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2024.334011] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2024.482891] bond0 (unregistering): Released all slaves [ 2024.569274] bridge0: port 2(bridge_slave_1) entered blocking state [ 2024.584723] bridge0: port 2(bridge_slave_1) entered disabled state [ 2024.592972] device bridge_slave_1 entered promiscuous mode [ 2024.632185] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2024.666294] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2024.694153] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2024.709743] team0: Port device team_slave_0 added [ 2024.718051] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2024.729943] team0: Port device team_slave_1 added [ 2024.737826] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2024.749669] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2024.879521] device hsr_slave_0 entered promiscuous mode [ 2024.955085] device hsr_slave_1 entered promiscuous mode [ 2024.995286] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2025.003809] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2025.040858] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2025.107704] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2025.113827] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2025.126536] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2025.136580] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2025.143468] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2025.161029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2025.181565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2025.197851] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2025.203961] 8021q: adding VLAN 0 to HW filter on device team0 [ 2025.247304] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2025.254995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2025.262955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2025.295306] bridge0: port 1(bridge_slave_0) entered blocking state [ 2025.301706] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2025.317441] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2025.340670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2025.348548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2025.375694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2025.383443] bridge0: port 2(bridge_slave_1) entered blocking state [ 2025.389872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2025.426297] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2025.456686] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2025.471684] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2025.505468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2025.517604] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2025.545526] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2025.551648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2025.565745] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2025.581143] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2025.598230] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2026.003803] XFS (loop2): Invalid superblock magic number 03:20:12 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) 03:20:12 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffff.fffffd']) 03:20:12 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r4 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r4, 0x65, 0x4, &(0x7f0000cbc000)=""/244, &(0x7f0000000040)=0x26e) r5 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r5, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r7, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r7, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x660c, 0xfffffffffffffffe) 03:20:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x16d480, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1001010}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r2, 0x720, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'eth', 0x3a, 'bcsh0\x00'}}}, ["", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x40080}, 0x80) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000280)) 03:20:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x02', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:12 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffff\nd']) [ 2026.187914] gfs2: invalid mount option: statfs_quantum=0xfffffffff.fffffd [ 2026.213987] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff [ 2026.213987] d [ 2026.224768] gfs2: can't parse mount arguments [ 2026.229531] gfs2: can't parse mount arguments 03:20:12 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x80002, 0x108) r1 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000180)={r1}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x200000, 0x0) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x03', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:12 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) [ 2026.343938] rtc_cmos 00:00: Alarms can be up to one day in the future [ 2026.352117] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff [ 2026.352117] d 03:20:12 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffff/fffffd']) 03:20:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x04', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2026.443718] gfs2: can't parse mount arguments 03:20:12 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffff\"d']) 03:20:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x101100, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000500)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000540)={@ipv4={[], [], @broadcast}, 0x23, r2}) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") write$capi20(r1, &(0x7f0000000240)={0x10, 0x7ff, 0x8e, 0x81, 0xc70000000000, 0x4094}, 0x10) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000180)={@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @multicast2}, 0x2, 0x3, 0x0, 0x4}}, {&(0x7f0000000100)=""/38, 0x26}, &(0x7f0000000140), 0x8}, 0xa0) bind$rds(r1, &(0x7f0000000300)={0x2, 0x4e23, @remote}, 0x10) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x3, &(0x7f0000000480)=[{&(0x7f0000000600)="1fd8a0bd098a686b1a", 0x9, 0x7}, {&(0x7f0000000340)="3c1cf86342d7f8081c99b333f45042b8f835a65285485e94e6395b7e1909ff5c02dc4efc2042cf27dbbdca1d3295edbe4412e1bac0909aeb06fb6163fb", 0x3d, 0x7fffffff}, {&(0x7f0000000380)="24bdc6266b48e78e6db353ce7009a40829715940f7aa455f2741cba53806f1af75a1bd54cc9c0b9ca937190f9606de2d2488036ab316729ebe59ecd97678c8fb7775a8023af37257dbca5d9398e5c0119a7549efbca0281ea52e6bd4863b211e29cc9df3a7963cc5382b63ab2056d037d7708c6500446f093fe971909b6b18e8885a7ac189d12483dcfbba467a95c5d9ecefb0d97cadd1074b2d56bc4b4e55dd7e39ae2fbcc00fede08a0026ad3b4815bc2f0ec291e9b54e7475e2e320fa1dcd345175b5433f3a43903a3b25a1acca89974bd95ca749b8feb7efa8e236f1a5dc20a1f2fb01e668ec7c03823358ffc1ef67", 0xf1, 0xffffffffffffff81}], 0x140000, &(0x7f0000000580)={[{@noquota='noquota'}, {@jdev={'jdev', 0x3d, './file0'}}, {@conv='conv'}, {@hash_r5='hash=r5'}, {@jdev={'jdev', 0x3d, './file0'}}, {@hash_r5='hash=r5'}, {@user_xattr='user_xattr'}, {@resize_auto='resize=auto'}, {@expose_privroot='expose_privroot'}], [{@appraise='appraise'}]}) [ 2026.557731] gfs2: invalid mount option: statfs_quantum=0xfffffffff/fffffd [ 2026.584811] gfs2: can't parse mount arguments 03:20:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x05', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2026.619214] rtc_cmos 00:00: Alarms can be up to one day in the future [ 2026.656669] gfs2: invalid mount option: statfs_quantum=0xfffffffff/fffffd [ 2026.693822] gfs2: can't parse mount arguments [ 2026.708731] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff"d [ 2026.781031] gfs2: can't parse mount arguments [ 2026.873058] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff"d [ 2026.884352] gfs2: can't parse mount arguments 03:20:13 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() r4 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0x1) 03:20:13 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) 03:20:13 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffefffffd']) 03:20:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x5, 0x80100) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x06', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:13 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffff%d']) 03:20:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\a', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2027.169026] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff%d [ 2027.181805] gfs2: can't parse mount arguments 03:20:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12bf319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2027.235539] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2027.247046] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff%d [ 2027.254024] gfs2: can't parse mount arguments [ 2027.274794] gfs2: can't parse mount arguments [ 2027.281616] rtc_cmos 00:00: Alarms can be up to one day in the future 03:20:13 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000100)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x28) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:13 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffff,d']) [ 2027.393125] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2027.416829] gfs2: can't parse mount arguments 03:20:13 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffgfffffd']) 03:20:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\n', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2027.539456] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2027.583566] gfs2: can't parse mount arguments [ 2027.644821] XFS (loop2): Invalid superblock magic number [ 2027.655889] gfs2: invalid mount option: statfs_quantum=0xfffffffffgfffffd [ 2027.662909] gfs2: can't parse mount arguments [ 2027.671419] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2027.694159] gfs2: can't parse mount arguments 03:20:14 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="2f7069643320006370752f7264d1612000370c3b21180f99bb8e23cbd6580279c124cf7e008b72f04e2850118cc7368ef4263c4a39dccf78424daca7720f6a56e7cf2280ab76c8ce97e192a3cd4c686ca3c26ac7db40dca0e630da36bf7686ed38eab448ecad35322f47843338887ea55d42f865896950bb515c3d752ef6054ccfee1c472d3ee4c84b2df85b5a9fe6a0e4e5d2ae5ced370a3970480d053046f395af594100"/179], 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x3, 0x1, 0x4, 0x0, 0x177}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:20:14 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4210000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x108, r2, 0x20, 0x70bd27, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x71}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x72}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="589f8b832b430d765ad958ba44fe29e7"}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x108}, 0x1, 0x0, 0x0, 0x1}, 0xc0c0) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolverH', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:14 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffff.d']) [ 2027.812884] gfs2: invalid mount option: statfs_quantum=0xfffffffffgfffffd [ 2027.824768] gfs2: can't parse mount arguments 03:20:14 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffff\nffffd']) 03:20:14 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000100)=""/54, &(0x7f0000000140)=0x36) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolverL', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2027.963836] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff.d [ 2027.997966] gfs2: can't parse mount arguments 03:20:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="952ccc420fc7b164040000c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc83730093c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600093eeb08042d82a66aa33e11bd110f0000") 03:20:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver`', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2028.063814] gfs2: invalid mount option: statfs_quantum=0xffffffffff [ 2028.063814] ffffd [ 2028.064210] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff.d [ 2028.095472] gfs2: can't parse mount arguments [ 2028.107696] gfs2: can't parse mount arguments 03:20:14 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffff/d']) [ 2028.213430] gfs2: invalid mount option: statfs_quantum=0xffffffffff [ 2028.213430] ffffd [ 2028.229977] gfs2: can't parse mount arguments [ 2028.326179] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff/d [ 2028.344140] gfs2: can't parse mount arguments [ 2028.403955] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff/d [ 2028.422386] gfs2: can't parse mount arguments 03:20:14 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="2f706964cdc1ff227075202f72646d61205aa42cf5b511c3033c9b4f515f6a336d4200ffafa06375520a9a9c3e859d04a5ce82c913734897cb3a0f41aa4130824f6ebe4a7df81b13accd055662cea3a148753edbcc5c7cfe0067bcc15bfcea86d7b82bd0d556f26b85498dfc297216a4397b9b908ebf596eef4ad958d898cea0e1df0ac6b72a6e13066bafc59de1faf31f49e660a1fef2a1a58e8e24d8fd05b45626cc0af41b4333e1ac213e56ca86a9d49ed86192f44b80742f7e16b6dee282d4ac29b979e09c787480f1f8775f2f9835c9b4349c95aa14b1b4ec199507e65c2e2907f72869c85025d4299ee18408dc6ac06542c09d0c"], 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:20:14 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:14 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffff\"ffffd']) 03:20:14 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff131fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2edb994198860026660ff954320042dadc39c4c4c1fa6f03c4018df6a8d7000000660ffcd4622828c14600090cc1042dc0a66aa33e11bd110f0000") r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000100)={0xae1, 0x4, 0x200, 0x6, 0xfa0}) 03:20:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolverh', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:14 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffffed']) [ 2028.537828] gfs2: invalid mount option: statfs_quantum=0xffffffffff"ffffd [ 2028.570977] gfs2: can't parse mount arguments 03:20:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolverl', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2028.643777] gfs2: invalid mount option: statfs_quantum=0xffffffffff"ffffd [ 2028.663448] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2028.667231] gfs2: can't parse mount arguments 03:20:15 executing program 1: request_key(&(0x7f00000002c0)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f00000005c0)='bpf\x00', 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x10, &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRESDEC=r1, @ANYBLOB="2c61756469742c6673757569643d7d7f7632377737342d003837652d357700312d753533372d34623762777739662c646f6e745f6d6561737572652c00"]) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") accept(r0, &(0x7f0000000300)=@x25, &(0x7f0000000380)=0x80) syz_execute_func(&(0x7f00000000c0)="1b9595cc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff600002ca0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:15 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2028.732152] gfs2: can't parse mount arguments 03:20:15 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffff%ffffd']) 03:20:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolvert', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:15 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffffgd']) [ 2028.999090] gfs2: invalid mount option: statfs_quantum=0xffffffffffffffgd [ 2029.036989] gfs2: can't parse mount arguments 03:20:15 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x22) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000340)=""/235, &(0x7f00000000c0)=0xeb) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r6, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0xfffffffffffffffe) 03:20:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0xffffffffffffffff) r2 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x4, 0x30100) r3 = perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x2, 0x0, 0x0, 0x5, 0x0, 0x9, 0x80008, 0x7, 0x2, 0x5, 0x7fff, 0xffffffffffff2bed, 0x5, 0x400, 0x401, 0x997, 0x9, 0xf0, 0x9, 0x7, 0x9, 0x2, 0x7, 0x0, 0x0, 0x0, 0x5, 0x2, 0x7ff, 0x4, 0xfff, 0x5d9, 0x40, 0x3, 0x9, 0x2, 0x0, 0x10001, 0x2, @perf_config_ext={0x9, 0xd1f}, 0x20002, 0x1, 0x5, 0x7, 0x9, 0x1, 0x3e0}, r1, 0x9, r2, 0x8) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x60100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000400)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000480)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), r5}}, 0x18) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a9bd070") ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f00000001c0)={0x0, r3, 0xffffffff80000000, 0x8, 0xb9, 0x2}) socket$alg(0x26, 0x5, 0x0) syz_execute_func(&(0x7f0000000700)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolverz', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:15 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffff,ffffd']) [ 2029.129375] gfs2: invalid mount option: statfs_quantum=0xffffffffffffffgd [ 2029.158742] gfs2: can't parse mount arguments 03:20:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r2, 0xffffffff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x4, @empty, 0x4}, @in={0x2, 0x4e23, @multicast2}}}, 0x118) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:15 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffff\"']) [ 2029.224824] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2029.249848] gfs2: can't parse mount arguments [ 2029.268363] XFS (loop2): Invalid superblock magic number 03:20:15 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000100)=0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000040)={'nat\x00'}, &(0x7f0000000200)=0x78) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl(r1, 0x101, &(0x7f0000000140)="fcf9d29407d58ee6b548448bd8f9339652e58deffda3426e0e9e1227b54280f05d53bd3e92dee9a659b19c2e8fc5a31e4fab17980bd6349191d0b7edf505d2cc829d0eb248d791f0e7078ea2ff155e628a779e75d431b06e12c2072f5d1a9c1edcf7a64c2df3c057c8da521952db7b1d73f03e27144aed6079a990959c6e1d271808a46522c1e5f0eae01b5b9d0c266ff7766dd20eee59762a7facf18076986ee16affc0e64a6320") syz_execute_func(&(0x7f0000000500)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f440f8d03000000fff6000000a0e5bee7d1c4e1f8c421fc7122f26540d915000880413b66440f72d07979925585c3c36645430fef2ee20f3b01018f896801b3070046950026660ff9543200bfce0f73d52039c4c4f8521f5726c4018df6a8d7000000760ffca1d4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:15 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffff.ffffd']) [ 2029.387449] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffff" [ 2029.403153] gfs2: can't parse mount arguments 03:20:15 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:15 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffff%']) [ 2029.472617] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffff" [ 2029.499239] gfs2: can't parse mount arguments [ 2029.601825] gfs2: invalid mount option: statfs_quantum=0xffffffffff.ffffd 03:20:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x111000, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x10000000000000a, 0x0, 0x9, 0x13, 0x5, "89303119d2d025da883de85a3e5ad9554912d57e8f52332772cbc9cd3ecda43c4dafcbec9616fea80309009891af6717e95fd09195b3d18dc4e3ba554b973e1e", "59882f3e9774b4aad127c71fe66c82941fdf371a87ebbce6586831fe0ac4a52ffbcb2190c1a8ddc20bd5b9a8edfd6bc66c313708673718005140220e80f9b7ac", "b3ca5169f611caf9ad58ec42d0acb8543e92fd48720900", [0xb6, 0x101]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2029.662690] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffff% [ 2029.699427] gfs2: can't parse mount arguments [ 2029.709077] gfs2: can't parse mount arguments 03:20:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x1, 0x3, 0x800}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000001c0)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb01988600bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) [ 2029.824340] gfs2: invalid mount option: statfs_quantum=0xffffffffff.ffffd [ 2029.847313] gfs2: can't parse mount arguments 03:20:16 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000340)='memory.av\xffnts\x00\x12\xec\xb0[Pf+3\n\x01Y\x1dI~H\xa9W\x9d\'\xa5m\a\x03\aR\xd7K\xc0\xd2\x1c\xf7;VNI\x90A\n\xd0\xe3s*w\xc0k\xa6\xdd\x12[\xd0\xae\x92\xf18u\xf4\xda\x80.B\x14\xe9\xf2\x93&', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) 03:20:16 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2030.894412] device bridge_slave_1 left promiscuous mode [ 2030.900904] bridge0: port 2(bridge_slave_1) entered disabled state [ 2030.955867] device bridge_slave_0 left promiscuous mode [ 2030.961392] bridge0: port 1(bridge_slave_0) entered disabled state [ 2031.118576] device hsr_slave_1 left promiscuous mode [ 2031.159797] device hsr_slave_0 left promiscuous mode [ 2031.229401] team0 (unregistering): Port device team_slave_1 removed [ 2031.251692] team0 (unregistering): Port device team_slave_0 removed [ 2031.272643] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2031.331627] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2031.497008] bond0 (unregistering): Released all slaves [ 2032.114011] IPVS: ftp: loaded support on port[0] = 21 [ 2032.373138] chnl_net:caif_netlink_parms(): no params data found [ 2032.453875] bridge0: port 1(bridge_slave_0) entered blocking state [ 2032.460415] bridge0: port 1(bridge_slave_0) entered disabled state [ 2032.473626] device bridge_slave_0 entered promiscuous mode [ 2032.481206] bridge0: port 2(bridge_slave_1) entered blocking state [ 2032.493537] bridge0: port 2(bridge_slave_1) entered disabled state [ 2032.501118] device bridge_slave_1 entered promiscuous mode [ 2032.552872] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2032.562758] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2032.618448] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2032.630068] team0: Port device team_slave_0 added [ 2032.637823] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2032.649311] team0: Port device team_slave_1 added [ 2032.656665] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2032.664214] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2032.730462] device hsr_slave_0 entered promiscuous mode [ 2032.787905] device hsr_slave_1 entered promiscuous mode [ 2032.828251] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2032.845195] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2032.891126] bridge0: port 2(bridge_slave_1) entered blocking state [ 2032.897579] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2032.904364] bridge0: port 1(bridge_slave_0) entered blocking state [ 2032.910792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2032.961026] bridge0: port 1(bridge_slave_0) entered disabled state [ 2032.981083] bridge0: port 2(bridge_slave_1) entered disabled state [ 2033.074280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2033.107440] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2033.127330] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2033.133564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2033.145390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2033.155775] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2033.161876] 8021q: adding VLAN 0 to HW filter on device team0 [ 2033.203997] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2033.230588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2033.239425] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2033.252997] bridge0: port 1(bridge_slave_0) entered blocking state [ 2033.259441] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2033.275635] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2033.291962] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2033.301392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2033.317233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2033.330348] bridge0: port 2(bridge_slave_1) entered blocking state [ 2033.336813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2033.370885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2033.413919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2033.421573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2033.439646] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2033.475773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2033.490781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2033.516571] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2033.537039] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2033.550684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2033.565502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2033.580983] IPVS: ftp: loaded support on port[0] = 21 [ 2033.588997] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2033.603015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2033.611442] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2033.633635] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2033.661707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2033.671814] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2033.685636] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2033.691711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2033.778920] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2033.801065] 8021q: adding VLAN 0 to HW filter on device batadv0 03:20:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:20 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffff,']) 03:20:20 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffff/ffffd']) 03:20:20 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:20 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r5, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0xfffffffffffffffe) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f00000000c0)={0x0, {0xffffffffffffffff, 0x7fff}}) [ 2033.933757] chnl_net:caif_netlink_parms(): no params data found 03:20:20 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2034.049351] bridge0: port 1(bridge_slave_0) entered blocking state [ 2034.058666] gfs2: invalid mount option: statfs_quantum=0xffffffffff/ffffd [ 2034.072507] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2034.086586] bridge0: port 1(bridge_slave_0) entered disabled state [ 2034.093402] gfs2: can't parse mount arguments [ 2034.114090] device bridge_slave_0 entered promiscuous mode [ 2034.128277] gfs2: can't parse mount arguments [ 2034.152835] gfs2: invalid mount option: statfs_quantum=0xffffffffff/ffffd [ 2034.161725] Invalid option length (1048446) for dns_resolver key [ 2034.164933] bridge0: port 2(bridge_slave_1) entered blocking state [ 2034.184280] gfs2: can't parse mount arguments [ 2034.190653] bridge0: port 2(bridge_slave_1) entered disabled state [ 2034.205634] gfs2: statfs_quantum mount option requires a non-negative numeric argument 03:20:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2034.225422] device bridge_slave_1 entered promiscuous mode [ 2034.240337] gfs2: can't parse mount arguments 03:20:20 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffeffffd']) [ 2034.377388] bond0: Enslaving bond_slave_0 as an active interface with an up link 03:20:20 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffff.']) [ 2034.501104] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2034.512507] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2034.529687] Invalid option length (1048446) for dns_resolver key [ 2034.536121] gfs2: can't parse mount arguments [ 2034.567175] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2034.589844] team0: Port device team_slave_0 added [ 2034.597378] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2034.598626] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2034.606315] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffff. [ 2034.613455] team0: Port device team_slave_1 added [ 2034.626623] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2034.634239] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2034.656201] gfs2: can't parse mount arguments [ 2034.667049] gfs2: can't parse mount arguments [ 2034.707724] device hsr_slave_0 entered promiscuous mode [ 2034.745259] device hsr_slave_1 entered promiscuous mode [ 2034.796130] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2034.803473] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2034.833110] bridge0: port 2(bridge_slave_1) entered blocking state [ 2034.839577] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2034.915294] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2034.921876] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2034.939543] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2034.961144] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2034.983228] bridge0: port 2(bridge_slave_1) entered disabled state [ 2034.991701] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2035.019532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2035.035471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2035.057983] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2035.064135] 8021q: adding VLAN 0 to HW filter on device team0 [ 2035.088711] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2035.096019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2035.111174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2035.134376] bridge0: port 1(bridge_slave_0) entered blocking state [ 2035.140854] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2035.157752] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2035.172040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2035.182470] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2035.198738] bridge0: port 2(bridge_slave_1) entered blocking state [ 2035.205197] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2035.222588] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2035.240271] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2035.250455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2035.264243] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2035.282102] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2035.291395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2035.307554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2035.327609] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2035.341272] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2035.350988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2035.367412] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2035.383463] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2035.399887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2035.409782] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2035.423808] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2035.434093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2035.449201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2035.463360] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2035.473768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2035.501808] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2035.521740] 8021q: adding VLAN 0 to HW filter on device batadv0 03:20:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:22 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014cc4c10969ff6566410fe1b8feefffffbfccf6a7000000e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fefe42e0fbb0101460ff376b2860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4664077c22828c146fa000909c1042d663ef3460f38f672eda66aa33e11bd110f0000") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e22, @remote}}, 0x6, 0x3ff, 0x3, 0x9, 0x800}, &(0x7f00000003c0)=0x98) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r3, &(0x7f0000008ac0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[{0xc}], 0xc}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000400)={r2, @in={{0x2, 0x4e22, @multicast1}}}, &(0x7f00000004c0)=0x84) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)={0x6, 0x2, 0x3, 0x70, 0x7, [{0x8, 0x9, 0xfffffffffffffffe, 0x0, 0x0, 0x2}, {0x1ff, 0x9, 0x9, 0x0, 0x0, 0x1080}, {0x100000001, 0x5, 0x7fffffff, 0x0, 0x0, 0x80a}, {0x8, 0x3e, 0x5ea0, 0x0, 0x0, 0x1000}, {0x9bc, 0x5, 0x10001}, {0x5f4e, 0x2, 0x1, 0x0, 0x0, 0x1007}, {0x2233cc04, 0x800, 0x100000000, 0x0, 0x0, 0x1}]}) 03:20:22 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffff/']) 03:20:22 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffgffffd']) 03:20:22 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r2 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x4, 0x1, 0x7, 0x8, 0x0, 0x1f, 0x0, 0xd, 0x6, 0x3ff, 0x10000, 0x100000000, 0x80, 0x9, 0x4, 0x1f, 0x5, 0x7fffffff, 0x3, 0x20, 0x7c, 0x3, 0xbd, 0x100, 0x8, 0x6c3, 0x0, 0x0, 0x100000000, 0x7fff, 0x8, 0x2, 0x400, 0x6, 0x7f, 0xfffffffffffff001, 0x0, 0x10001, 0x3, @perf_config_ext={0x7fff, 0x1000}, 0x2, 0x4, 0x4, 0x8, 0x0, 0x3, 0x9b}, r2, 0xffffffffffffffff, 0xffffffffffffff9c, 0x2) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r6, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r5, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000240)=r6, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r8, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x660c, 0xfffffffffffffffe) [ 2035.669640] gfs2: invalid mount option: statfs_quantum=0xffffffffffgffffd [ 2035.685599] Invalid option length (1048446) for dns_resolver key [ 2035.701968] gfs2: can't parse mount arguments [ 2035.710373] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffff/ 03:20:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2035.726354] gfs2: can't parse mount arguments [ 2035.737578] Invalid option length (1048446) for dns_resolver key 03:20:22 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x6, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0xffff}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="a0000000634c6eed3f9fdd6a798e27720adb0bc2abe88bfe58d8f643b4cfdbbb88dc995f7c450669fea32f98a56dc06a4e11890a15a65d34478f681c9d68d0793278010dedc8cdd0039c0fe0ab7da9fd2106a3c82146ef3ff83d0556b7c07ad7d8b2663738b7615bf981d7a2db3066d0b69b1a95ed95e04945e95daf61658066e0886bce3d6ab0a84922eb799cc4063850be115eac438068c20e"], &(0x7f00000004c0)=0xa8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319b2800") r3 = syz_open_dev$dmmidi(0xffffffffffffffff, 0xfffffffffffff801, 0x60800) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x7, 0x2, 0x80000000}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f00000002c0)={r4, 0x1d, "d6685721968d3b534349594cc6099f9f333d540fceae59ddaeea15a926"}, &(0x7f0000000300)=0x25) r5 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x800, 0x80440) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000100)={0x3f, 0x1, 0x400000, 0x1ff, 0x0}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000180)={r6, 0x3f}, 0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f00000001c0)={r6, 0x1ff}, 0x8) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2035.816544] gfs2: invalid mount option: statfs_quantum=0xffffffffffgffffd [ 2035.823527] gfs2: can't parse mount arguments [ 2035.836476] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffff/ [ 2035.851521] Invalid option length (1048446) for dns_resolver key [ 2035.874887] gfs2: can't parse mount arguments [ 2035.911145] Invalid option length (1048446) for dns_resolver key 03:20:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:22 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffX']) 03:20:22 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffff\nfffd']) 03:20:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0xf, 0x1, 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400020}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e1b92be3", @ANYRES16=r2, @ANYBLOB="040029bd7000ffdbdf250d00000048000200080001000500000008000100ea00000008000200000000000800010001000100080002000300000008000200050000000800020081000000080001000700000004000400"], 0x5c}}, 0x8000) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x90100010}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x18, r2, 0x828, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x1}, 0x40) 03:20:22 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:22 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="af70696473200063700900e70000000000"], 0x11) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000640)={0x0, 0x3, 0x20, 0x2, 0x4}, &(0x7f0000000680)=0x18) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000006c0)=@assoc_id=r2, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r5, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) ioctl$SIOCAX25DELUID(r1, 0x89e2, &(0x7f0000000240)={0x3, @bcast, r6}) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000500)=""/98) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f0000000600)={0x4, 0x7f, 0xc0000000000}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$KDGETKEYCODE(r4, 0x4b4c, &(0x7f0000000440)={0x1, 0x8}) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) ioctl$TIOCGRS485(r4, 0x542e, &(0x7f00000000c0)) openat$cgroup_ro(r4, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r8, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r8, 0x3, 0x1, 0x4, 0x0}, 0x20) ioctl$sock_rose_SIOCDELRT(r8, 0x890c, &(0x7f0000000580)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffff, @null, @bpq0='bpq0\x00', 0x1, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x660c, 0xfffffffffffffffe) [ 2036.080263] Invalid option length (1048446) for dns_resolver key [ 2036.093345] Invalid option length (1048446) for dns_resolver key [ 2036.198635] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffX [ 2036.241918] gfs2: can't parse mount arguments 03:20:22 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x8982, &(0x7f0000000040)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x100, 0x0) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x7a05, 0x1700) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f00000000c0)=0x7) sched_getattr(r4, &(0x7f0000000200), 0x30, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r6, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0xfffffffffffffffe) [ 2036.266175] gfs2: invalid mount option: statfs_quantum=0xfffffffffff [ 2036.266175] fffd [ 2036.275930] Invalid option length (1048446) for dns_resolver key 03:20:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2036.314021] Invalid option length (1048446) for dns_resolver key [ 2036.322829] gfs2: can't parse mount arguments [ 2036.348939] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffX [ 2036.369955] gfs2: can't parse mount arguments [ 2036.396734] gfs2: invalid mount option: statfs_quantum=0xfffffffffff [ 2036.396734] fffd [ 2036.444427] gfs2: can't parse mount arguments 03:20:22 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffo']) 03:20:23 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:23 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffff\"fffd']) [ 2036.768960] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffo [ 2036.795465] device bridge_slave_1 left promiscuous mode [ 2036.801313] bridge0: port 2(bridge_slave_1) entered disabled state 03:20:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2036.829255] gfs2: can't parse mount arguments 03:20:23 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2036.906996] device bridge_slave_0 left promiscuous mode [ 2036.917530] bridge0: port 1(bridge_slave_0) entered disabled state [ 2036.947083] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffo [ 2036.955086] gfs2: invalid mount option: statfs_quantum=0xfffffffffff"fffd [ 2036.975881] gfs2: can't parse mount arguments [ 2036.989828] gfs2: can't parse mount arguments 03:20:23 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffs']) [ 2037.306022] device hsr_slave_1 left promiscuous mode [ 2037.319652] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffs [ 2037.341695] gfs2: can't parse mount arguments [ 2037.365951] device hsr_slave_0 left promiscuous mode [ 2037.404337] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffs [ 2037.417775] gfs2: can't parse mount arguments [ 2037.426964] team0 (unregistering): Port device team_slave_1 removed [ 2037.490271] team0 (unregistering): Port device team_slave_0 removed [ 2037.521066] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2037.580275] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2037.709701] bond0 (unregistering): Released all slaves [ 2038.712034] IPVS: ftp: loaded support on port[0] = 21 [ 2038.873311] chnl_net:caif_netlink_parms(): no params data found [ 2038.943479] bridge0: port 1(bridge_slave_0) entered blocking state [ 2038.975730] bridge0: port 1(bridge_slave_0) entered disabled state [ 2038.983149] device bridge_slave_0 entered promiscuous mode [ 2039.005727] bridge0: port 2(bridge_slave_1) entered blocking state [ 2039.012218] bridge0: port 2(bridge_slave_1) entered disabled state [ 2039.041826] device bridge_slave_1 entered promiscuous mode [ 2039.079940] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2039.090055] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2039.111743] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2039.120595] team0: Port device team_slave_0 added [ 2039.126793] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2039.134326] team0: Port device team_slave_1 added [ 2039.141034] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2039.148938] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2039.237706] device hsr_slave_0 entered promiscuous mode [ 2039.295989] device hsr_slave_1 entered promiscuous mode [ 2039.350947] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2039.363828] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2039.405934] bridge0: port 2(bridge_slave_1) entered blocking state [ 2039.412342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2039.419040] bridge0: port 1(bridge_slave_0) entered blocking state [ 2039.425449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2039.503080] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2039.510391] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2039.520008] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2039.530920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2039.538876] bridge0: port 1(bridge_slave_0) entered disabled state [ 2039.565673] bridge0: port 2(bridge_slave_1) entered disabled state [ 2039.585368] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2039.608922] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2039.631633] 8021q: adding VLAN 0 to HW filter on device team0 [ 2039.659333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2039.668168] bridge0: port 1(bridge_slave_0) entered blocking state [ 2039.674550] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2039.692068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2039.700157] bridge0: port 2(bridge_slave_1) entered blocking state [ 2039.706573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2039.727940] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2039.736510] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2039.744305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2039.757724] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2039.768643] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2039.775532] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2039.783075] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2039.791524] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2039.821828] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2039.844835] 8021q: adding VLAN 0 to HW filter on device batadv0 03:20:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x6040, 0x0) accept4$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x800) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) 03:20:26 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffff%fffd']) 03:20:26 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:26 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000300)=""/251, 0xfb}, {&(0x7f0000000680)=""/142, 0x8e}], 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(r3, &(0x7f0000000640)='cpuacct.usage_percpu\x00', 0x2761, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r6, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$KIOCSOUND(r2, 0x4b2f, 0x3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0xfffffffffffffffe) 03:20:26 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffu']) 03:20:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2040.034922] gfs2: invalid mount option: statfs_quantum=0xfffffffffff%fffd [ 2040.037043] dns_resolver_preparse: 4 callbacks suppressed [ 2040.037051] Invalid option length (1048446) for dns_resolver key [ 2040.041907] gfs2: can't parse mount arguments [ 2040.065468] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffu [ 2040.072544] gfs2: can't parse mount arguments [ 2040.073151] Invalid option length (1048446) for dns_resolver key 03:20:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40200, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x8b6a}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={0x0, 0xffff}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000340)={r3}, &(0x7f0000000140)=0xfffffffffffffdc6) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000180)={r4, 0x3}, &(0x7f00000001c0)=0x8) [ 2040.196203] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffu [ 2040.203200] gfs2: can't parse mount arguments 03:20:26 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffff,fffd']) 03:20:26 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffx']) [ 2040.280420] Invalid option length (1048446) for dns_resolver key 03:20:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2040.332386] Invalid option length (1048446) for dns_resolver key 03:20:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000140)=0x10) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2040.425027] XFS (loop2): Invalid superblock magic number 03:20:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:27 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:27 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffff.fffd']) [ 2040.644756] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffx [ 2040.659840] gfs2: can't parse mount arguments [ 2040.869274] gfs2: invalid mount option: statfs_quantum=0xfffffffffff.fffd [ 2040.896610] gfs2: can't parse mount arguments 03:20:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x40002300001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="623ad882c0d98a0d7ed2fa6843dd3c22", 0x0, 0x0, 0x0, 0x4}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f00000000c0), 0x3bb1) write$cgroup_type(r3, &(0x7f00000001c0)='threaded\x00', 0xd47c4e) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000100)={0x0, r4, 0xffffffffffffffff, 0x4fdf, 0xffffffffffddfff9, 0x1}) tkill(r2, 0x24) 03:20:27 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0xfffffffffffffcfe, 0x0, 0x0, &(0x7f0000000780)=ANY=[]) 03:20:27 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:27 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffff/fffd']) [ 2041.175692] device bridge_slave_1 left promiscuous mode [ 2041.181276] bridge0: port 2(bridge_slave_1) entered disabled state [ 2041.200803] gfs2: invalid mount option: statfs_quantum=0xfffffffffff/fffd [ 2041.215714] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 03:20:27 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:27 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x40400000000a82, 0x100000181, 0x0, 0x0, &(0x7f0000000080)=ANY=[]) [ 2041.246018] device bridge_slave_0 left promiscuous mode [ 2041.252828] bridge0: port 1(bridge_slave_0) entered disabled state [ 2041.274713] gfs2: can't parse mount arguments [ 2041.333674] gfs2: invalid mount option: statfs_quantum=0xfffffffffff/fffd [ 2041.375609] gfs2: can't parse mount arguments 03:20:27 executing program 4: syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x8000, 0x3, &(0x7f0000000280)=[{&(0x7f00000000c0)="dceea84699c4e4bb6857e661bd6401c8afd286e658a0751a28a0c30f3043b3cfdc7357bcf15de07cb713fb8660b86046d65977f8c315ca9f8c33116a591bdfa08f1606491694ef4ede11bc7aeb19ec4d070257fafd57befb34e8d9f481042b7f4e7fb82dee6f9621544df1f320a96872fa392138e0b9f0d4", 0x78, 0x9}, {&(0x7f00000001c0)="8efeee647bd737dca7e9d040bad3ad3627d90f26dc776f613d38d3039a3179724041a7a5962140f2e848c41ff19c459a25cf35bfb0a9513449fa7021d92f3d9b9333cfc0412c53442285f0b663f2116dc12ff279f239e1f4448dbb2cad9aa2da30446f6f55a103161d888638651964fba801e3ffce3c20f559ab7c86e4e9d055278d72049bec2befd498a3a098ec9259d8c54b1c21d86150d5e6590a", 0x9c, 0x369a7d36}, {&(0x7f00000007c0)="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", 0x1000, 0x238}], 0x0, &(0x7f0000000140)='gfs2\x00') syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYPTR64]) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getpeername(r0, &(0x7f0000000340)=@isdn, &(0x7f00000003c0)=0x80) [ 2041.589291] gfs2: not a GFS2 filesystem [ 2041.598952] device hsr_slave_1 left promiscuous mode [ 2041.650288] device hsr_slave_0 left promiscuous mode [ 2041.700987] team0 (unregistering): Port device team_slave_1 removed [ 2041.776025] team0 (unregistering): Port device team_slave_0 removed [ 2041.785453] XFS (loop2): Invalid superblock magic number [ 2041.850744] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2041.944516] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2042.025304] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 2042.147562] bond0 (unregistering): Released all slaves [ 2043.325662] IPVS: ftp: loaded support on port[0] = 21 [ 2043.586923] chnl_net:caif_netlink_parms(): no params data found [ 2043.690047] bridge0: port 1(bridge_slave_0) entered blocking state [ 2043.711200] bridge0: port 1(bridge_slave_0) entered disabled state [ 2043.726927] device bridge_slave_0 entered promiscuous mode [ 2043.742548] bridge0: port 2(bridge_slave_1) entered blocking state [ 2043.749549] bridge0: port 2(bridge_slave_1) entered disabled state [ 2043.757374] device bridge_slave_1 entered promiscuous mode [ 2043.780789] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2043.794139] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2043.845798] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2043.853375] team0: Port device team_slave_0 added [ 2043.866267] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2043.873872] team0: Port device team_slave_1 added [ 2043.895279] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2043.902785] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2043.977655] device hsr_slave_0 entered promiscuous mode [ 2044.015014] device hsr_slave_1 entered promiscuous mode [ 2044.065389] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2044.072471] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2044.092531] IPVS: ftp: loaded support on port[0] = 21 [ 2044.098441] bridge0: port 2(bridge_slave_1) entered blocking state [ 2044.104865] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2044.111589] bridge0: port 1(bridge_slave_0) entered blocking state [ 2044.118094] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2044.371614] chnl_net:caif_netlink_parms(): no params data found [ 2044.406009] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2044.412135] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2044.456167] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2044.490809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2044.499037] bridge0: port 1(bridge_slave_0) entered disabled state [ 2044.515684] bridge0: port 2(bridge_slave_1) entered disabled state [ 2044.526857] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2044.548859] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2044.558991] 8021q: adding VLAN 0 to HW filter on device team0 [ 2044.565687] bridge0: port 1(bridge_slave_0) entered blocking state [ 2044.572139] bridge0: port 1(bridge_slave_0) entered disabled state [ 2044.580937] device bridge_slave_0 entered promiscuous mode [ 2044.593481] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2044.602423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2044.611273] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2044.619873] bridge0: port 1(bridge_slave_0) entered blocking state [ 2044.626298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2044.633740] bridge0: port 2(bridge_slave_1) entered blocking state [ 2044.641075] bridge0: port 2(bridge_slave_1) entered disabled state [ 2044.648925] device bridge_slave_1 entered promiscuous mode [ 2044.659133] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2044.667384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2044.677195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2044.685316] bridge0: port 2(bridge_slave_1) entered blocking state [ 2044.691676] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2044.710854] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2044.738770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2044.750192] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2044.760206] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2044.769606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2044.781201] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2044.791579] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2044.806661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2044.824297] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2044.835983] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2044.854414] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2044.881727] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2044.899009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2044.912422] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2044.923764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2044.940520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2044.974180] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2044.982488] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2044.999997] team0: Port device team_slave_0 added [ 2045.010371] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2045.025215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2045.035485] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2045.041661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2045.049435] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2045.070156] team0: Port device team_slave_1 added [ 2045.080835] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2045.100890] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2045.112163] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2045.177605] device hsr_slave_0 entered promiscuous mode [ 2045.225141] device hsr_slave_1 entered promiscuous mode [ 2045.275448] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2045.282946] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2045.309043] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2045.326734] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2045.380157] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2045.386552] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2045.397941] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2045.417814] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2045.424042] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2045.435207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2045.442307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2045.467782] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2045.473916] 8021q: adding VLAN 0 to HW filter on device team0 [ 2045.499297] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2045.508230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2045.517355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2045.526320] bridge0: port 1(bridge_slave_0) entered blocking state [ 2045.532919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2045.541732] device bridge_slave_1 left promiscuous mode [ 2045.553871] bridge0: port 2(bridge_slave_1) entered disabled state [ 2045.606360] device bridge_slave_0 left promiscuous mode [ 2045.613112] bridge0: port 1(bridge_slave_0) entered disabled state [ 2045.768284] device hsr_slave_1 left promiscuous mode [ 2045.819621] device hsr_slave_0 left promiscuous mode [ 2045.874228] team0 (unregistering): Port device team_slave_1 removed [ 2045.901802] team0 (unregistering): Port device team_slave_0 removed [ 2045.919903] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2045.980394] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2046.130925] bond0 (unregistering): Released all slaves [ 2046.201516] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2046.209849] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2046.218686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2046.226920] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2046.236057] bridge0: port 2(bridge_slave_1) entered blocking state [ 2046.242426] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2046.257644] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2046.283575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2046.307812] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2046.320348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2046.349482] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2046.365232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2046.373387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2046.392456] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2046.445655] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2046.452917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2046.468405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2046.482185] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2046.515270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2046.523466] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2046.540659] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2046.552659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2046.568725] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2046.591071] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2046.601014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2046.634323] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2046.661728] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2046.873124] Invalid option length (1048446) for dns_resolver key [ 2046.919848] Invalid option length (1048446) for dns_resolver key 03:20:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:33 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffefffd']) 03:20:33 executing program 4: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x17b, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000100)=r1) fsetxattr(r0, &(0x7f0000000140)=@random={'user.', 'gfs2\x00'}, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x19, 0x3) 03:20:33 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:33 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) getpid() chdir(&(0x7f0000000600)='./file0\x00') lstat(0x0, 0x0) chown(0x0, 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x4000, 0x18f) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, 0x0) fstat(r0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$eventfd(r1, &(0x7f0000000000), 0x376416aa) 03:20:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 2047.054178] gfs2: statfs_quantum mount option requires a non-negative numeric argument 03:20:33 executing program 4: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) get_robust_list(r0, &(0x7f0000000100)=&(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, &(0x7f0000000140)=0x18) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x10001, 0x30}, &(0x7f0000000240)) syz_open_dev$binder(&(0x7f0000000340)='/dev/binder#\x00', 0x0, 0x802) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000280)={r2, 0x427, 0x3, [0x100000000, 0x81, 0x0]}, 0xe) [ 2047.098894] gfs2: can't parse mount arguments 03:20:33 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000240)={0x101, 0x5, r1, 0x0, r2, 0x0, 0x132, 0x7fff}) syz_execute_func(&(0x7f0000000000)="952cccf26ec402791c59ff911441298f17955bf9c462f907d7fd130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc320ac1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2047.153894] Invalid option length (1048446) for dns_resolver key [ 2047.175389] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2047.183533] gfs2: can't parse mount arguments [ 2047.240701] Invalid option length (1048446) for dns_resolver key 03:20:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:33 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x10000, 0x50) r1 = accept$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000001c0)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) r3 = geteuid() fstat(0xffffffffffffff9c, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000480)=0x8, 0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x20, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_none='cache=none'}], [{@appraise_type='appraise_type=imasig'}, {@fsuuid={'fsuuid', 0x3d, {[0x67, 0x3d, 0x25cfe7bcc11155aa, 0x0, 0x75, 0x77, 0x35, 0x63], 0x2d, [0x39, 0x0, 0x35, 0x75], 0x2d, [0x66, 0x35, 0x32, 0x32], 0x2d, [0x65, 0x36, 0x64, 0x67], 0x2d, [0x0, 0x38, 0x65, 0x0, 0x73, 0x0, 0x0, 0x36]}}}, {@uid_gt={'uid>', r2}}, {@euid_eq={'euid', 0x3d, r3}}, {@fowner_lt={'fowner<', r4}}, {@subj_role={'subj_role', 0x3d, '$\x00'}}]}}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) 03:20:33 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffgfffd']) 03:20:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x9b2, &(0x7f0000000000)="0adc1f123c123f319bd070") fchdir(r0) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f00000000c0)=""/15, &(0x7f0000000100)=0xf) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:33 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() getresgid(&(0x7f0000000140), &(0x7f0000000240)=0x0, &(0x7f0000000280)) getresgid(&(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000340)) getgroups(0xa, &(0x7f0000000380)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xee00, 0xee01, 0xffffffffffffffff, 0xee00, 0xee00]) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x4}, [{0x2, 0x1, r1}], {0x4, 0x1}, [{0x8, 0x4, r2}, {0x8, 0x6, r3}, {0x8, 0x5, r4}, {0x8, 0x2, r5}, {0x8, 0x4, r6}], {0x10, 0x4}, {0x20, 0x2}}, 0x54, 0x3) [ 2047.518739] gfs2: invalid mount option: statfs_quantum=0xfffffffffffgfffd [ 2047.519993] Invalid option length (1048446) for dns_resolver key [ 2047.566139] gfs2: can't parse mount arguments 03:20:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:34 executing program 1: lookup_dcookie(0x10001, &(0x7f00000000c0)=""/252, 0xfc) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x81, 0x200000) ioctl$TCGETA(r0, 0x5405, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x1, 0x0) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000200)={0xa15, 0x40, 0x759, 0x2}, 0x10) connect$pppoe(r1, &(0x7f0000000240)={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'veth0_to_bond\x00'}}, 0x1e) [ 2047.645589] gfs2: invalid mount option: statfs_quantum=0xfffffffffffgfffd [ 2047.656687] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2047.670080] gfs2: can't parse mount arguments [ 2047.715659] XFS (loop2): Invalid superblock magic number [ 2047.752728] gfs2: can't parse mount arguments [ 2047.814436] Invalid option length (1048446) for dns_resolver key 03:20:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x80000000005, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000001000)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, 0x98) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000000c0)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@rand_addr=0x1000000, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, 0xe8) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000001000)=""/144, &(0x7f0000001ffc)=0x90) 03:20:34 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffff\nffd']) 03:20:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000100)='./file0\x00', 0x20200, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0x7}) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:34 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolverk', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:34 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x8004, 0x1) [ 2047.869497] Invalid option length (1048446) for dns_resolver key [ 2047.972383] gfs2: invalid mount option: statfs_quantum=0xffffffffffff [ 2047.972383] ffd [ 2047.996580] gfs2: can't parse mount arguments 03:20:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x7fffffff, 0x8000) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x7, 0x0, 0x1000, 0x8, 0x0}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000180)={r2, 0x7}, 0x8) [ 2048.038752] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2048.082717] gfs2: can't parse mount arguments 03:20:34 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 03:20:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\xff', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:34 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffff\"ffd']) 03:20:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x28980, 0x0) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2048.265934] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2048.274054] gfs2: can't parse mount arguments 03:20:34 executing program 3: syz_genetlink_get_family_id$tipc2(0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="a4"], 0x1) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) [ 2048.325808] gfs2: invalid mount option: statfs_quantum=0xffffffffffff"ffd [ 2048.375896] gfs2: can't parse mount arguments 03:20:34 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:34 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000780)=ANY=[@ANYRESOCT]) r0 = socket$unix(0x1, 0x7, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x40, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x3) 03:20:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = socket$can_raw(0x1d, 0x3, 0x1) fsetxattr$security_selinux(r1, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:modules_dep_t:s0\x00', 0x23, 0x3) 03:20:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2048.492728] gfs2: invalid mount option: statfs_quantum=0xffffffffffff"ffd [ 2048.515750] gfs2: can't parse mount arguments 03:20:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffff%ffd']) [ 2048.683994] Invalid option length (1048446) for dns_resolver key 03:20:35 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x600000, 0x0) [ 2048.819768] gfs2: invalid mount option: statfs_quantum=0xffffffffffff%ffd [ 2048.837950] Invalid option length (1048446) for dns_resolver key 03:20:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2048.865862] gfs2: can't parse mount arguments 03:20:35 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2048.913897] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2048.938552] gfs2: can't parse mount arguments [ 2048.972575] gfs2: invalid mount option: statfs_quantum=0xffffffffffff%ffd [ 2049.007963] gfs2: can't parse mount arguments [ 2049.033148] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2049.063425] Invalid option length (1048446) for dns_resolver key [ 2049.076540] gfs2: can't parse mount arguments 03:20:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffff,ffd']) 03:20:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f00000000c0)=@ethtool_ts_info}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000780)=ANY=[]) 03:20:35 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) connect$l2tp(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {}, 0x4, 0x1}}, 0x2e) ioctl$PPPIOCGL2TPSTATS(r0, 0x40047452, &(0x7f0000000180)) 03:20:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2049.357595] gfs2: not a GFS2 filesystem [ 2049.375029] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2049.430380] gfs2: can't parse mount arguments [ 2049.443909] gfs2: not a GFS2 filesystem 03:20:35 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2049.550485] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2049.579283] gfs2: can't parse mount arguments [ 2049.833385] XFS (loop2): Invalid superblock magic number 03:20:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5, 0x80000) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000080)=0x80000000) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000001c0), 0x4) syz_execute_func(&(0x7f00000000c0)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d5f20f9b3281f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000180)={0x7f, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x2, 'wlc\x00', 0x2, 0xfff, 0x53}, 0x2c) 03:20:36 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'system.', '{ppp0#\\\x00'}, &(0x7f00000000c0)=""/109, 0x6d) 03:20:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:36 executing program 3: unshare(0x600) r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sysfs$2(0x2, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x3f, 0x10000) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r2, 0x3) ioctl$VIDIOC_G_PARM(0xffffffffffffffff, 0xc0cc5615, &(0x7f0000000440)={0xf, @output={0x1000, 0x1, {0xffff, 0x2}, 0x0, 0x1}}) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000340)={0x0, @raw_data="65959c3418b0a848593434344f9e395ffe7eadc4e5efe4eb08b2818231f0b171d01a6ccab9aa61f9334780ee00617fd51776eba2ff6638152706d334b8c317bd72cb367b00b738a668c1f265769a8b83bdfba7f2a6a533f765362117325765424a42ff769cc614819d4ffe8bb06797edd61780727c8acae9d1114979bc5a6df889dd78b39d1456720c394c7d690a6659812de9ef718772c8b725bccea7fa69346c281c827ab34639f139b818aeb4219bb23f6072e27fa590731d28c92807ba70d895fb32d01fb64a"}) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x8, 0x101400) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000300)={'bond_slave_0\x00', {0x2, 0x0, @local}}) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xffffffff, 0xb40, 0x7, 0x2, 0x0, 0x7fff, 0x2011, 0x4, 0x7, 0xb00, 0xff, 0x6, 0xffffffff7fffffff, 0x9, 0x1f, 0x0, 0x1, 0x4, 0xd87d, 0x7, 0x7bff, 0x6, 0x401, 0x7, 0xc9, 0x800, 0xfffffffffffffff9, 0x9, 0x22, 0x3, 0x5, 0xfffffffffffffc00, 0x8, 0x80000000, 0x3, 0x100, 0x0, 0x5, 0x3, @perf_bp={0x0, 0x4}, 0x804, 0x800, 0x400, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') ioprio_get$pid(0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TIPC_NL_BEARER_ADD(r3, &(0x7f0000006a40)={0x0, 0x0, &(0x7f0000006a00)={&(0x7f00000067c0)=ANY=[@ANYBLOB="00000000000000000000150000"], 0x1}}, 0x48080) 03:20:36 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffff.ffd']) 03:20:36 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2050.215448] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2050.238630] gfs2: invalid mount option: statfs_quantum=0xffffffffffff.ffd 03:20:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x101000, 0x0) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000140)={0xfffffffffffffc01}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2050.264749] gfs2: can't parse mount arguments [ 2050.275223] gfs2: can't parse mount arguments [ 2050.336402] gfs2: invalid mount option: statfs_quantum=0xffffffffffff.ffd [ 2050.350476] gfs2: can't parse mount arguments 03:20:36 executing program 3: 03:20:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000600)="e82ccc0f05c40279ba59f7ffff1441298f17955bf9c462f907d7ff130fc4014c2e45ded96566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc1822c1d72121c681925585c3c36645430fef2e0fb9e2010145ad8600c403017f1bfebfce0f73d581f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1561c2d82866aa3656511bd110f0000") 03:20:36 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffff/ffd']) 03:20:36 executing program 4: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[]) 03:20:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:36 executing program 3: [ 2050.575860] XFS (loop2): Invalid superblock magic number [ 2050.587903] gfs2: invalid mount option: statfs_quantum=0xffffffffffff/ffd [ 2050.589770] gfs2: not a GFS2 filesystem 03:20:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:37 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000480)) 03:20:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x10000, 0xc18, 0x7fffffff, 0x9, 0x8, 0x4044154c, 0x7, 0x40}, &(0x7f0000000100)={0xa16f, 0xa2, 0xf86a, 0x80000001, 0x6, 0xfb57, 0x3f, 0x1}, &(0x7f0000000140)={0x9ce, 0x1ff, 0x4, 0xfffffffffffffc00, 0xfff, 0x100000001, 0xfffffffffffffffe, 0x4}, &(0x7f00000001c0)={r1, r2+30000000}, &(0x7f0000000240)={&(0x7f0000000200)={0x401}, 0x8}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2050.621995] gfs2: can't parse mount arguments 03:20:37 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bind$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0xffffffff, @host}, 0x10) prctl$PR_GET_SECCOMP(0x15) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x401, 0x1e3, 0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYRES16]) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x270dfbc5, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f00000000c0)={{0x0, 0x9fc}, {0x3, 0xb9}, 0xbd2, 0x2, 0x22}) 03:20:37 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890e, &(0x7f0000000240)="0adc1f123c123f319bd070") getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000140)=0x68) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x410002, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000180)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc6436400f3806f0c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2050.761920] gfs2: invalid mount option: statfs_quantum=0xffffffffffff/ffd [ 2050.790989] gfs2: can't parse mount arguments 03:20:37 executing program 3: syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x4800000c0045009, 0x0) pipe(&(0x7f0000000640)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 03:20:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:37 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffeffd']) 03:20:37 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x301100, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x40, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x5, 0x1, 0xf, 0x0, "b0ca63971b49c85d29844338c056c46f24879b671eb02a7da23a8aba456bcbd94aa32912b26adffbd39f96ffffabdca13dbc3c631a183e1e9e7b9fda55d6e6c4", "0d0708d38a8c269b6d9e6da2da8d3f92109d47cfb07dcd429ce0d6cab1b34ddc", [0xfff, 0xffffffff]}) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 03:20:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000580)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72181925585c3c36645430fef7aae0e1fb301b301e23e029e2450245030f9547d320000ce0f73d539c481f8521f5726c4018df6a8d700000066660f383330622828c14600090cc1042d82b925a33e11bd110f0000") 03:20:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f5c7054123c123f31") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2050.998833] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2051.012405] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2051.025136] gfs2: can't parse mount arguments [ 2051.028216] gfs2: can't parse mount arguments 03:20:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) [ 2051.119170] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2051.130184] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2051.140643] gfs2: can't parse mount arguments [ 2051.181582] gfs2: can't parse mount arguments 03:20:37 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffgffd']) 03:20:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2051.275304] XFS (loop2): Invalid superblock magic number 03:20:37 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x24000, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000840)={@in6={{0xa, 0x4e24, 0x3, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7}}, 0x0, 0xba, 0x0, "9c6a09d1967442c0d0f6b76f2587bd00434ef5d2a949305a1a5f6c82f21be59acd571ef87941f6c630b5985cd64ef3d8c7ab16218750c6a949d137cd36691525d4cbbd1262e217fb56d756ba55873f98"}, 0xd8) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x9, &(0x7f0000000600)=[{&(0x7f00000001c0)="8394a477a3e48bbf28595382843cc96ef10f62bbc131f6bd9826e19fad17663c919fdeec7eba2c592b67243a1651473d838566435249753090edb2a7059e0581ca6bfa18a00fd629c1644c92b0faed57a4c9d8eec9c6fedd728a3d24dd59949b51da13b320158f8cb40fb0e52cb47cc2435c75762d2de22b41ce78082beb0b388bc1d434976ba22e43dc3b3aec62b3d069005526b9d1e02ddae3e5a9bf59f39a36e708f3402377db04a886d474671eb492898415b1a9dbe94c03bb5e0c005c7cbc8477c4d374bd7b265138f7", 0xcc, 0x4}, {&(0x7f00000000c0)="ff993e9ae8bc84a26358def1793e22a9d79f4c228c555ff0e532f07f42352088b5125eb36fa811204a5ff9", 0x2b, 0x904}, {&(0x7f0000000100), 0x0, 0x2}, {&(0x7f00000002c0)="b144e6731d8eb3d3e35316a3f31599ded71f52ded33c15331813587296a4c09e8a55dc71df6dcb5aae7ed7b3b333c99a7cba43e2f7aa3cb9dcde2360c5c9eb24254b6dae65c2f280dd50424a2f3ac6717a6cc3c784202cd3866130a4aa6cc225bf668ba82ceccdc7bf3dff2c78b44c853a092ca2325bd53fd8ea6678b5c12fd7793d5919e0e8184049e4b0fb3ccb949a9900", 0x92, 0x80a}, {&(0x7f0000000380)="5fd45d63e45e9123793635b494a797190bbef56125786f1c82e806a0e9735e4fda19ef190c67e5c6e34568ab8191d61c9c8ff99b4305165a6f385a945e57e00b3e", 0x41, 0x9}, {&(0x7f0000000400)="3492e4b8ee65a0021af8e45b5e3e09bf1eb5110a9011e5ce5cae7a12af7306a7325aed213ec492355cf0d086663bd10d0e8b2d2176bde0563603b2e0ae889d2021701decfdc9c6a54e795331838425c16b5623f364387e852a4fe4b8", 0x5c, 0x10001}, {&(0x7f0000000140)="492a8a4b6008b7a7b9f0e5524a4db1a836a3c4ce6b0335638ace7f88b616e96cad43d051c2d3feb65e447726e71926f226613943cafc8a09c06f70f57cd0", 0x3e, 0x5baf8424}, {&(0x7f0000000480)="3772b9efbe4201ad3042ab37b9ec3e63d86c0f9891cef77d9ba61eb969f9b4be7244438ec6c268a3587c45bf3bb8a581eee649b0cb31e1b7eb667bc52528a4ce3c195d4fe896ef5dcc1108fe42c904435a3d134018876e423c8acb98be11c50400d49d5809bfbc96ec7477811699ede8c31e71c790fa5694cc43da5d0af7ce33ebca7ba617684890fd8a13ae6b78733d67d0a64c2515defa6044ae14f52c1ed13175bf6d92a9415cbaacd73ff89667a40cdad3c909939c7658c9e524c1392014a5481881cc02bea0a60d54c9f3b9fc8e2d0e74051d3105bfda97d9674adb55b669a2bb9e", 0xe4, 0x2}, {&(0x7f0000000580)="11605d5492d024e5f241c7a5cada156d0c6579444da3661a3135ace4f32663d76978ebfd0f929c35ab709c9344f8607d72a93458022a5c8c3b6c182f28224613e0de285f40679e31105685ff68d0d031924576c1d12420411eefa41c4830a127ab9d9e65fee71c01768f327a9f5909dc9c99dcc982", 0x75, 0x1}], 0x1000000, &(0x7f0000000980)=ANY=[@ANYBLOB='file_umask=00000000000000000000037,part=0x000000000000c4e0,umask=01777777777777777714523,gid=', @ANYRESHEX=r1, @ANYBLOB="2c6f626a5f747365723d67667332002c00e1836cbf069f0f25a41124ff2e6508a325800fe15fd4a4bc9a57d570632a8fe5d399a48144b477603671ac26bcd7a205a30ac751d502fe254f5af5ce9b3b99a12794efe615109a8c48f963f2d68a13d98ae6f9c4696e52c843e4e179543b7a09e6a5ff244f046551c44d8c0dcdd9db1e8074f60e7e72c4df211fa5edf4e4e6835d19d23608c6cc80a70dbe2781"]) r2 = msgget(0x3, 0x8) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000100)) 03:20:37 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2051.396598] gfs2: invalid mount option: statfs_quantum=0xffffffffffffgffd [ 2051.422559] gfs2: can't parse mount arguments [ 2051.486136] gfs2: invalid mount option: statfs_quantum=0xffffffffffffgffd [ 2051.494181] gfs2: can't parse mount arguments [ 2051.494867] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2051.533604] gfs2: can't parse mount arguments 03:20:38 executing program 3: r0 = syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x2, &(0x7f0000000000)) 03:20:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="952ccc0f05c402791c59ffd11441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1026921fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffff\nfd']) 03:20:38 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x8000, 0x4) 03:20:38 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x40000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r2, 0x30b, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x12, 0x0, @udp='udp:syz0\x00'}}}, [""]}, 0x34}}, 0x4048800) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000240)) [ 2051.939539] dns_resolver_preparse: 17 callbacks suppressed [ 2051.939548] Invalid option length (1048446) for dns_resolver key [ 2051.941345] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff [ 2051.941345] fd 03:20:38 executing program 4: r0 = accept$netrom(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @null}, [@null, @remote, @rose, @null, @bcast, @rose, @bcast, @rose]}, &(0x7f0000000240)=0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000003c0)=0xe8) recvfrom(r0, &(0x7f0000000280)=""/56, 0x38, 0x2, &(0x7f0000000400)=@xdp={0x2c, 0x6, r1, 0x29}, 0x80) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fchmodat(r2, &(0x7f0000000080)='./file0\x00', 0x14) setxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'trusted.', '/selinux/avc/cache_threshold\x00'}, &(0x7f0000000180)='gfs2\x00', 0x5, 0x3) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x1c1, 0x0, 0xffffffffffffffff, &(0x7f0000000780)=ANY=[]) 03:20:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'team0\x00', &(0x7f0000002fc0)=@ethtool_link_settings={0x4b}}) [ 2052.110646] gfs2: can't parse mount arguments [ 2052.179748] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff [ 2052.179748] fd [ 2052.202225] Invalid option length (1048446) for dns_resolver key [ 2052.227720] gfs2: can't parse mount arguments 03:20:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x100, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1b) 03:20:38 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000080)={0x5, 0x9, 0x10001, 'queue0\x00', 0x6}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="7374617466735f7175616e74756d3d307866666666a815b1169fb51b0266666664"]) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 03:20:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffff\"fd']) 03:20:38 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:38 executing program 3: 03:20:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x9, 0x8240) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000200)={r1, r1, 0x3f, 0x95, &(0x7f0000000140)="1d334cafbb7362ce7cbb6a019d6619d1962871d2b6be5ecdd220f0de943573a8ca0be4e892c93f64c34ac92f9a50f89e2572a4a02fe496353948cff8f2a37076a3f2cade768fbcc466ddd9c8432ab92879fde916797ca4cfbe6b51c937a4b39347be447d902837c7afe467b062abc4b7a298bf4f9b1448240203a8240061da08cfc7584aa3ccc56f61e6d2f2c11dd9398bc5356721", 0x200, 0x1f, 0x4, 0x1, 0x0, 0x3, 0x2938, 'syz0\x00'}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f00000002c0)={0x7f, 0xb7b0, 0x9}) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000001700)={@loopback, @rand_addr, 0x0}, &(0x7f0000001740)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001780)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f0000001880)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000001b80)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001b40)={&(0x7f00000018c0)=@expire={0x248, 0x18, 0x302, 0x70bd2d, 0x25dfdbff, {{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@local, 0x4e22, 0x8000, 0x4e22, 0x0, 0x2, 0x20, 0x80, 0x84, r2, r3}, {@in6=@rand_addr="056515f1a93f06984ef73c6017e15726", 0x4d5, 0xff}, @in=@multicast1, {0xfff, 0x100000001, 0x4, 0x3, 0x2, 0x704d, 0x2, 0x3}, {0x1, 0xdd, 0x5, 0x4}, {0x1, 0xff, 0x2}, 0x70bd29, 0x3507, 0xa, 0x3, 0x8, 0xb25c5866c5215015}, 0x1}, [@algo_crypt={0x50, 0x2, {{'cfb(anubis-generic)\x00'}, 0x38, "56e18ff0fcadff"}}, @migrate={0xb4, 0x11, [{@in=@multicast1, @in6=@local, 0xff, 0x3, 0x0, 0x0, 0x2, 0xa}, {@in=@remote, @in=@rand_addr=0x10001, 0x3b, 0x0, 0x0, 0x3504, 0x2, 0xa}, {@in=@remote, @in=@remote, 0x3b, 0x2, 0x0, 0x3506, 0x2, 0xa}, {@in=@broadcast, @in6=@ipv4={[], [], @broadcast}, 0x3e, 0x7, 0x0, 0x3505, 0x2, 0xa}]}, @lastused={0xc, 0xf, 0x5}, @coaddr={0x14, 0xe, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @lifetime_val={0x24, 0x9, {0x400, 0x3ec, 0x7, 0x63f}}, @tfcpad={0x8, 0x16, 0x7fff}]}, 0x248}, 0x1, 0x0, 0x0, 0x20000000}, 0x810) [ 2052.401681] Invalid option length (1048446) for dns_resolver key [ 2052.405462] gfs2: invalid mount option: statfs_quantum=0xffff¨±Ÿµfffd 03:20:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2052.455617] gfs2: can't parse mount arguments 03:20:38 executing program 3: 03:20:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2052.526661] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff"fd [ 2052.557876] gfs2: invalid mount option: statfs_quantum=0xffff¨±Ÿµfffd [ 2052.582354] gfs2: can't parse mount arguments [ 2052.599284] Invalid option length (1048446) for dns_resolver key [ 2052.618943] gfs2: can't parse mount arguments 03:20:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x5d8, 0x388, 0x0, 0x138, 0x0, 0x388, 0x508, 0x508, 0x508, 0x508, 0x508, 0x5, &(0x7f00000000c0), {[{{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x0, 0x6}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4=@broadcast, @gre_key, @icmp_id=0x65}}}, {{@ipv6={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x28}}, @loopback, [0xffffffff, 0x0, 0xffffffff, 0xffffff00], [0xffffff00, 0x0, 0xffffffff, 0xff000000], 'dummy0\x00', 'sit0\x00', {}, {}, 0x0, 0x0, 0x4, 0x37}, 0x0, 0x110, 0x138, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0xa24c, 0x5, 0x1, [0xffffffff, 0x3, 0x1f, 0x1, 0x10001, 0x9b, 0x5, 0x9, 0x67, 0x7ff, 0x1f, 0x4, 0x9, 0xfffffffffffffffc, 0x7, 0xe0], 0x9}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}, {{@ipv6={@loopback, @local, [0xff0000ff, 0xffffffff, 0xffffff00], [0xffffff00, 0xff000000, 0xffffffff, 0xff0000ff], 'gretap0\x00', 'ip6gretap0\x00', {0xff}, {0xff}, 0x2e, 0x7fffffff, 0x1, 0x2}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0xc, 0x3, 0x8a, 0x1}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x24c, 0xffffffffffff7e53}, {0x8, 0x8, 0x9e6}}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @local, [0xff000000, 0xffffffff, 0xffffff00], [0xff, 0xffffffff, 0xff0000ff], 'ip6_vti0\x00', 'veth1_to_hsr\x00', {}, {0xff}, 0x3a, 0x8, 0x1, 0x2}, 0x0, 0x138, 0x180, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}, @common=@dst={0x48, 'dst\x00', 0x0, {0x5, 0x4, 0x1, [0x7, 0x1, 0x0, 0x9, 0x100000000, 0xfffffffffffffffe, 0xa, 0x10001, 0x33, 0x9, 0x10001, 0x1, 0x0, 0x100000000, 0x3], 0x10}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x1, @ipv4=@broadcast, @ipv6=@local, @icmp_id=0x65, @gre_key=0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x638) 03:20:39 executing program 3: 03:20:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2052.644377] Invalid option length (1048446) for dns_resolver key [ 2052.676591] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff"fd [ 2052.683601] gfs2: can't parse mount arguments 03:20:39 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x800000000000100) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x0, 0x98, "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", 0xce, 0x2e8, 0x3f, 0x4e0e, 0xd30, 0x8, 0x0, 0x1}, r1}}, 0x120) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400000, 0x0) mknodat(r2, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) r3 = request_key(&(0x7f0000000300)='.dead\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)='gfs2\x00', 0x0) keyctl$describe(0x6, r3, &(0x7f00000003c0)=""/101, 0x65) 03:20:39 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffff%fd']) 03:20:39 executing program 1: r0 = getpgrp(0xffffffffffffffff) r1 = gettid() r2 = socket$netlink(0x10, 0x3, 0xb) r3 = socket$caif_stream(0x25, 0x1, 0x0) kcmp(r0, r1, 0x4, r2, r3) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000140)={'hsr0\x00', 0x8000004}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2052.790964] Invalid option length (1048446) for dns_resolver key [ 2052.866736] XFS (loop2): Invalid superblock magic number [ 2052.891457] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2052.922784] gfs2: can't parse mount arguments 03:20:39 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:39 executing program 3: 03:20:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x10800, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000100)=""/101, &(0x7f0000000180)=0x65) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet_smc(0x2b, 0x1, 0x0) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000001c0)=0x2, 0x4) [ 2052.997115] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff%fd [ 2053.031779] gfs2: can't parse mount arguments 03:20:39 executing program 3: 03:20:39 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x40) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) prctl$PR_GET_KEEPCAPS(0x7) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r1, 0x9, 0x30}, &(0x7f0000000140)=0xc) 03:20:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="700000e9b975f8c24e2c8b") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2053.098199] Invalid option length (1048446) for dns_resolver key [ 2053.151844] Invalid option length (1048446) for dns_resolver key [ 2053.223122] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff%fd [ 2053.241688] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2053.254989] gfs2: can't parse mount arguments 03:20:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2053.295110] gfs2: can't parse mount arguments 03:20:39 executing program 3: 03:20:39 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffff,fd']) 03:20:39 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7374617466735f7175616e74756d3d3078666666666666666666666666666666647a8dc534be4b0855c5322389f29afe484e278a6b1889faac8c25f736fc5211b46b5978c7f4f2a21a628333663507"]) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001300)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000001340)={0xef, 0x1}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x200000) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000080)=@fragment={0xbf, 0x0, 0x3, 0x5ec, 0x0, 0x1, 0x65}, 0x8) syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x8000, 0x1, &(0x7f0000001200)=[{&(0x7f0000000200)="b29adb1e33cc0097e4ddbde2ae9aad990644d250c968c9ab2c56ca096c44478cc98fc12be6b171e384efe776532e129922d6cc6ebc3b0fcb849a45f24dfcc9ac3442845ed9b7f7bd82565c9ab93044fdfb0c5463b1b14af0bd04af7761836e85fb44696232ec3e393b92201649ec2c78087451ab207312d70baf8b757f215eec8608ddb24c5d64d61955f3818102edf1f6c63f015257e60ab3fb5e828518d293d8c379f11141d6b00dc2992b4735edf2fd67b59146458f5ec03c1d39956be1d768284ab9cbe44c712d28b5f00fec2a3003add79fc6a50fbfae24d63faa257b3b4b51519a4acb98c225f13bc62a8828d97821ddb87eaa020968e4dccc4b91464afff4a4d4bbf5066851f2319101b39394a9a7afb767fd96baa0b0ea2309b6bae14f087e96094c04c9ebb95a45e83b96166e963a8136eb9f752e35b967953a1b76d6f1d122f66f95fb1831051743d193165720cd0ff52d780fe575ca0d7db15821d75065840e364bf2173e5cf6774c19e25b0f470dfbf92f29c0a581b9ca4bd7f7276d39a1bb390f1c325ee290b419c7b427d74c8a97703b7144f5a6b54f6f3d0aaca79ad970604903b3d7beab27beee6882a8b2bfc8de6a676d99302672730bf3daf415aed8d69c28b732da325ff473a27021557d730cce1f8610d3d7bd0959e714e7ee118bc419953f11da5cae7786180de55c7abd52d463dd2a0d430ed06879f30eaa8bb73889bf3f93891846d9577a084bfcf999ed188f5bebf17ae0293efead33a25b448df4ccb6f2c1a084622f81d542ab98f98c7f6afff339e904010050cb94407c8e9c89db5789fea6d13bbbbe93b327ce934d7658f1ad3c67df8e6f45b1323e01dcf5c45ceca25878a72b4b5e66a9a02eedd7e17748e247c83abed9e3721c3b2dbf6cddb318a81cd4e8dce5facdf3dcf5dccb0593b677502f8d7dc6fcf7ac3625418f2ebec8a18f5fe5936d3916000b4c8bba510608624e1f2f9644eaadec0be4ab0718a5fa8eaf7a139feb13682ba03521eaada8d843a85a53bde0faab4dd3a1dad8e2e8747a9254d9aafb50ae54e8416871cecc919e936075800b5fdb87d76ebc9403e22577565478fcc366e0a99ff0d147964afc5ccc1f8328b0c0a25304c8dde65f46b810dc00660a5941ac84d26801534da3f18d326cc6ff9e7ad226dcf664914ea55c3ab963722cda7872a84dbf2691a5f1c0335549381785bab33887e3c399b6c74a233e3d1a722319ed61eaa6fe72b0640dd7c6622f620c9a67e43fa97bf1a0cd30a3273003d1d54779ac9d71195ee10be8d110b10f0352bbeb9f16d36572c71dc4bc8f930120931e1cc5bb2b53b99e133392ae0d113eb5448a7c851982d6ad69456458c66c49799ff9f4fa06deda31d84b7b477ac5eb961381a1cc5c6e3106df06bad35c741b7208d1f8d86b12164a27de1a2fe1c417b4a7f7482e58a2b27581a44f49bb1e64e98d078d47a04d26fc717b569ec8c884f09d5bf55877c66d704e7dd68e2c13f7ca20e1f7d077d4ac05e6578be7990ac0f26e289b955e2d1ae98db4cceae0e44c18ac602fa19a4938f42cd0697dc834dba5ce861c3405f7b050e484494c9c238f928e05af3220d1dc2811b33b9d1f665871d04c8fbc2e34f33f6757ce784bc55fe3e2dc137d3836fa5c9fc06a8d2b310421a1dcba292c0da2393995e677e2eccac2e66f136da921dccab8cb00236f22716645515bc6972118158bb68c0b56395d9d1bee2aab72f1644df64b8c2d9384452cebbb3422b973bb8d498167502f56aae564075e97a92874c4bd5756e960d93b176ab4081e19fa40d412c86d7a15743150cba70395b913f3b87ee4f36f7951624e97791272f2a765ccf6ff2bd0b267b49859c8fb2b7962741548922631e2e9f4f1766eb499ab4fb7957961e9dfc0440510a0c211ddfed0fce67b2b472c5f61efacf333389d5d2e4d1a19a326bef6c5f7418678260c064c8efa4c405168cfc4d34f34e1097810063023e0228f3c032ac0991d541ff8bd82819630f5893b3e4a63d9b609b909e1c984a0b8da7ace00580c7c94492a794fbdb394f96dea30b0f97285751ff6f63142d7a315dc0a3e3de1458a54a63b01c50ad27c22637dee3bb946f705ff2ed4266391317e9972bd31645a8da59859a63b1755c6761b91195f33a966d1031d31fd1bef918979e7eaeb816d5a342f6f3371d3995408a5777b8c542976da482d1c178fc15cfee33db9dcc2ca02488b731850cdd93d187146a5959dfec719fb955899aa69541c026582a6fd5cfcc36e4720acc19adf739490caa4d7f8ac08e9f0697fb0467d8bcb75034bc44a7db3817ad8ea842abe956f42ee867bb5949d7bd09ed374bcdd7823cf7d7cc68ff4302cb2814dbc0b177b6b092846c31c2ec2b9ea7d25d86c0e4afddf6a208b630f3ae5aa535219beb07022584302dbfeda03b07e2f71ff0e971942b987543f8c008b255117c80d6be957517929a5965215d7e4636a35b84939d4f1dbc8b39a9c28d4187d670a21bf31f1e8279dee3586fb6a5fc186b4de508e5b5d9373062af590d6e571c652d9e6a85c899c560c5ce7b2ab90f6075589e9250b94b0ceb4e9f1446405f39f0d7cdcb7a88a10d03e21efb6bd7cae2d8b0c5b22bf80c176fc408362ce77933f810d6f26ac72ecc65ce115c7b0cb8c601bed95aca8e10fa63fd528c4540b7fa97d7269c4627e3bee55ae12e1f7c5f46d804f5021bec13ff4563a130f5d99a64a00478a056f9e55b16770b80563e5c55dd105528578644bca6d4bd4bdf1d396e94e21bfe739922a3fcb10375643728208819f34d85496e04f08fa1d84522abd857bfffa5bd86bab894c278fc0e2959e611ef8314b0be68d7d536630706af6dc20ecb74e7a2f5d2d1a13177452318d215f318fc1780c6cb627f6fab21a4594d9114367734afc468e436d78b06bafccdca2092a7dfc8466c8da3852e73b59e792bb1228060c888883ec87fae1f74493d919039fae5b501a47423598ae944f1723ea44e0d2d13e509921a9a5a75466eca9905b709ff89f935cd747ca3c4af620fffe34b4419e511f5c9bfb684b030c812896383ecf67a79f3717b120b05a6d6ade443a598d68930566d59254022c0af3f140f56a9ca608d521fbafc46c7b73aa06711e6be4c519092fefa266f7dca6e13d1599949f4ab2af957503158debd8be4a6c8cac5eca47968567cbbe8fba0022c890f938dd737ea7e8274fdb1cc0ec9417ec1e2a0facb7150fd3417094f229557402f958c699780ec74ea67627af37dce17479ef3f319a65afb903f4d5b6cbc4c34a1052ff8c8db5cee283f9793b9100e4a4b07414d44dfe906e708b68be20bc51c7735b62dafd645137862423b50fc2fae43bc3d19f4378b83678bb9418f4109dd7c9956f2e2fd1c49f4c9f357d3ad7b2fb6a4118fc823ce969342f7de8daed2855881dd94c3302ee1185ecadb0080020351315f578f2b8707538a0d66ed71c976a51957b4ce9547b621615b6d0a49d32724e64904818f49b7dddc58b1d47000b215eb4188ca628af6ec5ca2a4be7258aba88035802c8ed9eea2316f784b1cc2ccbbbddce1c8b878bdba2decded53a76cc9d8833d4c11d359509808e07fa5b2f1e8f170b0881103df7c1e152d86c6bf3ec224b83f002ba24e935edecd6a21b9e46313adc794c87bb5b7b3217827e088493e4a0badd7f8383e1a0912b95cd02f62029de1c020bbda7ce4d4a0fbd2b4fcdd3e7fc2d691382b7f644efb76554331212b73fc3bde0cf99fae312bd6d9accd21e13f3cdf6b75bd143118fc0be54a1679bc26e83e9d634b1621bb1b6bd6cf6da83a7d8e2962d5b6ee750c66e3f243e21923d5c17046923afba50ee7352586fa06dc4b2367b99d82762508bd6a1cbc4e2e8de3ee5c30db75cce348190f823e46fe3fd5a0526aac03c4abd610ce37cd10bcc3f8586b00a1ff054f0ad47165ef9011662449466121f25d1d2fa40bd8e045e861337529462232cf09140583542aab231054d536c99140f381e216f2d46703d5d857c302f2afc11752a8ebc9a5296c26700f72770f2b4de2807642dc784aa9194277277e2b7fe0608ef526d2a6f0e71b802dad8e7835cbadbd546992252829ffd696455b4e9f007926da75aaae3124a59a1ab32ed644bbb3a3a306e1a19d6f1832333ec96c21439f972b92379ce62ebb2a313abd8b9bf4b986ad23d98b9221341c96df6927c726ed75992f1cf3b43dc755e7a761b4be4b707461a2002a3623d2cf72bb52968b6122c2c43e3ba4f46f4999cffcebdf6cc5de0113c502ea6f669c865dafed856c9a15499784c0d737ed45d0d9eed05db912753df0e142488187fa62fca0952fb69c547333e675b07613b836c6c4bd413abeb0adce9f22cb5435cd82c46c62ddf241aeb84c0d62dafaf2be5ddbb0c5cbe04dab3b68a06f7b725537e24dde8e0297b629845f442f301fb772f2c5b57490ffd830f896d6a57858e2d00df1dd359f7b1547ccd382ef59e566ec238fd64587f0ee93d704a7e0cc671588b948e247f751f97366c41b2ec22ae6ae623ee115c1a5605ea9aae5ef08cc4831580cf15a786517d88e26a8f68e887060b4df6c70a253468b3b7110856024d6693a5122866dae5efaa19f377badf85705110c5126c853a0933bbfcf2385bb6e2c6f810d994e2a82e7991c7f9cd25717a119148711c23c5b1021b07b7604b951111b9149346397b4b783252606c84388634686635a32b12dc25d319d0331fea5a19b2523f599b707a1f9c6dd2161115275a22217d70ee0b7ec85c81a442feab7b5b7b646b067cbe59db610d9055e0b84bc5b2b943faff5f4d458296a1c10750819a667effb96c3cfe144fd1a2acf237cf225e227a7c6df6e962ae2c657575dba3f43e691c9f54808403cc3ce4d09398e86972bbff17345337ae9a9a094796b43292689bd0d94a205ef53cf7c8bdff0e7c95e059a6a904312d52df7b9ce1eb88746f6f93bbb10a3cc6d66b11bbeb685ca7184ee80f8ca2861019da881d9191d108a3950d6be480cf337becef76c0ab376985daa3e993542e30994bcf60a2ff38c3437f97eaed9e92ad0aa51cc6f2b4180a6f9c2f3fdf3af0828182525503cec1557d501d9fae594d4ef869b6c42f7a1483e71971002615e9508b5bec8c890c7aed8d252109d43a9f500840989f17c1d30878ea586a46a7940238e97522286e505e6b8fcc1c3f64c4968073f9e1a93232e3fdf6b24313654747cafe420e57e05f0feb792450499088d26e33844a051491b181af3ac5da943f444a9dc3249c05f7070d476b9c288296eb8d92dd9d0b430de36efdbfd4d0c6dd2fe862a74f4e4c2c1f5bb3b3a39e5a58bdfa9b0e712b385a4aad5cd3fc2abff36a4720e91e826cc0d83b96636774ac49bc7c5b9d7430300cc73c81a669764a86a9ce2a3bd003852e5cea44f04b7fe4d1b712f3db285939f534013a36a20011f756641bbd62c9301abbbf81b4960ab51a9a9c850a1d24894f227642727a14e852710af56bff1fe65cdb8bf7f315f2ce4452e25345b9a20a868c7ed5964d3d99eba17b100808dabcd2f4b19d8d9e93b1f31c448b49d1b650e494b6d1c56f475230ea799a542cf1838c4c9640260bee83df66d438d0581f7d17a9321ce6954e551f413effd7d738a09ffd2ce61a414288fe0aa5482e19155441ccc9b68b669b77dfec7e1434ae946bc49859dded69411dc4f17fca054441860b5e6d7e2e20119543bb6c16f073e6f6ec4e8916796350ab43f7367405b9b21b453a5af7857a9bc7e3e8571664d50af47", 0x1000, 0x7f}], 0x100000, &(0x7f0000001240)={[{@nodiscard='nodiscard'}, {@lockproto_dlm='lockproto=dlm'}, {@noquota='noquota'}, {@data_ordered='data=ordered'}, {@lockproto_nolock='lockproto=lock_nolock'}, {@lockproto_dlm='lockproto=dlm'}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfsroot={'smackfsroot', 0x3d, 'em1mime_typecgroup[bdev)lo'}}]}) [ 2053.476947] Invalid option length (1048446) for dns_resolver key [ 2053.542977] Invalid option length (1048446) for dns_resolver key 03:20:40 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:40 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x100000000, 0x200000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x100, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000140)={0x6, 0x0, 0x8, 0x80000, r1}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:40 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) chdir(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x4000, 0x0) sched_setscheduler(0x0, 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) fstat(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$eventfd(r0, &(0x7f0000000000), 0x376416aa) 03:20:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") getsockname(r0, &(0x7f00000000c0)=@sco, &(0x7f0000000140)=0x80) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x1f, 0x7, 0x2, 0x7, 0x2, [{0x20, 0x10001, 0x7, 0x0, 0x0, 0x2400}, {0x1, 0x7, 0x8000, 0x0, 0x0, 0x1000}]}) [ 2053.687909] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffdzÅ4¾KUÅ2#‰òšþHN'Šk‰ú¬Œ%÷6üR´kYxÇôò¢bƒ3f5 [ 2053.700010] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2053.708419] gfs2: can't parse mount arguments [ 2053.712731] gfs2: can't parse mount arguments [ 2053.744269] cgroup: fork rejected by pids controller in /syz0 [ 2053.753358] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2053.776334] gfs2: can't parse mount arguments 03:20:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x7f', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2053.808271] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffdzÅ4¾KUÅ2#‰òšþHN'Šk‰ú¬Œ%÷6üR´kYxÇôò¢bƒ3f5 03:20:40 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffff.fd']) 03:20:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = getegid() r2 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0xffff, 0x40000) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r2, 0x80045530, &(0x7f0000000180)=""/215) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r1, r3) socket$nl_crypto(0x10, 0x3, 0x15) openat$cgroup_ro(r2, &(0x7f0000000280)='pids.current\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2053.885754] gfs2: can't parse mount arguments [ 2053.988736] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff.fd 03:20:40 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x200000, &(0x7f0000000080)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) stat(&(0x7f0000000140)='./file1\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x2000000, &(0x7f0000000400)={'trans=xen,', {[{@aname={'aname'}}], [{@uid_lt={'uid<', r0}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@fowner_lt={'fowner<', r1}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@permit_directio='permit_directio'}, {@subj_role={'subj_role', 0x3d, 'ppp1'}}]}}) [ 2054.045503] gfs2: can't parse mount arguments 03:20:40 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000240)={{0x2, 0x4e21, @local}, {0x306}, 0xc, {0x2, 0x4e24, @multicast2}, 'irlan0\x00'}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") [ 2054.169578] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff.fd [ 2054.177201] gfs2: can't parse mount arguments 03:20:40 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:40 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffff/fd']) [ 2054.381111] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff/fd [ 2054.421954] gfs2: can't parse mount arguments [ 2054.495977] gfs2: invalid mount option: statfs_quantum=0xfffffffffffff/fd [ 2054.514768] gfs2: can't parse mount arguments 03:20:41 executing program 3: creat(&(0x7f0000000080)='./file0\x00', 0x0) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@random={'user.', '$\x00'}, &(0x7f0000000400)='trusted.overlay.upper\x00', 0x16, 0x2) 03:20:41 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f00000000c0)=0x35) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="7374617466735f71750f59878a86dfdb3ec44078fef8e950616e74756d3d307866"]) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x600, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000080)=""/194) 03:20:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x80, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000140)={0x3, r2}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") 03:20:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffefd']) 03:20:41 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2054.619639] audit: type=1804 audit(1556421641.044:227): pid=14553 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir420711651/syzkaller.H43fuP/110/bus" dev="sda1" ino=17758 res=1 [ 2054.717636] gfs2: statfs_quantum mount option requires a non-negative numeric argument 03:20:41 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0ae616cbd78a2d4d35eb33") r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100aa800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r2, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}]}, @TIPC_NLA_MEDIA={0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x814) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000640)="956764652e0f63575f0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681825585aac3c36644430fc4618a2aa100080000bb0198f30f100a26660ff9543200bfce0f73d539c481fa521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d826aa33e6ebd7b0f0000") ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000100)={0x8, 0x7, 0x2, 0x7}) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000280)={0x0, 0x0, @ioapic}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000180)=0x3) [ 2054.781543] audit: type=1800 audit(1556421641.044:228): pid=14553 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=17758 res=0 [ 2054.809056] gfs2: can't parse mount arguments [ 2054.900871] gfs2: invalid mount option: statfs_quY‡Š†ßÛ>Ä@xþøéPantum=0xf [ 2054.925028] gfs2: can't parse mount arguments [ 2054.943864] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2054.954719] gfs2: can't parse mount arguments 03:20:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x5, 0x20000) sendto$x25(r1, &(0x7f0000000100)="1cd5339db17d440a2df44888cf65ad9490a983fea9c6fcd058d23a7e3eb52c9218b991d178d1370921ab76187d7d5f5598e943f8b133e96075ec12137d915016b9df7192938020aad805315ef223e0ad8341a0ef813c374dba1615b9eabe4f81e8f1d29511b7a2e37ea2756b4f94595659ff8c0b644a75debf21583d396cc773d1974b2853db194a30a9e7e9a55116fd5cbbb8453efd6655d931a2", 0x9b, 0x4000000, &(0x7f00000001c0)={0x9, @remote={[], 0x0}}, 0x12) syz_execute_func(&(0x7f0000000000)="952ccc0f05c402791c59ff911441298f17955bf9c462f907d7ff130fc4014c8f6566410fe1b8feefffffbff6000000a0e5bee7d1c4e1f8c421fc7122c1d72121c681925585c3c36645430fef2e0fbb0198860026660ff9543200bfce0f73d539c481f8521f5726c4018df6a8d7000000660ffcd4622828c14600090cc1042d82a66aa33e11bd110f0000") dup2(r1, r0) 03:20:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffgfd']) 03:20:41 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]) r0 = getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001400)={0x0, 0x0}, &(0x7f0000001440)=0xc) syz_mount_image$hfsplus(&(0x7f00000001c0)='hfsplus\x00', &(0x7f0000000200)='./file1\x00', 0x7, 0x3, &(0x7f0000001380)=[{&(0x7f0000000240)="5ed1f2185cfd347dbeca121af7a48fe510b72465bf3d246b741498edba611091f3753cb23b008e6a2d1ac95623aeb01bbfba6eda4045446755ac6590a5ed89addc16aa457f4e793c73e5aeca6e6dd90cb4b1d648feb739971b38cd18e134fcb027d606eb05236fdeed102d283da2a551d8ea0d810f99cc5c6021a992e4586bf68e718a4059c34731a78f251b052de595a67e953869afcb9d5c9d6a7b34cdf97742943c97881f1136231a522e05af87c24abb1d5b80e849d6c73ae815b73c1fd7847609186928bacb86dde0f4df085ad9eae35aeb869483c1d88c08a0d531139c75918a1ea8e397e824501282b3a78e70a81f77", 0xf3}, {&(0x7f0000000340)="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", 0x1000, 0x64}, {&(0x7f0000001340)="811ae1c0f24aa6da43bd61d0b1d3eab87239eaf69db8553f4f1185427389", 0x1e, 0x1}], 0x20, &(0x7f0000001480)={[{@umask={'umask'}}, {@nodecompose='nodecompose'}, {@umask={'umask', 0x3d, 0x5}}, {@gid={'gid', 0x3d, r0}}, {@nls={'nls', 0x3d, 'iso8859-13'}}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@dont_measure='dont_measure'}, {@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, 'self('}}, {@appraise_type='appraise_type=imasig'}, {@obj_user={'obj_user', 0x3d, 'gfs2\x00'}}, {@permit_directio='permit_directio'}]}) [ 2055.188854] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffgfd [ 2055.211464] gfs2: can't parse mount arguments 03:20:41 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000100)=ANY=[@ANYBLOB="ffff3b0cf4d0"]) 03:20:41 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x80004e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x1f4) 03:20:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2055.266381] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffd€}ÍûÔ4h hèàS_²×~xŸ9†ðÌùPú¿VáÄ»z [ 2055.266381] zûsÿé©F Y¿á [ 2055.311996] gfs2: can't parse mount arguments [ 2055.316469] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffgfd [ 2055.324380] gfs2: can't parse mount arguments 03:20:41 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x2) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2d, &(0x7f00000017c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) 03:20:41 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x228, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYRES64]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x4000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xfffffffffffffd71) write$P9_RGETLOCK(r0, &(0x7f00000001c0)={0x2c, 0x37, 0x1, {0x1, 0x1, 0xfffffffffffffffe, r1, 0xe, 'cgroup.events\x00'}}, 0x2c) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f00000000c0)={0x3, r2}) 03:20:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffff\nd']) [ 2055.454189] XFS (loop2): Invalid superblock magic number 03:20:42 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:42 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f00000000c0)=0x35) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="7374617466735f71750f59878a86dfdb3ec44078fef8e950616e74756d3d307866"]) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x600, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000080)=""/194) 03:20:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:42 executing program 4: creat(&(0x7f0000000040)='./file0/file0\x00', 0x188) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="7374617466735f7175616e74756d3d307866666666666666666666666666666664c49a6388bab0206584a77e9687d542aff9533226101fae6c5502980bf04922119c56a3edf352e670071f4a92722b86b41d7ef1"]) 03:20:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2055.566599] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff [ 2055.566599] d [ 2055.591110] gfs2: can't parse mount arguments [ 2055.691821] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff [ 2055.691821] d [ 2055.728841] gfs2: can't parse mount arguments 03:20:42 executing program 1: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2055.740063] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffdÄšcˆº° e„§~–‡ÕB¯ùS2&®lU˜ ðI"œV£íóRæpJ’r+†´~ñ 03:20:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffff\"d']) [ 2055.851804] gfs2: can't parse mount arguments [ 2055.892099] gfs2: invalid mount option: statfs_quY‡Š†ßÛ>Ä@xþøéPantum=0xf [ 2055.973387] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff"d [ 2055.985318] gfs2: can't parse mount arguments [ 2056.018690] gfs2: can't parse mount arguments 03:20:42 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x20, 0x20000) setns(r0, 0x2000000) 03:20:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:42 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:42 executing program 3: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:42 executing program 1: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2056.125551] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff"d [ 2056.142977] gfs2: can't parse mount arguments 03:20:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffff%d']) [ 2056.197738] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2056.244055] gfs2: can't parse mount arguments 03:20:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2056.328660] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2056.366781] gfs2: can't parse mount arguments [ 2056.419050] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff%d [ 2056.464817] gfs2: can't parse mount arguments 03:20:42 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='st}tfs_quantum=0ffffd']) sched_yield() prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x20001) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x20) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x3) [ 2056.522431] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff%d 03:20:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2056.587638] gfs2: can't parse mount arguments 03:20:43 executing program 1: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:43 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffff,d']) [ 2056.740821] gfs2: invalid mount option: st}tfs_quantum=0ffffd [ 2056.748018] XFS (loop3): Invalid superblock magic number [ 2056.764905] gfs2: can't parse mount arguments [ 2056.793286] XFS (loop2): Invalid superblock magic number 03:20:43 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="730a276e74746f6d3d30a793160000666466666664000000000000000000"]) [ 2056.909121] gfs2: statfs_quantum mount option requires a non-negative numeric argument 03:20:43 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x22) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000340)=""/235, &(0x7f00000000c0)=0xeb) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r6, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0xfffffffffffffffe) 03:20:43 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:43 executing program 3: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2056.961094] gfs2: can't parse mount arguments 03:20:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2057.072902] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2057.075197] gfs2: invalid mount option: s [ 2057.075197] 'nttom=0§“ [ 2057.106082] gfs2: can't parse mount arguments 03:20:43 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffff.d']) [ 2057.130486] gfs2: can't parse mount arguments 03:20:43 executing program 3: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) 03:20:43 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2057.169587] dns_resolver_preparse: 13 callbacks suppressed [ 2057.169596] Invalid option length (1048446) for dns_resolver key [ 2057.276918] gfs2: invalid mount option: s [ 2057.276918] 'nttom=0§“ [ 2057.283924] gfs2: can't parse mount arguments [ 2057.302815] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff.d [ 2057.315638] gfs2: can't parse mount arguments 03:20:43 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3f, 0x410000) ioctl$TUNSETLINK(r0, 0x400454cd, 0x100) 03:20:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2057.397054] gfs2: invalid mount option: statfs_quantum=0xffffffffffffff.d [ 2057.417403] gfs2: can't parse mount arguments 03:20:43 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffff/d']) [ 2057.543197] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2057.610389] gfs2: can't parse mount arguments [ 2057.730719] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2057.739948] gfs2: can't parse mount arguments 03:20:44 executing program 3: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) 03:20:44 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7374617466735f1f000000000000003078666666666666666666666666666666649926313845cd640556bdd5ce6e886806c69febe1f0e50979446a5cb36547cb9d780d88e1c6011e0244145f2e567ed92764ad55ab43c77d32942b4dd3d0772fdf063e32637fd0b4c9a78117cbd96ca9f9eee6e32f8c071308464a3bff5ad49da3917a1c5f9cf8a61df1cd99d557d93b789f475d74d43986434e3475219248459aafcb42f8b88e93baa2fc78a85a54009bb643db35be1c402cf69a9c95452a9a32d7388e6754032ca652e79af2c2a3e6"]) 03:20:44 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x22) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000340)=""/235, &(0x7f00000000c0)=0xeb) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r6, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0xfffffffffffffffe) 03:20:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffffed']) 03:20:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2057.941027] XFS (loop2): Invalid superblock magic number 03:20:44 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x2e) tkill(r0, 0x29) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x5, 0x200000) tkill(r0, 0x7) r1 = gettid() tkill(r1, 0x1) r2 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x80000) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000300)={'lapb0\x00', {0x2, 0x4e23, @broadcast}}) 03:20:44 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2058.100768] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2058.124295] gfs2: invalid mount option: statfs_ [ 2058.131502] Invalid option length (1048446) for dns_resolver key [ 2058.159441] gfs2: can't parse mount arguments [ 2058.204819] gfs2: can't parse mount arguments [ 2058.231554] gfs2: invalid mount option: statfs_ [ 2058.245438] gfs2: can't parse mount arguments [ 2058.285978] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2058.318515] gfs2: can't parse mount arguments 03:20:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:44 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffffffffffd, 0x15d, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES16, @ANYRESOCT]]) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) getsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 03:20:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffffffgd']) 03:20:45 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:45 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x800000, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7374617466735f23881aa6838dfe4d307866666666666666666666666666666664"]) [ 2058.598651] Invalid option length (1048446) for dns_resolver key 03:20:45 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:45 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8982, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x22) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2f, 'pids'}, {0x0, 'cpu'}, {0x2f, 'rdma'}]}, 0x11) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000340)=""/235, &(0x7f00000000c0)=0xeb) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000100), 0xda4fff08) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r6, 0x3, 0x1, 0x4, 0x0}, 0x20) getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0xfffffffffffffffe) 03:20:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffff\"']) [ 2058.828577] gfs2: invalid mount option: statfs_#ˆ¦ƒþM0xfffffffffffffffd 03:20:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2058.894758] gfs2: can't parse mount arguments 03:20:45 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000006004000040010000400100006002000078030000780300007803000004000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="000000000000000027ba0000000000000000000000000000000000000000000000000d00000000000000000000000000000000000000edff0000000000000000"], @ANYBLOB="ac141427ac1414bbffffff00ff0000ff000000000000000000000000000000000000000000000000ffff0000ff0000000000000000000000000000000000000000000000000000000000000000000000ff0000ffff0000000000000000000000000500caffff00020002a157000000000000000000000000000000006772653000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400200000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c6500000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaaaabb000000000000000000007f000001ac1414230f00000000000000e0000001ac14142bffffffff000000ffffffffffffff00000000000000000000000000000000000000ffffffffff00000000000000000000aaaaaaaaaaaa000000000000000000000000000000000000ffffffff00000000000000000000000001010006000007b700010080626f6e645f736c6176655f310000000076657468305f746f5f6272696467650000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000108000000010000000300000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001801000000000000000000000000000000000000000000000000000028004e465155455545000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x4b0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) [ 2058.996238] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffff" [ 2058.999942] Invalid option length (1048446) for dns_resolver key [ 2059.003708] gfs2: can't parse mount arguments 03:20:45 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="00a80db3fc901f934141d9a23f54cd1ae7d39ae96d52a5af527d81afc27440a2785c3079f2796e96c9f4431429de09a4b5bb1aa9ccec389c2a51e2fafbdecc23d2685d9539f8d2f8bee0c9b1df5a7348b05b3ffb2c362415016494c73d1a8abcbb0853ca13fd96da92bf3796b36636d3b9d349cd7b35371f964561d0f9fd314fef7e5ca5fde9713c75f86a28434ca2663069e1654d12c91ae100ee5e79eb4ecc360cd38e0273d9c79d0a4ec7e1cbc30a9582c8e635f7e4fcb621b1b3f10dc250680a"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003ff) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xfe6c) fallocate(r0, 0x3, 0x7ffe, 0x8001) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 03:20:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2059.172815] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2059.173200] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffff" [ 2059.212068] gfs2: can't parse mount arguments [ 2059.218224] gfs2: can't parse mount arguments 03:20:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffff%']) [ 2059.337424] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2059.349883] Invalid option length (1048446) for dns_resolver key [ 2059.369253] gfs2: can't parse mount arguments [ 2059.451877] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffff% [ 2059.491569] gfs2: can't parse mount arguments 03:20:45 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x161000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000680)={0x0, 0x1}, &(0x7f00000006c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000007c0)={r1, @in={{0x2, 0x4e24, @multicast1}}, 0xffffffffffffff01, 0x6}, &(0x7f0000000700)=0x90) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f00000001c0)=""/148) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6a7f, 0x252200) r3 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) linkat(r2, &(0x7f0000000080)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00', 0x1000) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') mount$9p_tcp(&(0x7f00000004c0)='127.0.0.1\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='9p\x00', 0x800000, &(0x7f0000000580)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid={'afid', 0x3d, 0x4}}, {@uname={'uname', 0x3d, '.self#vmnet0'}}, {@cachetag={'cachetag', 0x3d, 'ib\x00'}}, {@loose='loose'}, {@fscache='fscache'}], [{@smackfsroot={'smackfsroot', 0x3d, 'eth'}}, {@hash='hash'}, {@pcr={'pcr', 0x3d, 0x2a}}, {@fsmagic={'fsmagic', 0x3d, 0x58}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}}) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x806000}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x130, r4, 0x0, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x68, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc000000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x43}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @empty}}, {0x14, 0x2, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xcf}]}, @TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'team_slave_0\x00'}}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x840}, 0x4000) 03:20:45 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="00a80db3fc901f934141d9a23f54cd1ae7d39ae96d52a5af527d81afc27440a2785c3079f2796e96c9f4431429de09a4b5bb1aa9ccec389c2a51e2fafbdecc23d2685d9539f8d2f8bee0c9b1df5a7348b05b3ffb2c362415016494c73d1a8abcbb0853ca13fd96da92bf3796b36636d3b9d349cd7b35371f964561d0f9fd314fef7e5ca5fde9713c75f86a28434ca2663069e1654d12c91ae100ee5e79eb4ecc360cd38e0273d9c79d0a4ec7e1cbc30a9582c8e635f7e4fcb621b1b3f10dc250680a"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003ff) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xfe6c) fallocate(r0, 0x3, 0x7ffe, 0x8001) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 03:20:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2059.583247] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffff% [ 2059.618038] gfs2: can't parse mount arguments 03:20:46 executing program 3: clone(0x2302001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f00000001c0)={0x4, &(0x7f0000000180)=[0x9, 0x8, 0x3, 0x200]}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1000000018) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000240)={@rand_addr="11f291f57545f4a740498c0caab5d0d6", @rand_addr="dc23f64e08dabefbd9c7717e4253d7d3", @loopback, 0x2, 0x3, 0xfff, 0x100, 0x100000000, 0x100, r3}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x1, 0x0, 0x3, 0x20000000, 0xca, r0}) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x200, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14, 0x69, 0x2, {0x0, 0x0, 0x1}}, 0x14) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 2060.103820] device bridge_slave_1 left promiscuous mode [ 2060.110090] bridge0: port 2(bridge_slave_1) entered disabled state [ 2060.179493] device bridge_slave_0 left promiscuous mode [ 2060.192187] bridge0: port 1(bridge_slave_0) entered disabled state [ 2060.368765] device hsr_slave_1 left promiscuous mode [ 2060.410652] device hsr_slave_0 left promiscuous mode [ 2060.470533] team0 (unregistering): Port device team_slave_1 removed [ 2060.489993] team0 (unregistering): Port device team_slave_0 removed [ 2060.509986] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2060.560146] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2060.722533] bond0 (unregistering): Released all slaves [ 2061.676007] IPVS: ftp: loaded support on port[0] = 21 [ 2061.861464] chnl_net:caif_netlink_parms(): no params data found [ 2061.986968] bridge0: port 1(bridge_slave_0) entered blocking state [ 2061.993423] bridge0: port 1(bridge_slave_0) entered disabled state [ 2062.007741] device bridge_slave_0 entered promiscuous mode [ 2062.021086] bridge0: port 2(bridge_slave_1) entered blocking state [ 2062.030869] bridge0: port 2(bridge_slave_1) entered disabled state [ 2062.042328] device bridge_slave_1 entered promiscuous mode [ 2062.073372] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2062.096867] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2062.143730] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2062.182234] team0: Port device team_slave_0 added [ 2062.191212] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2062.203001] team0: Port device team_slave_1 added [ 2062.211617] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2062.223106] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2062.321502] device hsr_slave_0 entered promiscuous mode [ 2062.420757] device hsr_slave_1 entered promiscuous mode [ 2062.475276] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2062.482374] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2062.539620] bridge0: port 2(bridge_slave_1) entered blocking state [ 2062.546070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2062.552738] bridge0: port 1(bridge_slave_0) entered blocking state [ 2062.559155] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2062.682371] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2062.694688] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2062.706057] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2062.727936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2062.736377] bridge0: port 1(bridge_slave_0) entered disabled state [ 2062.755099] bridge0: port 2(bridge_slave_1) entered disabled state [ 2062.766062] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2062.788959] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2062.804693] 8021q: adding VLAN 0 to HW filter on device team0 [ 2062.820916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2062.839760] bridge0: port 1(bridge_slave_0) entered blocking state [ 2062.846315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2062.865871] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2062.873478] bridge0: port 2(bridge_slave_1) entered blocking state [ 2062.881642] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2062.892275] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2062.900884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2062.909245] IPVS: ftp: loaded support on port[0] = 21 [ 2062.909399] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2062.937044] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2062.975823] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2062.983045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2063.005593] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2063.016990] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2063.086920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2063.094550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2063.114111] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2063.125114] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2063.135794] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2063.142019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2063.150267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2063.158886] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2063.189679] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2063.247615] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2063.322534] chnl_net:caif_netlink_parms(): no params data found 03:20:49 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:49 executing program 1: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xfffffffffffffffc, 0x64fffe) 03:20:49 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffff,']) 03:20:49 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) 03:20:49 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x3, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x8}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000140)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/capi20\x00', 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x23f, 0x0) [ 2063.454412] bridge0: port 1(bridge_slave_0) entered blocking state [ 2063.465152] bridge0: port 1(bridge_slave_0) entered disabled state [ 2063.472595] device bridge_slave_0 entered promiscuous mode [ 2063.475039] gfs2: statfs_quantum mount option requires a non-negative numeric argument 03:20:49 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x28002) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f00000000c0)=0x68) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x3ad4, 0x8, 0x800}, &(0x7f0000000400)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000440)=@sack_info={r1, 0x49a, 0x2}, &(0x7f0000000480)=0xc) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000040)=ANY=[@ANYBLOB="060000000000000000000000000000000000000000008e00"/104]) r2 = socket(0x1e, 0x2, 0x0) bind(r2, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0xfffffffffffffff7, 0xa1c, 0x100000000, 0x8}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000001c0)={0x20, 0x4, 0x1, 0x4, r4}, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000180)={0x0, 0xffffffffffffff3a, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r5, 0x5, 0x0, 0x0, {{}, 0xfffffffffffff000, 0x5, 0x0, {0x14, 0x19, {0x0, 0x0, 0x2}}}}, 0x30}}, 0x0) 03:20:49 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup2(r0, r0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000000)=0x2000000000000, 0x0) [ 2063.503427] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2063.527734] bridge0: port 2(bridge_slave_1) entered blocking state [ 2063.534051] gfs2: can't parse mount arguments [ 2063.553406] bridge0: port 2(bridge_slave_1) entered disabled state [ 2063.560312] gfs2: can't parse mount arguments [ 2063.583786] device bridge_slave_1 entered promiscuous mode 03:20:50 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2063.636961] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2063.648805] rtc_cmos 00:00: Alarms can be up to one day in the future [ 2063.658380] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2063.671974] gfs2: statfs_quantum mount option requires a non-negative numeric argument 03:20:50 executing program 1: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2063.693955] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2063.729665] gfs2: can't parse mount arguments [ 2063.744389] gfs2: can't parse mount arguments 03:20:50 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2063.816975] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2063.824319] team0: Port device team_slave_0 added [ 2063.889699] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2063.922509] team0: Port device team_slave_1 added [ 2063.954193] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2063.977479] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2064.007299] rtc_cmos 00:00: Alarms can be up to one day in the future [ 2064.085566] device hsr_slave_0 entered promiscuous mode [ 2064.115109] device hsr_slave_1 entered promiscuous mode [ 2064.155327] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2064.162365] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2064.179843] device bridge_slave_1 left promiscuous mode [ 2064.185797] bridge0: port 2(bridge_slave_1) entered disabled state [ 2064.235705] device bridge_slave_0 left promiscuous mode [ 2064.241234] bridge0: port 1(bridge_slave_0) entered disabled state [ 2064.420548] device hsr_slave_1 left promiscuous mode [ 2064.479387] device hsr_slave_0 left promiscuous mode [ 2064.539178] team0 (unregistering): Port device team_slave_1 removed [ 2064.559931] team0 (unregistering): Port device team_slave_0 removed [ 2064.582913] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2064.640084] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2064.777310] bond0 (unregistering): Released all slaves [ 2064.872387] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2064.964333] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2064.984200] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2065.001793] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2065.023953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2065.031868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2065.049552] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2065.066090] 8021q: adding VLAN 0 to HW filter on device team0 [ 2065.108846] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2065.135372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2065.143363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2065.165213] bridge0: port 1(bridge_slave_0) entered blocking state [ 2065.171624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2065.214405] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2065.222147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2065.230711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2065.255667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2065.263362] bridge0: port 2(bridge_slave_1) entered blocking state [ 2065.269783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2065.297728] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2065.305592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2065.317792] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2065.336226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2065.347970] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2065.365614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2065.373612] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2065.398089] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2065.405961] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2065.413164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2065.435611] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2065.446344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2065.466466] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2065.485279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2065.493046] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2065.515746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2065.523495] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2065.547428] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2065.553527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2065.585998] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2065.619419] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2065.655499] Invalid option length (1048446) for dns_resolver key 03:20:52 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) getpeername(r1, &(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x80) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000040)=""/3, &(0x7f0000000080)=0x3) 03:20:52 executing program 3: socket(0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x300, 0x0) unshare(0x400) shutdown(0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0xffffffffffffffff) syz_open_dev$sndctrl(0x0, 0x0, 0x0) read$rfkill(0xffffffffffffffff, 0x0, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f00000000c0)=0x4, 0x4) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000000, 0x11010, 0xffffffffffffffff, 0x2e) socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x80044dfe, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) open(0x0, 0x400, 0x61) r2 = open(&(0x7f0000000380)='./file0\x00', 0x1315080, 0x100) fchdir(r2) quotactl(0x3ff, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000002c0)="50d04cef0093c3521bdb2c1900f29207f98cc527ddbbaafd14f58e51253c6d") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$MISDN_TIME_STAMP(r2, 0x0, 0x1, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x100000000004) r4 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r3, &(0x7f0000000400)="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", 0x200) sendfile(r3, r4, 0x0, 0xc700000e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x1c) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) vmsplice(r5, &(0x7f0000000180)=[{&(0x7f0000000100)}], 0x1, 0x8) 03:20:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffff.']) 03:20:52 executing program 1: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:52 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2065.669252] Invalid option length (1048446) for dns_resolver key [ 2065.760198] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffff. [ 2065.768958] audit: type=1800 audit(1556421652.184:229): pid=16037 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=572 res=0 03:20:52 executing program 4: set_tid_address(&(0x7f0000000040)) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="7374617466735f7175616e74756d3d30786666666666456666666666666666cdc9c05fd303bcf4b7c66664"]) [ 2065.913441] gfs2: can't parse mount arguments [ 2065.919850] rtc_cmos 00:00: Alarms can be up to one day in the future 03:20:52 executing program 3: ioprio_set$pid(0x0, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x1}, 0x6) r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000240)={0x18, 0x0, {0x2, @link_local, 'bond0\x00'}}, 0x1e) tee(r0, r0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x400, 0x0) sendmmsg(r0, &(0x7f0000005b40), 0x106, 0x0) r2 = accept$inet(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x10) getpeername(r2, &(0x7f0000000140)=@nfc_llcp, &(0x7f00000001c0)=0x80) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x400000, 0x0) [ 2065.955799] Invalid option length (1048446) for dns_resolver key [ 2065.975887] audit: type=1804 audit(1556421652.194:230): pid=16037 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir420711651/syzkaller.H43fuP/124/file0/file0" dev="loop3" ino=572 res=1 03:20:52 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2065.988502] Invalid option length (1048446) for dns_resolver key 03:20:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2066.043340] audit: type=1800 audit(1556421652.194:231): pid=16037 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=572 res=0 03:20:52 executing program 1: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2066.081406] audit: type=1804 audit(1556421652.384:232): pid=16058 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir420711651/syzkaller.H43fuP/124/file0/file0" dev="loop3" ino=572 res=1 03:20:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffff/']) [ 2066.189667] audit: type=1800 audit(1556421652.384:233): pid=16058 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=572 res=0 [ 2066.214482] gfs2: invalid mount option: statfs_quantum=0xfffffEffffffffÍÉÀ_Ó¼ô·Æfd [ 2066.253903] gfs2: can't parse mount arguments 03:20:52 executing program 1: r0 = socket$unix(0x1, 0x8000000001000001, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000000c0)={r1, r2/1000+10000}, 0xfffffffffffffe82) recvmmsg(r0, &(0x7f00000052c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/prev\x00') setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000040)=0x4, 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000100)=[@in={0x2, 0x4e20, @rand_addr=0x8}, @in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e23, 0x3ff, @mcast2, 0x5}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x4c) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000180)={0x3ff, 0x0, 0x2, 0x9}) ioctl$DRM_IOCTL_AGP_BIND(r3, 0x40106436, &(0x7f00000001c0)={r4, 0x4}) [ 2066.280681] Invalid option length (1048446) for dns_resolver key [ 2066.308649] Invalid option length (1048446) for dns_resolver key 03:20:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2066.336754] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffff/ 03:20:52 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)=ANY=[]) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x8, &(0x7f0000001680)=[{&(0x7f0000000240)="d7bd2caab73bc783d7c60cade3edef7d54f92375339df2b6f0065c17af7ca81b6bfae3adad70aa7b8f6eec9de497f757785f4f27ac6b222f41e565beb15af63fd5e482bc9bb0ee4cb11fad0ed5399d9cc93d0a564e890104086018db3aae82733d22c57bbd6858701a066652a091783ef4d8c6483354d0bc4341247c64a2555b71416b62884fdc667b4ae8502329dbc1ab866d29110f5997dda77926bb1f734dcd0357b55dfb832613bcfc6eff11e8586f2efe8c29bccc31ae133daa1ee316f6a45cda855d700d", 0xc7, 0xc4}, {&(0x7f0000000340)="d1e941a62f4a2d1a8bdd82eb8d26b908f53c36ea917d9fee0eef02eef28b4673f73d82e6871b62c0e981e9ea6b20f45f9089962d7eb9c0631a4375e23b7c0b523fcce6c7d688c0cf96b493b347f3ed431ea45e1692fef81d643c76615f625960f4bc72f9a64ecdcd3d30ed11ecdada962fd537f6a11ea744b5fd8bd5d691ef6d54dda7686e3731666b937015755187cea516e020d5c9ade044585faaa80650252edd5e8209d260874b946d2d0e849dcb53afab0cd929f8152046562ec8fdb6174df472af4d6e2b22f17eae40e83989dba1c5bd67e7893c68dc20136bc4a8", 0xde, 0x5}, {&(0x7f0000000100)="4b8339893902c8acd18a072538ef5d602d79c0e975fa39289f7299d1a803e949b76fd69f67bd2e4d8960e76aed0b41540ab4c1e6b5a818e40dee741b893345448079413253a407", 0x47, 0x3ff}, {&(0x7f0000000440)="2520fd39d0d3b47564e5b3199cb2035cc5898c8893b4a026b10a673450f56fefd382aecc2ee97bb740f984c1fb3605fe93d0bf54d221cf8ac850d7232eebe23a03c11a56cfade5cea999c20e8cb5234cc3d8c43a7f91c7470458c62a80875ea435ba092d7840540265cfdcc7c98c14bec8809de6a16f0e275122bb20118a0cf3b34eeff5373151c405dc162ba2d75778fb5839fb86", 0x95}, {&(0x7f0000000500)="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", 0xfc, 0x3f}, {&(0x7f00000001c0)="400e37875cda99772b9069a4381f4590a32770b2b303d601547c69f9ccf0d59d", 0x20, 0x7}, {&(0x7f0000000600)="6a6c4923a6696e476b270732ad1c9a27f8ef632e8bf8594caa460a03583cb95d929547d94dec59fa65470f69cfc7a01ae004ecd12b3ffea68d167eb27bcba00b407d7da52f1586dcc40230c601f86d75a351d0b2", 0x54, 0x536}, {&(0x7f0000000680)="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", 0x1000}], 0x80000, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd, &(0x7f0000000780)=ANY=[]) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) [ 2066.386820] gfs2: can't parse mount arguments [ 2066.481310] Invalid option length (1048446) for dns_resolver key [ 2066.489825] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffff/ [ 2066.518113] Invalid option length (1048446) for dns_resolver key [ 2066.527505] gfs2: can't parse mount arguments 03:20:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffo']) 03:20:53 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000100)) write$selinux_attr(r1, &(0x7f00000000c0)='/usr/lib/telepathy/mission-control-5\x00', 0x25) ioctl$sock_SIOCINQ(r0, 0x541b, 0x0) [ 2066.656222] XFS (loop2): Invalid superblock magic number [ 2066.679481] Invalid option length (1048446) for dns_resolver key [ 2066.761102] Invalid option length (1048446) for dns_resolver key 03:20:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) munmap(&(0x7f0000001000/0x4000)=nil, 0x4000) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U-', 0x5}, 0x28, 0x2) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 03:20:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:53 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:53 executing program 4: r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) read(r0, &(0x7f00000001c0)=""/189, 0xbd) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x4000000000, 0xfffffffffffffec4, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xffffffffffdffffd']) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x6c7c, 0x80) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000080)={0x0, @initdev, @local}, &(0x7f00000000c0)=0xc) write$P9_RWSTAT(r1, &(0x7f0000000280)={0x7, 0x7f, 0x1}, 0x7) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf, 0x1f, 0x2, 0x3}, 0xf) [ 2066.802177] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffo [ 2066.839616] gfs2: can't parse mount arguments 03:20:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x02\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2066.903352] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffo [ 2066.942747] gfs2: can't parse mount arguments 03:20:53 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x90000000000, 0x8000, 0x81, 0x2, 0x1a, 0x1, 0xfffffffffffffff9, 0x7, 0x0, 0x3f}) fallocate(r1, 0x0, 0x0, 0x8000011) fallocate(r1, 0x8, 0x0, 0x10000) ftruncate(r0, 0x80003) sendfile(r1, r0, 0x0, 0x8000fffffffe) 03:20:53 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0xc002, 0x0) r1 = gettid() ioctl$LOOP_SET_FD(r0, 0x4c00, r0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000001c0)={{0x0, 0x7, 0x4, 0x1, 'syz0\x00', 0x8000}, 0x5, 0x4, 0x7527473c, r1, 0x7, 0xa437, 'syz1\x00', &(0x7f0000000080)=['\x00', 'cgroup\x00', 'gfs2\x00', 'gfs2\x00', 'gfs2\x00', '\x00', 'gfs2\x00'], 0x1d, [], [0xffffffffffff0000, 0x6, 0x7, 0x9]}) write$apparmor_current(r0, &(0x7f00000000c0)=@profile={'permprofile ', 'syz1\x00'}, 0x11) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000100)) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000400)={0x5, 0x6, 0x81, 0x8, 'syz1\x00', 0x3e03}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) write$FUSE_WRITE(r0, &(0x7f0000000140)={0x18, 0x0, 0x7}, 0x18) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000300)=""/252) 03:20:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffs']) 03:20:53 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x6, [@bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$packet(0x11, 0x2, 0x300) socket$inet6_dccp(0xa, 0x6, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(r3, 0x4) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f00000000c0)=0x7f) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) poll(&(0x7f0000000100)=[{r2}], 0x1, 0x1) 03:20:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x03\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2067.153195] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2067.181597] gfs2: can't parse mount arguments [ 2067.241593] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffs [ 2067.268785] XFS (loop2): Invalid superblock magic number [ 2067.278398] gfs2: can't parse mount arguments 03:20:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x04\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:53 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="7374612066735f71fa040043ff75616e74756d3d30786666666666666666666466666666666457ac9f7e61524e9b1153f59ea3cc4c5ca65aef665a3aba7674b8838af77ef8004e137e421165e7a404d19a282b0ccc5680473543e450"]) 03:20:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000080)) ioctl$KDSETLED(r0, 0x4b32, 0x16b2) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) 03:20:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffu']) 03:20:53 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2067.464802] gfs2: invalid mount option: sta fs_qú 03:20:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x05\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2067.493011] gfs2: can't parse mount arguments 03:20:53 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000d40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x89\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2Ah\xbe\xe2k\xed\x90\xe1\xd9\x0f\x89-A\x1e\a\t\x89\'\xe0|\x02NG\xdb\xdf\fd\xc9[\n\xed\xec\xd4:\xfe\xd1r{\x83\x84qe;\xe3\xe8C\x87\xa9is\xdc\xa0WZ\xb7\xe34\xed\xa9\x82\xfb\xd1\xe8!\x97\x116/\x8d\xc9\xf3%D\xb1\t\t\xad\x16C\xea\x9c\xe7') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0063a086dd"], 0x90ad) [ 2067.522073] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffu [ 2067.550168] gfs2: can't parse mount arguments 03:20:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x06\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2067.614320] gfs2: invalid mount option: sta fs_qú [ 2067.625928] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffu [ 2067.626280] gfs2: can't parse mount arguments 03:20:54 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x802, 0x0) sendto$inet(r0, &(0x7f00000004c0)="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", 0x1000, 0x4000094, &(0x7f0000000040)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x6, 0x6) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2067.666224] gfs2: can't parse mount arguments 03:20:54 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffca, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) 03:20:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffx']) 03:20:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x20000, 0x1) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x10}) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f00000003c0)=0x12, 0x4) msgctl$MSG_INFO(0x0, 0xc, 0x0) 03:20:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\a\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:54 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:54 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) r0 = socket$bt_hidp(0x1f, 0x3, 0x6) connect(r0, &(0x7f0000000040)=@un=@abs={0x1, 0x0, 0x4e20}, 0x80) 03:20:54 executing program 3: syz_open_dev$evdev(0x0, 0x0, 0x800000022402) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000000000000000, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffff9c, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) r1 = getpid() setpgid(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8202) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x2000, 0x0) getpid() r3 = getpgid(r1) rt_tgsigqueueinfo(r3, 0x0, 0x3b, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x10, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x400000a) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, 0x0) lstat(0x0, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x19, 0x0, 0x0) r6 = dup(r5) setsockopt$inet6_tcp_int(r6, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x25, &(0x7f0000000080)=0x412, 0x4) setsockopt$inet6_int(r6, 0x29, 0x4b, 0x0, 0x394) setns(0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, 0x0) ioctl$int_in(r6, 0x5473, &(0x7f00000000c0)=0x5) bind$inet6(r5, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$VIDIOC_G_OUTPUT(r4, 0x8004562e, &(0x7f0000000100)) [ 2068.030075] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffx [ 2068.066588] gfs2: can't parse mount arguments 03:20:54 executing program 1: r0 = getpid() connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x0) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x101000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000300)=0x14) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) [ 2068.130680] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2068.149964] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffx [ 2068.189506] gfs2: can't parse mount arguments [ 2068.202771] gfs2: can't parse mount arguments 03:20:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\n\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x240, 0x0, 0x0, &(0x7f0000000780)=ANY=[]) open(&(0x7f0000000040)='./file0\x00', 0x400, 0x1b9d6abd3e79e2cc) 03:20:54 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x3b, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x0, 'ovf\x00', 0x18, 0x7f, 0x65}, 0x2c) 03:20:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x800, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4004800}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0xec, r2, 0x300, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xd3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ifb0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xc99}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffffffb}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr="683896cafe44a630fa80b89b45f50120"}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x11}, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r4 = accept$inet(r0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000340)={0x3, 0x7fffffff, 0x2, 0xe1a5, 0x7}, 0x14) r5 = socket$inet6(0xa, 0x3, 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000000c0)={0x1, [0x0]}, &(0x7f0000000100)=0x8) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r3, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 03:20:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'H\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:55 executing program 5: setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@v1={0x2, "2019"}, 0x3, 0x1) syz_mount_image$gfs2(&(0x7f00000001c0)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer2\x00', 0x80400, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0x86, "c208030cfa7f27161c9cf686731473dd8dce98924572edc2fc1acf6af87b7577ff2b24d52b29797d601d5e21cda54214815ffce5e1c04c4afb56799752140cb3013787f46dbca2a1cd5036beb0f013737675158761aa1f82889527c175262f8be93b4c838e3edb4f7fd4595ec84ff75e6bc0126831f26178dc53a5d7c5d1c429e3eb2e19f5ec"}, &(0x7f0000000140)=0x8e) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)={r1, 0x68, "3f8399820f44fcd17842a370701d5f2586aadf75944bdb100e8c004914601160e42f541d435ca1d4c740ded7da60ee473d2eb291c526f483bb2f6560737c69a34f4f3bfb2516ac8b3f22122546e01e7caa6049186adace4b76ac8875485525d90b66baa5812bcd9b"}, &(0x7f0000000340)=0x70) r2 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_tcp_int(r0, 0x6, 0x2c, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_dccp_int(r2, 0x21, 0x10, &(0x7f0000000000)=0x59b01026, 0x4) r3 = getpgrp(0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f00000003c0)={r0, r0, 0x3}) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xa) [ 2068.581352] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2068.617975] gfs2: can't parse mount arguments 03:20:55 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'L\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:55 executing program 3: syz_execute_func(&(0x7f0000000180)="04efb5b598cd801b69e4f56962f5696200d9d9d0c441395bf91cc18fe9589b26c7e4c753fbc4e101edfec4427d822a2a00c4da7676f2168f4808eebce00000806000c4214d9ac8378fe9509b9d649d640000c4e2ed8c0feff265dc5f00c36645363ef80f9966030faee42c24a1a1460f569f000026400f0d182e0f1a0efe5ff6e3df818e20b00000f1dc00000fefb3000000000f01c36666450f17720d14111d54111d00") r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/policy\x00', 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)=@deltaction={0x30c, 0x31, 0x101, 0x70bd2a, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x50, 0x1, [{0x14, 0x9, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x14, 0x1a, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x14, 0x20, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}]}, @TCA_ACT_TAB={0x94, 0x1, [{0x10, 0xb, @TCA_ACT_INDEX={0x8, 0x3, 0x10000}}, {0x10, 0x5, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0x80000001}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0x80000001}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x2f04}}, {0x10, 0x18, @TCA_ACT_INDEX={0x8, 0x3, 0xffff}}, {0x10, 0x19, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x2, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x17, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}]}, @TCA_ACT_TAB={0x94, 0x1, [{0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x6384}}, {0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x1a, @TCA_ACT_INDEX={0x8, 0x3, 0x3ff}}, {0x10, 0x17, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x14, 0x1f, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x18, 0x1a, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0x2, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}]}, @TCA_ACT_TAB={0x44, 0x1, [{0x14, 0x16, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x14, 0xf, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x18, 0x1f, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x2c, 0x1, [{0x14, 0x19, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x14, 0x1, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}]}, @TCA_ACT_TAB={0x9c, 0x1, [{0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x14, 0x2, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x1e, @TCA_ACT_INDEX={0x8, 0x3, 0x10000}}, {0x10, 0xb, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x14, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x80}}, {0x10, 0xd, @TCA_ACT_INDEX={0x8, 0x3, 0x1000}}]}, @TCA_ACT_TAB={0x74, 0x1, [{0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0xc, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x7, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffffffffff01}}, {0x14, 0x12, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x14, 0x13, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}, {0x18, 0x10, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}]}]}, 0x30c}, 0x1, 0x0, 0x0, 0x10}, 0x14) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000005c0)=0x80000000, 0x4) 03:20:55 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:55 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000280), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x4}, [], {}, [{0x8, 0x2, r0}, {0x8, 0x2, r1}, {0x8, 0x3, r2}, {0x8, 0x4, r3}], {0x10, 0x7}, {0x20, 0x5}}, 0x44, 0x3) 03:20:55 executing program 1: r0 = open(&(0x7f0000042ff8)='./file0\x00', 0x80040, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="6966757800000000090000000000000000d43b07e0ccfb30f9339ccdffd74c8e408f2a0699a90a33fc54aa0857ab0d074c063ec7582ea16c42603530f06fd780f636a2b60c3ab9c1a0882302529bf5da630dc27fbcc535c92235879aef333718881fcfc16e8ef7947f7b55a9dc13be53bae0bc7bbc583bc96791f5e8e268021fba0625014a130c48e7980adb56739bcef05fe6053336544dbdab53740f641f41c6b22601d36822c34694b31430b5006b266dac8225b29b52080d4d49e56535b581ebef4805cbd9c25730c43479fd67fc1b7cfe99e569d141ac753b36"], &(0x7f0000000180)=""/155, 0x9b) fcntl$setlease(r0, 0x400, 0x0) rt_sigtimedwait(&(0x7f0000000080)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f00000000c0)={0x37, &(0x7f0000000040)="fa8e373850c5960938de8e78532978eab3c367d2b20e1c6efead19b900be54518f32b18742689366ab331587e078e47665fad8fe247579"}) rt_sigsuspend(&(0x7f0000000000), 0x8) truncate(&(0x7f0000000240)='./file0\x00', 0x0) sendto$x25(r0, &(0x7f0000000380)="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", 0x1000, 0x20000004, 0x0, 0x0) 03:20:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="7374617466735f7175616e74756d3d3078f1000000666666666666664b6666666403d0dcb6087d6f68cb87bb979164d134a617fc10e51093848b330f260700082f647b9f78c483db43fdbebf10637a7c54eb877219159b67f1a612cbcb1cd58dbd031faa3f41a651bd0f48e726dbe160c7bb1e1231e0d9660a93374facb4303af8d43f4a9d52c2b0b615bbb0cc6dc6c20e9105b861465eb548fdfec69c4dcbe79fa725793e071a01134ac8b17d2361bbea7bc1c98b35eacee3ca51e01f3195a38cf542e8660c71117ec88c635574e4d0b9189e519dd0da5faa99393cdc3e209d"]) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/enforce\x00', 0x80, 0x0) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f00000004c0)={[0xd000, 0x6000, 0x3000, 0xf000], 0x7, 0x6e, 0xff}) io_setup(0x6, &(0x7f0000000480)=0x0) r2 = inotify_init1(0x80800) r3 = syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0x7dc7, 0x101000) io_cancel(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x3, 0x5, r2, &(0x7f0000000380)="3ec44a3f97b19eb6163e1ef61b", 0xd, 0xff, 0x0, 0x1, r3}, &(0x7f0000000440)) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f00000002c0)=[{&(0x7f00000007c0)="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", 0x1000, 0x58}, {&(0x7f00000001c0)="0d49f9c518565d9b2750525cce4412cfcd89fca8813b9033dfb4cbcd7b8d6d11a99dd8a963e6dbe93da1d8b15a9c3c455ecbda48a07189e9693fff0bcef8c72738c50c547c26308232d99734b8a4ab5ac4df7b15b038d155faadaae785021e825d5b7cce12cbe8361f210aaa49d2489786eb4da58afff5fb845fea1c3d1b0fde9eaa6f321cc1007b4d29851592360aae9dac46d054b6bdcf2363e582d28b2340c8c5487d178d54446dfb068aaae74adf6cec88a8621d29c9e36d34cff404133af0c448cbf655d183bb28207f081eb34697f3", 0xd2, 0x9}, {&(0x7f00000000c0)="9f0052cd3633875943516a55", 0xc, 0x9}, {&(0x7f0000000100)="c94e016eaed30274eea5d72eff194b233cb68132da2d28740e5e3366a2b611e108b975a08515443ebb7a4d11080a538bbc504bc02fb6e8169a48cbc7b98be3cd72eeb5932bda8526e4197f6fce230a3d8180ae1f177d80b3403526180d6a11371f76dadce11a47705d82ebe08d7d97c680678223b887", 0x76, 0x150}], 0x80400, 0x0) 03:20:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'`\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2069.018941] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2069.061689] gfs2: can't parse mount arguments 03:20:55 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x6, 0xbffffffffffffff9) fchmod(r0, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28}, 0x10) ioctl(r0, 0x200081204102, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x18, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x80) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000140)={0x0, @speck128, 0x2, "30f6ff06baf75fc7"}) 03:20:55 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0x0, 0x4}, 0x20) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) 03:20:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000700)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x84800) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, &(0x7f0000000040)="d26b002e67f08099001000001d0f0095ffbd0f070fc769000f0095b3c90fa9ea00006600dec5670f35", 0x29}], 0x1, 0x11, &(0x7f0000000140)=[@cstype0={0x4, 0x6}], 0x1) r3 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3, 0x4}) getsockopt$inet6_tcp_int(r2, 0x6, 0x3e, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x101ff, 0x2, 0xf000, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) getsockname$packet(r2, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000340)={@loopback, 0x6d, r4}) 03:20:55 executing program 5: 03:20:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'h\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000140)={{{@in=@loopback, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xe8) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000000000000000000000400000000000000000000000200000000000000000000000000000000000000000000000000000000000000ca921f2a5404519fad49e773471d05bf3ba6a199f96c52cb707ed62a0b56b97b48fd212d72169c7adf6d6826996d0a8367c400efbde1df532d2c2852bf9878df29ec382a6f82930d11ed8752977ebd4f44921a6383bba900806568a0680cceb535dcd27fa8864ae558b87632c7599374aaeaf5a22bd9852d15673df9fc3b15f27e"]) 03:20:55 executing program 5: ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x204083, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0xfffffffffffffff8) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) sendmsg$alg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000000240)="52f96f77b6420b53012e039792c22f0862c5da9fd4f66aab1b6feb4034467e92e245e152794ccd2822c5b331a257e4b99d79db9ec73c1a00f479f42534b40af142cb", 0x42}], 0x2, 0x0, 0x0, 0x80}, 0x0) sched_setattr(0x0, 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) unshare(0x40000000) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="878b6538d81d72d8ecf8ccf2e4d105187d20c63af131b2b0cdfd", @ANYRES64, @ANYRESOCT, @ANYRES32, @ANYRESHEX, @ANYRESOCT=0x0]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x3) accept(r1, &(0x7f0000000080)=@ax25={{0x3, @rose}, [@remote, @null, @remote, @netrom, @rose, @bcast, @rose, @default]}, &(0x7f0000000100)=0x80) [ 2069.285816] XFS (loop2): Invalid superblock magic number [ 2069.336515] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2069.354801] gfs2: can't parse mount arguments 03:20:55 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'l\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:55 executing program 1: openat$vicodec1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video37\x00', 0x2, 0x0) syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x3, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000001c0)) r1 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c) listen(r1, 0x3) r2 = socket$inet6_sctp(0xa, 0x400005, 0x84) sendto$inet6(r2, &(0x7f0000000100)='F', 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x349) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x20000003) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000], [], @local}, 0x2000000}, 0x1c) accept4(r4, &(0x7f0000000540)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x800) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=ANY=[], 0x0) mbind(&(0x7f0000126000/0x3000)=nil, 0x3321a8df32ee8487, 0x0, &(0x7f000016e000), 0x5, 0x4) 03:20:55 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7fffffff, 0x10000) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000080)) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000340)={0xb, @win={{0x4, 0xffff, 0x9, 0xc3d}, 0xf, 0x20, &(0x7f0000000100)={{0x2, 0x849e, 0x3, 0x4}, &(0x7f00000000c0)={{0x0, 0x3064, 0x8, 0x8}}}, 0xccc, &(0x7f0000000240)="c5320ed210da1f82024bca37426a6b9a1c3ff846e2405bd6e069c1c415aa4078ba13ff7f92554ef7d8e00535163e38c8400432887faf3aab97f7cccc4347089d84f9dd0e8858d8ce06b7f2797a37e464722331d269c393e7f0d3ff90a4314e398c40a5eab821f874a156541111aaf439ebb3b9dde8e77053a58c69ec28f1809fd1693280259d594af3c03d7c4fa0608784efe706bc2552be33860b5351ed492207038908b31736c7fff3ff9117c018a5fdbb8368aa997a6e8fcdd3cf27ed1d2200889279cd3ebb1c4631c76a6bce2ab51cb1e00bbab3a997605f8108f2c2d4621d24e38f01d421abbf6bb7", 0xffffffff7fffffff}}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x5, 0x2, 0xffffffff, 0xfffffffffffffe00, 0x0, 0x1c51}) ioctl$RNDZAPENTCNT(r0, 0x5204, 0x0) [ 2069.449589] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2069.490484] gfs2: can't parse mount arguments 03:20:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'t\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x0, @rand_addr=0x9}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}, @in={0x2, 0x0, @local}], 0x2c) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$ax25_int(r2, 0x101, 0xf, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 2069.582736] gfs2: invalid mount option: ‡‹e8ØrØìøÌòäÑ} Æ:ñ1²°Íýÿÿÿÿÿÿÿÿ01777777777777777777777ÿÿÿÿ0xffffffffffffffff00000000000000000000000 03:20:56 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x3f, 0x3, 0xd0e, 0x3f, 0x8}, &(0x7f0000000280)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={r1, 0x400021}, &(0x7f00000002c0)=0x3) accept4$bt_l2cap(r0, &(0x7f0000000300), &(0x7f0000000340)=0xe, 0x800) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0xffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f00000000c0)=0x200, 0x4) prctl$PR_GET_SECCOMP(0x15) accept$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) [ 2069.639493] IPVS: ftp: loaded support on port[0] = 21 03:20:56 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0xfffffffffffffffe, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'stack ', '\x00'}, 0x7) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) [ 2069.834860] gfs2: can't parse mount arguments 03:20:56 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x4400) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0xed) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000000c0)={@broadcast, @multicast2, r1}, 0xc) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r2, 0xaf01, 0x0) [ 2069.968375] XFS (loop2): Invalid superblock magic number [ 2069.993485] gfs2: statfs_quantum mount option requires a non-negative numeric argument 03:20:56 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:56 executing program 1: openat$vicodec1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video37\x00', 0x2, 0x0) syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x3, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000001c0)) r1 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c) listen(r1, 0x3) r2 = socket$inet6_sctp(0xa, 0x400005, 0x84) sendto$inet6(r2, &(0x7f0000000100)='F', 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x349) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x20000003) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000], [], @local}, 0x2000000}, 0x1c) accept4(r4, &(0x7f0000000540)=@nl=@proc, &(0x7f0000047ffc)=0x80, 0x800) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=ANY=[], 0x0) mbind(&(0x7f0000126000/0x3000)=nil, 0x3321a8df32ee8487, 0x0, &(0x7f000016e000), 0x5, 0x4) [ 2070.034876] gfs2: can't parse mount arguments [ 2070.113350] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2070.150766] gfs2: can't parse mount arguments [ 2070.313706] IPVS: ftp: loaded support on port[0] = 21 03:20:56 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) 03:20:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'z\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:56 executing program 3: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/163, 0xa3}, {&(0x7f0000000080)=""/114, 0x72}, {&(0x7f0000000200)=""/135, 0x87}], 0x3, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) accept4$alg(r0, 0x0, 0x0, 0x80800) ioctl$EVIOCSCLOCKID(r1, 0x40284504, &(0x7f0000000100)=0x100) 03:20:56 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="737475610174810e00000000000066666666666666d67fdfed666666786400000000000000"]) 03:20:56 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:56 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2000, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000080)={{0x1f, 0x8, 0x9, 0x0, 0x6, 0x2}, 0x7}) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8001) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x2, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4), 0x77b6dfee7a9ac899) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) 03:20:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x00\x03\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2070.542215] gfs2: invalid mount option: stuat [ 2070.555264] gfs2: can't parse mount arguments 03:20:57 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2070.627822] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2070.662899] gfs2: can't parse mount arguments 03:20:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0100180000000000000040000000580000008b00002010dd86c4fb35649ddabcc50f2ea5959e90b908c94584d9150dc74115379f72017d1e3a01a1da2e646cae8d841f94cf6b29c9a93efac3ec7280ca4973cb2b793fb45bdee6830d07c2000000002f83f50d8cae998ea20d6df48104d69450c366f30e124f184593559c84d7087c399c0de01a00efab209f"], 0x0, 0x8e}, 0x20) lchown(0x0, 0x0, 0x0) stat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) r0 = memfd_create(&(0x7f0000000140)='proc}GPLeth0^wlan0#:\x00', 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffd000/0x3000)=nil) socket$netlink(0x10, 0x3, 0xe) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x400001000) gettid() tkill(r1, 0x38) 03:20:57 executing program 4: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x130) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f00000000c0)) 03:20:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000300)={0x1, 0x4, 0x4, 'queue1\x00', 0x1f}) fchdir(r0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="a6bf14"], 0x3) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000080)=0x4) personality(0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f00000000c0)='./file0\x00', 0x40) [ 2070.720937] dns_resolver_preparse: 26 callbacks suppressed [ 2070.720946] Invalid option length (1048446) for dns_resolver key [ 2070.741488] Invalid option length (1048446) for dns_resolver key 03:20:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x00\x05\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2070.777171] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2070.802374] gfs2: can't parse mount arguments 03:20:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:20:57 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x101000, 0x0) fremovexattr(r0, &(0x7f00000001c0)=@known='system.advise\x00') ioctl$NBD_CLEAR_QUE(r0, 0xab05) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x1200000, &(0x7f0000000040)=ANY=[]) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$restrict_keyring(0x1d, r1, &(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000100)='gfs2\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000200)=0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x1000000000000, &(0x7f0000000240)="be03732c07ca356558c2fd41816131d207e52b0f1bfbac38a66520b69e93e310155dfa0f6a3d605ba5ca0434ef1811d77fad046cb9bb5f03bdb4fbfb7a3c9916b13ee46b73577fac1ac21ec68fe12844605dc703c37adf70b23b87bfb063a8cd380ae2d88acbf1d666fc2a60af895c3bd2db3b1acf25eec87c4a2530848b36e8dcffaad2afafb4466191fc181b1e660ff33ae76c3b459fdb1ffe94a4d3ec0f8c3552e36a5e3d02f2bc7f2d40994277991952ac28c84da671f6023bd7583057130670e21db23e53c560dc2fdbc47760f0b2f50330fe0d") [ 2070.869663] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2070.901520] gfs2: can't parse mount arguments [ 2070.928343] Invalid option length (1048446) for dns_resolver key [ 2070.953050] Invalid option length (1048446) for dns_resolver key 03:20:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x00\x06\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:20:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2071.009622] gfs2: not a GFS2 filesystem 03:20:57 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000740)='/dev/snd/pcmC#D#c\x00', 0x6, 0x6002) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f00000018c0)={[], 0x7, 0x1, 0x7, 0x0, 0xfff, 0x1000, 0xf000}) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000001a80)) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0xa, &(0x7f00000017c0)=[{&(0x7f00000000c0)="14ba6766a4d2a59251ff127e0ea05197627914acf71284f681a853728c2cd693b182d3443fd281af0e83fdb8ef3d9bff7fe0027b26747e677b9b7c4371f726d97c7cca74b5699b7897327cf41cdb8b9ee230dddb11e911efb6bbff79fc6233152ba6bd359050b8f301b2d8864b54ae1c7f61c7721bf89ba7dac0a2dd042a1602528b9a3d405d860e47e5494c8c2518283f048ef1a2dde84a2efbc815c2f134ec2e416a44", 0xa4}, {&(0x7f00000001c0)="2564ec3d696d60d1c3a002e552837649045a1cf0caeb3e40835f6998e913f5c99ad18f46736c8f63918d6d783a498fd7d3eb7d425b55a80f4be642e480ffb877d3fac1f2dc5b8b9418164268efb495eea032ad21cd9b196790acd75e65776449959a0d1c31e47dd1ffaa3c50d0919738b8829cc1c7c9a964fdae151725d6b722c6c11b4d02374a3dca9e75ad981d69affd04e45b55f3abcd3fa00be4c5b7fc27bafd9ac7e2376cd7163d7cad994039a736c3a96b7dca80a73f72b3f4da830fabfd", 0xc1, 0xfffffffffffffff8}, {&(0x7f00000002c0)="f1f37b991c9085981b6d3887a813c1c4a1fa17bc6f97b985115c7ca038e59fcd553b80f1bf7d12c9ab893ccd8fb225aef5f6e5c068fbe8eba11c35ed91b1e2573a612b43498e1319c87ef4103af701fd59bcd98376f5e0593eee89327ad32a36e977d71c9d15e04e621d242122b7ff36fdc07f48ed8676524b2e", 0x7a, 0x3}, {&(0x7f0000000340)="5bf398bbd66aeadf6e26849a8d848820cef4372aa20ab20ba6046e1f4a49f7f42a26dd1dedaa6197b36a346e7c8621ceb73ca66a0f6827ac06d14796072abefb0e7ca0644d637673837ef0209e5908d70e24", 0x52, 0x5d}, {&(0x7f00000003c0)="1d1ec55b7672864998187e313fdb9c9fd27be9e20efe9953b8b6d61540cef6de2c9e51f6aa7583d682372aa192d42f7880748cbe29007679510ccd21979b4d3a02ce883f2c1c9693ffe08ee05e8ed94615ed4e3b46ed6dfde5dc589e678dba1aa9a19c369dabb2e43a655e1b01cdc2f32222029b4a3b1303c994e3c23548e0bb8356ef9ca5347d7c607a20f75c9179236fbb31b144315c21692a3af877a121b313c494e8812cbc475daf78ab3f796fed3f3a1c5d61919fb4be1fc3a7534dcef8473b8f6adaa4443e3c85befb7cf6e544f17fb4e2e1", 0xd5}, {&(0x7f00000004c0)="d40442cdc5fbeafe5c18471379558daa8201afe0937d490f3ffbc7f4745f0e5552cf0e120937e0c2f88ba412492c01b18f1a68ca66c9f523c1edd6cfdf32269a6324596e9f7db739b2a095d10c3a5297dc0a785bdcdab3691c812da59d435278a3c91e6d431eea3a574769267656f129778a461b7aa3da6c05e318be4efd7b55c396fbb05d5269fcd486271433a985c41c310e61591b55901120bb5de2056480c8a609f7ad5f9cf48ec5d430944f2dfe2f6ecf89cf441a9097bcf0ec131a003253d832b1080e8987ecc5221c9e7bf3e682b46fb166387289de66ed2443459b19c77567019e229156bf8cd5e943d2388c", 0xf0, 0x6}, {&(0x7f00000005c0)="e926b327bb331ddffde9052960171bb59d59b825bd05583ee00ef9266485c531e7bfdb60349af0a8d8d805fc08e425709c6a339482cbdf49ee", 0x39, 0x9}, {&(0x7f0000000600)="0190ecc3ceb554de0c5893888814b0c1ea4de8cbf4bd8994bd4dcd58c7ea259e86f0ef4600e17462fe9eae520f630799af77992292f200b9c6fb21ba3f0c9c27c1487cf0637a06187078da6063393fff50de8c2db0d6cc2fbb315f35ce2c463477fb6ddadfcb09bec69312103affab12ff0694f73d940ca6f655f81f8a6b3a1ec6f4053f263d6270c5997da9d258578446ad2d50f0cda1fa5ec12d1f479f5749cf7459c208f9f61a5b743cce1852026e0f35904a2889a1619ce78a688923a0", 0xbf}, {&(0x7f00000007c0)="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", 0x1000, 0x5c6}, {&(0x7f00000006c0)="b6a06247b69d85b4538762d6125c2a2ff4ea3ad1f876c616ba9e35396391672da0dacb5b6d06425eb9315f79135064f2", 0x30, 0x4}], 0x20000, &(0x7f0000000700)=ANY=[@ANYBLOB='shortname&win95,nonumtail=0,defcontext=sysadm_u,\x00']) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) 03:20:57 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7374617466731f7175616e74756d3d30786666666666666666666666666666666402d8f817b3c893464fd5247a12ee20bbf1039063f598ba19eb310a4ca8d12f7b9ee10ff6b96c46e7e1a8ba0b2dd0d9284a7ec8b236a1fd4dfad04d2312e8f6be49841ff09c2e329069afa6e75de1d61c21cc8199c068e6718360a4f67abe4987806e3015e430e6d6682b51a6f65e1f3363e50a4dfeabb9c876"]) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r0) [ 2071.223859] gfs2: invalid mount option: statfsquantum=0xfffffffffffffffdØø³È“FOÕ$zî »ñcõ˜ºë1 [ 2071.223859] L¨Ñ/{žáö¹lFçᨺ -ÐÙ(J~Ȳ6¡ýMúÐM#èö¾I„ðœ.2i¯¦ç]áÖ!Ì™Àhæqƒ`¤öz¾I‡€n0ä0æÖh+Q¦ö^3cå [ 2071.223859] Mþ«¹Èv [ 2071.245291] gfs2: can't parse mount arguments [ 2071.269539] Invalid option length (1048446) for dns_resolver key 03:20:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x00\a\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2071.296757] Invalid option length (1048446) for dns_resolver key [ 2071.335667] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2071.343788] gfs2: can't parse mount arguments 03:20:57 executing program 5: r0 = creat(&(0x7f0000000200)='./file0\x00', 0x2) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, r1, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xb85}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000094}, 0x4000) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="73746174666d3d307866666666666666666666666666666664bb956b6b58c8dc0291c34f370e9a14192b2ff8194966f2c09963c0ffb0aee0951856ffc10b0f3c0a863a6e7fe507338d1e1897c4bdd88acf1adf4445652aad7c93f26c14049f06e1713b995b53b6cb87c79089c071ea7c2ffd8de46205483bca2f2ad47633255b97996c1cdd5f19062fc85c58"]) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'osx.', 'gfs2\x00'}, &(0x7f00000001c0)=""/20, 0x14) write$binfmt_aout(r0, &(0x7f0000000380)={{0x1cf, 0x5, 0x2, 0x262, 0x2ca, 0x4be, 0x33f, 0x1f}, "766b378ed19badb559060a971b00bb3375c061af1bea7ae4703508303d76b6007c0f174685417567377798c5372c9a3fe5051da8358b1bdfd7f7a17c02d4077652c0e3a658f039427379438bf3dfa83920a7d50093c6f219404822950672f3f3e31f0a07cf04654bb5a36bf7b41f446dadf378550c04dfd062ceeb7183c3ef0ed73ff8908d5e492015bcc8c98effae10a4cb4a9afaba94453effa1ec21e036f2ef34e999ea54a4260177e853719aa3e2517ba5e1412ac746f9de307bba54a233db18bda472629e7ca75e61f290", [[], [], [], [], [], []]}, 0x6ed) getpeername$netrom(r0, &(0x7f0000000a80)={{0x3, @rose}, [@rose, @remote, @remote, @default, @rose, @netrom, @null, @rose]}, &(0x7f0000000b00)=0x48) [ 2071.501011] Invalid option length (1048446) for dns_resolver key [ 2071.534097] Invalid option length (1048446) for dns_resolver key [ 2071.598999] gfs2: invalid mount option: statfm=0xfffffffffffffffd»•kkXÈÜ‘ÃO7š+/øIfòÀ™cÀÿ°®à•VÿÁ < [ 2071.598999] †:nå3—Ľ؊ÏßDEe*­|“òlŸáq;™[S¶Ë‡Ç‰Àqê|/ýäbH;Ê/*Ôv3%[—™lÝ_/È\X [ 2071.618400] gfs2: can't parse mount arguments 03:21:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:21:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x00\n\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:21:00 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x4001, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x101002, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000080)={{0x0, 0x0, 0x3, 0x3, 0x5}, 0x5, 0x6}) 03:21:00 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x400000000000003, 0x0, 0x0, 0x10000000c0000, &(0x7f0000000040)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) 03:21:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:21:00 executing program 1: link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2002, 0x0) sendto$unix(r0, &(0x7f00000000c0)="d4216212987a04747948eb388f1dfa7d28cd026d1e26e94fb31e30133342c993c40b6bbec4504ba5ddaa9f463b633bd36c4c894bb3997ae1b4f0764523635760958c75932b911364faf6031a6bb193d4a10b03acae9a1ed07b631ede3901e13a34e1172459a2af7013fb06ea43d9b1bb96b353c7d68af1af48dc3632c55585d4b40e6c686dae1d11502d262727", 0x8d, 0x40004, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000200)={0xffff, 0x4}) write$FUSE_POLL(r0, &(0x7f0000000240)={0x18, 0x0, 0x4, {0x4}}, 0x18) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r1, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x800) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000003c0)={0xfffffffffffffffe, "22274fdeca12aad9e19db83a13fee1cb145cb6664705d4e2484a6a3f535b654f", 0x860, 0x40, 0x1ff, 0x0, 0x6}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, r2, 0x100, 0x70bd25, 0x25dfdbfd}, 0x14}}, 0x800) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000580)={0x0}, &(0x7f00000005c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000600)={r3, 0x1000, "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"}, &(0x7f0000001640)=0x1008) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000001680)={0x5, [0x9, 0x2, 0x7, 0x6, 0xfffffffffffffff9]}, &(0x7f00000016c0)=0xe) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000001700)={0xc, 0x0, 0x1, {0x1000, 0xffff, 0x100, 0x2}}) write$P9_RFSYNC(r0, &(0x7f0000001740)={0x7, 0x33, 0x1}, 0x7) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001780)=0x0) sched_setparam(r4, &(0x7f00000017c0)) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000001840)={&(0x7f0000001800)=[0x0], 0x1}) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000001880)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000018c0)={r3, 0x1c9}, &(0x7f0000001900)=0x8) mkdir(&(0x7f0000001940)='./file0\x00', 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f00000019c0)={{0x8, 0x3, 0x4, 0x81, 'syz0\x00', 0xdc2f}, 0x2, 0x30, 0xff, r4, 0x1, 0x6, 'syz1\x00', &(0x7f0000001980)=['TIPCv2\x00'], 0x7, [], [0x7, 0xed, 0x7c81, 0x7fffffff]}) write$tun(r0, &(0x7f0000001b00)={@void, @val={0x1, 0x1, 0x80000000, 0x0, 0xfffffffffffff752, 0xffff}, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x9, @random="a4116e132004", @multicast1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @multicast2}}, 0x26) prctl$PR_GET_TSC(0x19, &(0x7f0000001b40)) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001bc0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000001d40)={&(0x7f0000001b80)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001c00)={0xe0, r6, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8d}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3d}]}, 0xe0}}, 0x40000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000001d80)=[@timestamp], 0x1) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000001dc0)={r5, 0x9}, &(0x7f0000001e00)=0x8) getsockname$packet(r0, &(0x7f00000022c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002300)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000002340)={@rand_addr="3d92a7828f06c218952c8f8f9024a6d1", @mcast1, @empty, 0x7, 0x4b0c5c57, 0x8, 0x500, 0x5, 0x20, r7}) [ 2073.863037] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2073.878649] Invalid option length (1048446) for dns_resolver key 03:21:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x00 \x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2073.955815] gfs2: can't parse mount arguments 03:21:00 executing program 1: socketpair(0x11, 0xf, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@ipv4={[], [], @multicast1}, 0x3, 0x1, 0x3, 0xf, 0x3ff, 0x2}, &(0x7f00000000c0)=0x20) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) sendfile(r1, r1, &(0x7f00000001c0)=0xffffffff000, 0xa198) 03:21:00 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) r0 = syz_open_dev$vcsa(&(0x7f0000000740)='/dev/vcsa#\x00', 0x1ff, 0x40) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f00000017c0)={0x4, 0x8, 0x1f, 0x5}, 0x10) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) [ 2074.088788] Invalid option length (1048446) for dns_resolver key [ 2074.105584] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2074.146274] gfs2: can't parse mount arguments 03:21:00 executing program 2: r0 = syz_open_dev$media(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:21:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x1) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000100)=0x2000000000010001) readv(r1, &(0x7f0000000080), 0x108d) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000480)={0x0, 0x10001, 0x0, 0x0, 0xf}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001380)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000280)={'veth1_to_team\x00', 0xad76}) r3 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x2, 0x441) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vfio/vfio\x00', 0x2, 0x0) write$UHID_DESTROY(r4, &(0x7f0000000300), 0x4) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4030ae7b, &(0x7f00000003c0)=0x3) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f00000013c0)={0x0, 0x0, 0x2080}) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000080), 0x0) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000380), &(0x7f0000000400)=0x4) [ 2074.242593] gfs2: statfs_quantum mount option requires a non-negative numeric argument 03:21:00 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7374617466735f7175616e74050000007866666666666666666666666666668981346664"]) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x3e, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x7ff) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c9, &(0x7f0000004f40)={{0x7, 0x400, 0x1, 0x1, 0x0, 0xffffffffffffffbc}, 0x2}) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfb, 0x1000200}, 0xc) [ 2074.313367] gfs2: can't parse mount arguments 03:21:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x00?\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2074.406962] XFS (loop3): Invalid superblock magic number [ 2074.431221] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2074.500740] gfs2: can't parse mount arguments 03:21:01 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) syz_mount_image$ceph(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffff7, 0x6, &(0x7f0000000540)=[{&(0x7f00000000c0)="4f1e491d9692f95acb85c231c0361ef4221268df54748e6925ff310b6f4c714eb27f0e72132e6ff6e0e4e7a27e0c2532bf46ad1dc5ba26cfbf0399329739e1a5a76748df2726e51b2376035255e18fbc1af450ab3f39dee80b56bdb14d7cfd49491a3f8ab7e6f302c822e330236e78892342d14c95a4b18ac63a2d637a28c2c21710c717d78974bfd9", 0x89, 0x1}, {&(0x7f00000001c0)="2427ab083a65040ed7fda112967b3816d9c841860c0a34494adbd5d9c80d7c7fc07624e24dfdd50bfa45a761fc98a4abf4e3a15b1fe889bf52acff97357dac6ef03f235d1a561bf5304fc9c111932e94fa3ef8ce578378c811b56cd545a5f1cc2ee9aa2df54ac3d42541da75c6ad3931c15ca9b6c210fba3f3587ce14baefc44a9948cf7110fe7065fab552500aca8a2b71221401e4d041cc86e2047c73715004d608fb23e5ec969b07529", 0xab, 0x4}, {&(0x7f0000000280)="389d52ae53102464299aa97f8d533f4a4a995acc082745ebbdfc31855d4a11bc282cc4fcde514aaad3650fae6e8d6ee2e66463e8ca4cc556310d811ec9fcc3abff007dca2cd5096292cddeb2fc21e3c510d46efe87a217473a2eca1b1882de012e60645d0111b49398d166180e5c4dad1ac5b90dad2e73ae658dc492674ba95b4670833d589e704bb34b6c9561d399197937f085fe9250a45e7155e684f18b240df161380b88e894f479b4e7798c0709dfca74cf32a7e891786fbbaa65adbd9b764653e55b8e9716086bea342b66d1a06c7af9fb21323a531661c78173a12921a8c569d1b51bf149c448d791d2df2533a9c1128d6e80", 0xf6, 0x200000000}, {&(0x7f0000000380)="04757fbd182ae6f2b5cacc6e61fce7993f91259d4642500c6c9f3a09dc718968e02c5427d4ac081d7e324f7a7f5d799b7da0536503517cb542b181fc200c7c55fa92d2dfaa31adf9af19a651884271c9c4baa49aecd9a2942906bf57a4892ba537fa5419aa191a998f1059d733772fad6d9a43450d687244e64e636258768c37d1abac10755157df89fc3d1c8b8d7ba7dc1434c71ed89dae2d732f5778e3613151c06545d7d6cc76ff282191a91936", 0xaf, 0x2}, {&(0x7f00000007c0)="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", 0x1000, 0x6e7}, {&(0x7f0000000440)="2b1abb5763a7b257feae0382a2d797dfc752c483551b09f265d7648b7fdceec8747a748eadfdbfc693cb371502fa7719cefc3536e43388cf959917d66ef30d489711e24d82f04f941e5cf1789e53520aae51458cf9d9283a9522fc2b48de130d424347fa938ae6c472c35bd6b8d6a998aa3102b3564d421db92842550ae89aa17a1c17ba6d542d5f8625473fe16bcc3bc0a3f487b039863a6de4748de6a88580d99ed285107a5cbaf84e9a6c9b85a03aafceec325aa08689365baefeffcc2924e0ec41a58bb915d7f9db32193b273725cf737db12b2b981cb553dfab4222b656e0ed0ef4fdad78b8a70e2f199bdc", 0xee, 0xde}], 0x2, &(0x7f0000000600)='gfs2\x00') r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='net/udplite6\x00') sendmsg$kcm(r0, &(0x7f0000002ec0)={&(0x7f0000000680)=@llc={0x1a, 0x30f, 0x93, 0x5, 0x2f, 0x340, @random="80e3231ba332"}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000000700)="4e00c0f3e989b53c9b3ba0d7133ef6713a0842302308f693ba91648c3d322b0e8d2d4fd5012e282c1fa2448ac5f58d93752a2ad273c83acf20dc618b3c4e638f025bc0aaa50f80f7f0489ba638ba9a68760867c301664f10e5bac0ff989d31fbd5b45d766bc2a5c7032c08da7a6088b32a597533bdbde7e5f88ab81a26314933", 0x80}, {&(0x7f00000017c0)="de38ee61c1dafc064ab4fe49018079f1dfbb2eba3f954bd554c8edff7c2b5f28182c1dd933e490a99b1f87e0c4c477642577a164b22a18729e27f6ff5d8d3055ab88f069646126d2c325dd5f4b43424764ba586217cdae44d9251e719f91c061e71bcd7352f4da2cb541326e000d1d0e831a27", 0x73}, {&(0x7f0000001840)="e40a4824a48a5e6b23917db69a77e958a3439a63fd9d2d199ed3f64095d26ae38fc7ab8b9a94e991d1bdef8787f721ae76e8c733ef8929bc", 0x38}, {&(0x7f0000001880)="ac990ef07fe32699a5cee8f26adab5a9ae6291ae49956a0f88fb14f65b3970c3a51c284ef3267e80dac0892f018ddfd6b70fafe621c80742f0e8324f57c62dfccabecc531949b901b4a29a1ed52684bd11d1cb292840844ba50cf5bcf6e9422bb5e2860bf2ddaf5d98f61b0329c2cffcc755cf355bad0542a9f54c86a1729e0983f9599ad7d91859d4a5c14ea838044acefd213d50fc9e831983b1f8ab289cf131282a18324e582c64ac6696a7f2404730e37c43030f53d0923bf56b7bc4da9d0f52f342c5728b58e1d94e2354ecc951a6d17de32d46d807f59d5d316c9b3d2d5aea79f826bb7caed91f65068281506735d1", 0xf2}, {&(0x7f0000001980)="65f1157598f37c37e712a51f3ef0c9c761105dd71c485abba80e05ac787871d6e0ad00dc92218af6581d302a9286ac527c8eb4a4f37b62f61b2c5a4c5b58c38a94fd92bfd032c43843be02dfada26a77855444741bf6c07ca79c2e2bf3eaecf65dd37ef74135104900f9f8864ca0ec058acbc099089cf718b794e73a36d977538e84e717325f", 0x86}, {&(0x7f0000001a40)="86d1631766b5ef1cac9ee0daf1223affe90acc28c05cc6dfb492ba5d58eba71d6cc208b5e21ac70917c4b463b73f641e06d5df92e9041539980c2badade61098d2fc75eb22128fd9641cbd91b820caa4dc06bbe886d8d36f0eabdfc29d129bb81240f20a84a8fc9fe500fef5fbea62c246c51dc34edb1ff97fa28c396ba948c9e50abf98e8bd0dcb3e1733e637853d99ce", 0x91}, {&(0x7f0000001b00)="90e5a3f417518f451d5578ca2c292dafb8b056e028d2a466f08cae88d6d4caa27bdf509517f2b141209401c9126df01ec53c525140892d53bac395f5334589d6cf50e0604d8834fe45b3512c9a49c739e36acf1cf7784cdf34a0eafeaaa85a18fbea81709a54bcaefef731897a3a046384cd9ed20f5ea8a162611feb673de012fd887ef75e9d86132949e968fcb4c8997cdaa5", 0x93}, {&(0x7f0000001bc0)="34557c2e122cdb7e94d4de0b5b4c55bcd1aa20ae28a74abcb7669edce1c596310346b0d7a9df949a5245207ebf941c0d120a175a9369ae5f0014825eb2ebc8e350a110464ba003e13d1448d5a59a23fe83afeea612feb378ed47dc81297826e34ef3cf129c891116", 0x68}, {&(0x7f0000001c40)="eccc619bd1532952b3491736dd8066d556582f4cf82bde697142411cd2fbab93e5f72ee71e7002985c28ecb530be449aa29acd44f0121748a3165131483fdf7e4ca14466b52120cff1aaa79b53847aa096b2f0bd25a57d59005b5f3146c140abba4b7d1cd30a6e6a2bf9072fd43be0c54e6710243f473811f5135ee4c6955d260e619c64cf2eda659aa5deed46eb837d740dd23cd3b87dd4a6f1859628a7b385723879fed8a96a65c62f0b2462ca34c0e495270defc56da23866bd8e85f291def26b65adae6363d8bd6830b0f7b1b8fb0f9a6c33fde8032c525a7c", 0xdb}, {&(0x7f0000001d40)}], 0xa, &(0x7f0000001e40)=[{0x40, 0x13f, 0x1, "0fdebc5fd7623bee52c519d4930bd74cf1bac2855191fcd9dfaa6e858601104e6ac5307d59620b491d57251ef1c606"}, {0x1010, 0x117, 0xb8, "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"}, {0x30, 0x100, 0x7fffffff, "8a4d29c24d86d62bfced2df2e0f977ade449e7f5b22c3fad624cf5ba68ceb2b0"}], 0x1080}, 0x4000004) [ 2074.546133] gfs2: invalid mount option: statfs_quant [ 2074.558448] gfs2: can't parse mount arguments 03:21:01 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000100)={0x581a, 0x80000001}) mkdir(&(0x7f0000000700)='./file1\x00', 0x4) r1 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x479, 0x4240, 0x0, 0x2, 0x7, 0xb4, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x3, 0xfff, 0x5af, 0x825, 0x0, 0x800, 0x7ff, 0x2, 0x9, 0x7, 0x20, 0x80, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x3}, 0x12, 0x6, 0x3, 0x0, 0x0, 0x6}, r3, 0x0, r2, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) prctl$PR_SVE_SET_VL(0x32, 0x32dde) chdir(&(0x7f0000000380)='./file0\x00') listxattr(&(0x7f0000000180)='./file1\x00', &(0x7f00000002c0)=""/27, 0x1b) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000000)) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') acct(&(0x7f00000000c0)='./file1\x00') [ 2074.642000] XFS (loop2): Invalid superblock magic number [ 2074.664225] gfs2: invalid mount option: statfs_quant [ 2074.689278] gfs2: can't parse mount arguments 03:21:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x00H\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:21:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(0xffffffffffffffff, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:21:01 executing program 2: r0 = syz_open_dev$media(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2074.733974] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2074.765738] gfs2: can't parse mount arguments 03:21:01 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x3b9, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) [ 2074.847576] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2074.930017] gfs2: can't parse mount arguments 03:21:01 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) 03:21:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x00L\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:21:01 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) r0 = socket$l2tp(0x18, 0x1, 0x1) getpeername(r0, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) [ 2075.209336] gfs2: statfs_quantum mount option requires a non-negative numeric argument 03:21:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000000)=0x80) bind$tipc(r1, &(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x0, 0x3}, 0x3}}, 0x10) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000003000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000008000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 2075.338436] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2075.356434] gfs2: can't parse mount arguments [ 2075.375469] gfs2: can't parse mount arguments [ 2075.404513] XFS (loop2): Invalid superblock magic number [ 2075.433074] overlayfs: './file0' not a directory [ 2075.461862] Process accounting resumed [ 2075.491430] [ 2075.493113] ====================================================== [ 2075.499432] WARNING: possible circular locking dependency detected [ 2075.504348] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2075.505755] 4.19.37 #5 Not tainted [ 2075.505758] ------------------------------------------------------ [ 2075.505765] syz-executor.1/16753 is trying to acquire lock: [ 2075.505770] 000000001a8e1f51 (&ovl_i_mutex_key[depth]){+.+.}, at: ovl_write_iter+0x148/0xc20 [ 2075.505887] 03:21:02 executing program 5: 03:21:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x1, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200, 0x0) ioctl$VIDIOC_G_TUNER(r2, 0xc054561d, &(0x7f0000000080)={0x5, "16b994ce0106baa1a813d7859bf95801b39aa1ef9da7e9e12dac962391e3527c", 0x5, 0x0, 0x7d, 0x9, 0x10, 0x2, 0x4, 0x1}) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000940)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000740)="7fc4846fc45bc6e18801595d7b220cd04ff10302a5afd2337441c828482ec08074", 0x0, 0x0, 0x0, 0x0, 0x0}) mlock(&(0x7f0000dfd000/0x200000)=nil, 0x200000) [ 2075.505887] but task is already holding lock: [ 2075.512419] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2075.515847] 0000000001b14e23 (&acct->lock#2){+.+.}, at: acct_pin_kill+0x27/0x100 [ 2075.515882] [ 2075.515882] which lock already depends on the new lock. [ 2075.515882] [ 2075.515886] [ 2075.515886] the existing dependency chain (in reverse order) is: [ 2075.515888] [ 2075.515888] -> #2 (&acct->lock#2){+.+.}: [ 2075.515931] __mutex_lock+0xf7/0x1300 [ 2075.548338] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2075.552631] mutex_lock_nested+0x16/0x20 [ 2075.552642] acct_pin_kill+0x27/0x100 [ 2075.552660] pin_kill+0x18f/0x860 [ 2075.602674] gfs2: can't parse mount arguments [ 2075.603103] acct_on+0x574/0x790 [ 2075.615478] __x64_sys_acct+0xae/0x200 [ 2075.619920] do_syscall_64+0x103/0x610 [ 2075.624340] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2075.630049] [ 2075.630049] -> #1 (sb_writers#4){.+.+}: [ 2075.635540] __sb_start_write+0x20b/0x360 03:21:02 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='states_quantum=0xfffffffffffd\x00\x00\x00\x00']) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xfff, 0x8000) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x1, r1}) [ 2075.640245] mnt_want_write+0x3f/0xc0 [ 2075.644581] ovl_want_write+0x76/0xa0 [ 2075.648936] ovl_link+0x7c/0x2d5 [ 2075.653073] vfs_link+0x7a4/0xb60 [ 2075.657059] do_linkat+0x550/0x770 [ 2075.661125] __x64_sys_link+0x61/0x80 [ 2075.665509] do_syscall_64+0x103/0x610 [ 2075.670189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2075.675912] [ 2075.675912] -> #0 (&ovl_i_mutex_key[depth]){+.+.}: [ 2075.682943] lock_acquire+0x16f/0x3f0 [ 2075.687273] down_write+0x38/0x90 [ 2075.691268] ovl_write_iter+0x148/0xc20 [ 2075.695764] __vfs_write+0x58e/0x820 [ 2075.700005] __kernel_write+0x110/0x390 [ 2075.704694] do_acct_process+0xd37/0x1150 [ 2075.709447] acct_pin_kill+0x2f/0x100 [ 2075.713771] pin_kill+0x18f/0x860 [ 2075.718012] acct_on+0x574/0x790 [ 2075.721904] __x64_sys_acct+0xae/0x200 [ 2075.726316] do_syscall_64+0x103/0x610 [ 2075.730733] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2075.736444] [ 2075.736444] other info that might help us debug this: [ 2075.736444] [ 2075.744758] Chain exists of: [ 2075.744758] &ovl_i_mutex_key[depth] --> sb_writers#4 --> &acct->lock#2 [ 2075.744758] [ 2075.755971] Possible unsafe locking scenario: [ 2075.755971] [ 2075.762169] CPU0 CPU1 [ 2075.766846] ---- ---- [ 2075.771510] lock(&acct->lock#2); [ 2075.775053] lock(sb_writers#4); [ 2075.781028] lock(&acct->lock#2); [ 2075.787092] lock(&ovl_i_mutex_key[depth]); [ 2075.791514] [ 2075.791514] *** DEADLOCK *** [ 2075.791514] [ 2075.796529] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2075.797583] 4 locks held by syz-executor.1/16753: [ 2075.797586] #0: 00000000c897c1d5 [ 2075.804064] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2075.808870] (acct_on_mutex){+.+.}, at: __x64_sys_acct+0xa6/0x200 [ 2075.808901] #1: 00000000aa1f20c8 (sb_writers#23){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 2075.812795] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2075.821885] #2: 0000000001b14e23 (&acct->lock#2){+.+.}, at: acct_pin_kill+0x27/0x100 [ 2075.821915] #3: 00000000aa1f20c8 ( [ 2075.828237] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2075.836104] sb_writers#23){.+.+}, at: do_acct_process+0xf37/0x1150 [ 2075.836127] [ 2075.836127] stack backtrace: [ 2075.836139] CPU: 1 PID: 16753 Comm: syz-executor.1 Not tainted 4.19.37 #5 [ 2075.836150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2075.843345] kobject: 'loop3' (00000000d74eb69e): kobject_uevent_env [ 2075.850931] Call Trace: [ 2075.850952] dump_stack+0x172/0x1f0 [ 2075.850966] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 2075.850987] __lock_acquire+0x2e6d/0x48f0 [ 2075.851003] ? _raw_spin_unlock_irq+0x28/0x90 [ 2075.854702] kobject: 'loop3' (00000000d74eb69e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2075.864325] ? mark_held_locks+0x100/0x100 [ 2075.864342] ? check_usage_forwards+0x340/0x340 [ 2075.872179] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2075.876208] lock_acquire+0x16f/0x3f0 [ 2075.876223] ? ovl_write_iter+0x148/0xc20 [ 2075.876239] down_write+0x38/0x90 [ 2075.883233] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2075.892520] ? ovl_write_iter+0x148/0xc20 [ 2075.892532] ovl_write_iter+0x148/0xc20 [ 2075.892544] ? __lock_acquire+0x6eb/0x48f0 [ 2075.892560] ? __lock_acquire+0x6eb/0x48f0 [ 2075.899436] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2075.901526] ? ovl_compat_ioctl+0x80/0x80 [ 2075.901546] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2075.905252] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2075.910894] ? iov_iter_init+0xc6/0x1f0 [ 2075.910910] __vfs_write+0x58e/0x820 [ 2076.015709] ? kernel_read+0x120/0x120 [ 2076.019613] ? lock_acquire+0x16f/0x3f0 [ 2076.024296] ? do_acct_process+0xf37/0x1150 [ 2076.028623] __kernel_write+0x110/0x390 [ 2076.032616] do_acct_process+0xd37/0x1150 [ 2076.036863] ? acct_put+0x60/0x60 [ 2076.040334] acct_pin_kill+0x2f/0x100 [ 2076.044149] pin_kill+0x18f/0x860 [ 2076.047611] ? pin_insert+0x60/0x60 [ 2076.051414] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2076.056285] ? finish_wait+0x260/0x260 [ 2076.060189] acct_on+0x574/0x790 [ 2076.063561] __x64_sys_acct+0xae/0x200 [ 2076.067456] do_syscall_64+0x103/0x610 [ 2076.071349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2076.076542] RIP: 0033:0x458da9 [ 2076.079738] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2076.098665] RSP: 002b:00007fd3ddc41c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 [ 2076.106403] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000458da9 [ 2076.113675] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 2076.120951] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2076.128234] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd3ddc426d4 [ 2076.135502] R13: 00000000004becd2 R14: 00000000004cfa50 R15: 00000000ffffffff 03:21:02 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000100)={0x581a, 0x80000001}) mkdir(&(0x7f0000000700)='./file1\x00', 0x4) r1 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x479, 0x4240, 0x0, 0x2, 0x7, 0xb4, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x3, 0xfff, 0x5af, 0x825, 0x0, 0x800, 0x7ff, 0x2, 0x9, 0x7, 0x20, 0x80, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x3}, 0x12, 0x6, 0x3, 0x0, 0x0, 0x6}, r3, 0x0, r2, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) prctl$PR_SVE_SET_VL(0x32, 0x32dde) chdir(&(0x7f0000000380)='./file0\x00') listxattr(&(0x7f0000000180)='./file1\x00', &(0x7f00000002c0)=""/27, 0x1b) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000000)) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') acct(&(0x7f00000000c0)='./file1\x00') 03:21:02 executing program 3: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000480)='\x00', 0x1, 0xfffffffffffffffe) syz_emit_ethernet(0xff64, &(0x7f00000008c0)={@random="4484f92978b8", @empty, [{[{0x9100, 0x9, 0x4, 0x4}], {0x8100, 0x7, 0x1, 0x4}}], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57049", 0x0, "cd98e8"}}}}}}, 0x0) r1 = socket$inet(0x2, 0x80000, 0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xdd49, 0x6e, 0x8, 0xd2, 0x9}, &(0x7f0000000200)=0x14) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000380)='\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x3000000, &(0x7f0000000680)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x6}}, {@nodevmap='nodevmap'}, {@debug={'debug', 0x3d, 0x2}}, {@cache_mmap='cache=mmap'}, {@msize={'msize', 0x3d, 0xfff}}, {@aname={'aname', 0x3d, 'user\x00'}}, {@cache_mmap='cache=mmap'}], [{@uid_eq={'uid', 0x3d, r2}}, {@uid_lt={'uid<', r3}}, {@seclabel='seclabel'}]}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@delneigh={0x40, 0x1d, 0x100, 0x70bd28, 0x25dfdbfe, {0xb198c26fbf07b558, 0x0, 0x0, r5, 0x20, 0x2, 0x5}, [@NDA_DST_IPV4={0x8, 0x1, @broadcast}, @NDA_MASTER={0x8, 0x9, 0x80000001}, @NDA_DST_IPV6={0x14, 0x1, @ipv4={[], [], @multicast1}}]}, 0x40}, 0x1, 0x0, 0x0, 0xaf49329f8a86c8f8}, 0x800) keyctl$update(0x2, r0, &(0x7f0000000000)="e3de3dd0a67de7d463194ff4a669f8aed5", 0x11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(r4, &(0x7f0000000740), &(0x7f00000007c0)=0x6e, 0x80800) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000280)={r0, r6, r0}, &(0x7f00000000c0)=""/83, 0x53, 0x0) 03:21:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x00`\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2076.157069] Process accounting resumed 03:21:02 executing program 2: r0 = syz_open_dev$media(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2076.186333] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2076.198805] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2076.209037] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2076.215595] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2076.225797] kobject: 'loop3' (00000000d74eb69e): kobject_uevent_env 03:21:02 executing program 4: r0 = socket(0x5, 0x5, 0x7) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r1, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf8}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_AF={0x8}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x815}, 0x10) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000300)='./file0/file0\x00', 0x7, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000340)="b26bd818ca8356e9e91cd0896a8e983e6d74be75a935b9cd53c7a600c209b68becd253ddea81c0d59ea36f3c523d6bc1aa4dfd44b60743936918b0cc1a03130fab2564b8e94a33d4c04452ee936ac08f4167c5fbb479c54f0b8f162042e3486c5ceb54e5f832733072bd7c957c3d9fa4d7ec20d09456196bd8bbfd202951907898c142966345b283ea29bd5643bbb5ca0bf35ef892edf6240b0a979208827d9ba88e64f3b561b32e28c19d624b97e4bc8c0e8129f5446ef997a7985ea41051208eccb5bf49f2c8d583d70cea6cf9cbadc48074291361839aa1133e9ef344ccaa386c1ae0", 0xe4, 0x401}, {&(0x7f0000000440)="71a149bd935b7cdce2fe4edd222c0e4a1f0fb8f9cbf55c490b2302edcd5d74475bc0c24c93c2beb94eb4755f1d163f52b013bc05512cf4c5fb9646907f244f6f2043e07b681dd21476a48b33b150d23cb03a8cd06bdcc786fcde2e9c68d102e01262afbcd72e500740207dda07eef9bdcab7e7917a409f4930", 0x79, 0x101}, {&(0x7f00000004c0)="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", 0xfe, 0x6}, {&(0x7f00000005c0)="d502fe73073ab8273cac5beb113fb58a0117d02b0caac323fa17787cda3f799c8ffba548301914fbc3f96b3d38918a4097d352b046215b60fa4de5bafe0017b6be631788351eb2d23ba227d75cb737b7d375725ebac209dbefb93c487ec7a535bcae34797d5df2a2d5e54247522cf73114d98ab82356cbccd0b99ccb9a9fec43d243fe686504e93623a898b49ee2e4d81413417e0cba7c17dab52e43f3283b5ad7e34bd1d2ea26443db73e4610c53624ce67bb6ff9f9627c8657ebe6b448dd02b6d6f549ac4e279924f542f348ac75e5e4c1372e6ff326d755841e27e77b235fadb125612017b55646", 0xe9, 0x5}], 0x0, &(0x7f0000000740)={[{@numtail='nonumtail=0'}, {@uni_xlateno='uni_xlate=0'}, {@utf8no='utf8=0'}, {@uni_xlateno='uni_xlate=0'}]}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7374617466735f7175616e74756d3d3078666666666666666666666666666666648d1bf67f7ab32b011968bedb31c3f1b10871025af60a14143f163a95ed9c5df968e77c87fefd6f25c2c5314082b53896090919aa504b82a3d23612bce171100ee6a6358faee3868503000000000000003b0e8d8a49174b9d15b84bd8adea4891e36bd25c54663bd0ecf625"]) [ 2076.236562] kobject: 'loop3' (00000000d74eb69e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2076.264120] kobject: 'loop0' (00000000d124de11): kobject_uevent_env [ 2076.274876] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env 03:21:02 executing program 3: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000480)='\x00', 0x1, 0xfffffffffffffffe) syz_emit_ethernet(0xff64, &(0x7f00000008c0)={@random="4484f92978b8", @empty, [{[{0x9100, 0x9, 0x4, 0x4}], {0x8100, 0x7, 0x1, 0x4}}], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57049", 0x0, "cd98e8"}}}}}}, 0x0) r1 = socket$inet(0x2, 0x80000, 0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xdd49, 0x6e, 0x8, 0xd2, 0x9}, &(0x7f0000000200)=0x14) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000380)='\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x3000000, &(0x7f0000000680)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x6}}, {@nodevmap='nodevmap'}, {@debug={'debug', 0x3d, 0x2}}, {@cache_mmap='cache=mmap'}, {@msize={'msize', 0x3d, 0xfff}}, {@aname={'aname', 0x3d, 'user\x00'}}, {@cache_mmap='cache=mmap'}], [{@uid_eq={'uid', 0x3d, r2}}, {@uid_lt={'uid<', r3}}, {@seclabel='seclabel'}]}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@delneigh={0x40, 0x1d, 0x100, 0x70bd28, 0x25dfdbfe, {0xb198c26fbf07b558, 0x0, 0x0, r5, 0x20, 0x2, 0x5}, [@NDA_DST_IPV4={0x8, 0x1, @broadcast}, @NDA_MASTER={0x8, 0x9, 0x80000001}, @NDA_DST_IPV6={0x14, 0x1, @ipv4={[], [], @multicast1}}]}, 0x40}, 0x1, 0x0, 0x0, 0xaf49329f8a86c8f8}, 0x800) keyctl$update(0x2, r0, &(0x7f0000000000)="e3de3dd0a67de7d463194ff4a669f8aed5", 0x11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(r4, &(0x7f0000000740), &(0x7f00000007c0)=0x6e, 0x80800) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000280)={r0, r6, r0}, &(0x7f00000000c0)=""/83, 0x53, 0x0) [ 2076.281544] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2076.291798] dns_resolver_preparse: 3 callbacks suppressed [ 2076.291805] Invalid option length (1048446) for dns_resolver key [ 2076.308659] kobject: 'loop0' (00000000d124de11): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2076.335217] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2076.348558] gfs2: invalid mount option: states_quantum=0xfffffffffffd [ 2076.357717] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2076.378098] gfs2: can't parse mount arguments [ 2076.380415] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2076.404249] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2076.408125] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2076.429878] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:21:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x00h\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2076.458729] overlayfs: failed to resolve './file1': -2 [ 2076.465437] kobject: 'loop3' (00000000d74eb69e): kobject_uevent_env [ 2076.473610] kobject: 'loop3' (00000000d74eb69e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2076.494797] kobject: 'loop5' (0000000032774185): kobject_uevent_env 03:21:02 executing program 3: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000480)='\x00', 0x1, 0xfffffffffffffffe) syz_emit_ethernet(0xff64, &(0x7f00000008c0)={@random="4484f92978b8", @empty, [{[{0x9100, 0x9, 0x4, 0x4}], {0x8100, 0x7, 0x1, 0x4}}], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57049", 0x0, "cd98e8"}}}}}}, 0x0) r1 = socket$inet(0x2, 0x80000, 0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xdd49, 0x6e, 0x8, 0xd2, 0x9}, &(0x7f0000000200)=0x14) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000380)='\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x3000000, &(0x7f0000000680)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x6}}, {@nodevmap='nodevmap'}, {@debug={'debug', 0x3d, 0x2}}, {@cache_mmap='cache=mmap'}, {@msize={'msize', 0x3d, 0xfff}}, {@aname={'aname', 0x3d, 'user\x00'}}, {@cache_mmap='cache=mmap'}], [{@uid_eq={'uid', 0x3d, r2}}, {@uid_lt={'uid<', r3}}, {@seclabel='seclabel'}]}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@delneigh={0x40, 0x1d, 0x100, 0x70bd28, 0x25dfdbfe, {0xb198c26fbf07b558, 0x0, 0x0, r5, 0x20, 0x2, 0x5}, [@NDA_DST_IPV4={0x8, 0x1, @broadcast}, @NDA_MASTER={0x8, 0x9, 0x80000001}, @NDA_DST_IPV6={0x14, 0x1, @ipv4={[], [], @multicast1}}]}, 0x40}, 0x1, 0x0, 0x0, 0xaf49329f8a86c8f8}, 0x800) keyctl$update(0x2, r0, &(0x7f0000000000)="e3de3dd0a67de7d463194ff4a669f8aed5", 0x11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(r4, &(0x7f0000000740), &(0x7f00000007c0)=0x6e, 0x80800) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000280)={r0, r6, r0}, &(0x7f00000000c0)=""/83, 0x53, 0x0) [ 2076.507441] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2076.538702] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2076.552195] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2076.594499] kobject: 'loop0' (00000000d124de11): kobject_uevent_env [ 2076.628382] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2076.635100] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:21:03 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000100)={0x581a, 0x80000001}) mkdir(&(0x7f0000000700)='./file1\x00', 0x4) r1 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x3, 0x7, 0x0, 0x0, 0x0, 0x479, 0x4240, 0x0, 0x2, 0x7, 0xb4, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x3, 0xfff, 0x5af, 0x825, 0x0, 0x800, 0x7ff, 0x2, 0x9, 0x7, 0x20, 0x80, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x3}, 0x12, 0x6, 0x3, 0x0, 0x0, 0x6}, r3, 0x0, r2, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) prctl$PR_SVE_SET_VL(0x32, 0x32dde) chdir(&(0x7f0000000380)='./file0\x00') listxattr(&(0x7f0000000180)='./file1\x00', &(0x7f00000002c0)=""/27, 0x1b) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000000)) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') acct(&(0x7f00000000c0)='./file1\x00') [ 2076.655110] Invalid option length (1048446) for dns_resolver key [ 2076.662670] kobject: 'loop0' (00000000d124de11): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2076.674766] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2076.678433] kobject: 'loop3' (00000000d74eb69e): kobject_uevent_env [ 2076.681230] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:21:03 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2076.700168] kobject: 'loop3' (00000000d74eb69e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2076.711146] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2076.720495] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2076.731737] gfs2: invalid mount option: states_quantum=0xfffffffffffd [ 2076.746644] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env 03:21:03 executing program 3: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000480)='\x00', 0x1, 0xfffffffffffffffe) syz_emit_ethernet(0xff64, &(0x7f00000008c0)={@random="4484f92978b8", @empty, [{[{0x9100, 0x9, 0x4, 0x4}], {0x8100, 0x7, 0x1, 0x4}}], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57049", 0x0, "cd98e8"}}}}}}, 0x0) r1 = socket$inet(0x2, 0x80000, 0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xdd49, 0x6e, 0x8, 0xd2, 0x9}, &(0x7f0000000200)=0x14) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000380)='\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x3000000, &(0x7f0000000680)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x6}}, {@nodevmap='nodevmap'}, {@debug={'debug', 0x3d, 0x2}}, {@cache_mmap='cache=mmap'}, {@msize={'msize', 0x3d, 0xfff}}, {@aname={'aname', 0x3d, 'user\x00'}}, {@cache_mmap='cache=mmap'}], [{@uid_eq={'uid', 0x3d, r2}}, {@uid_lt={'uid<', r3}}, {@seclabel='seclabel'}]}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@delneigh={0x40, 0x1d, 0x100, 0x70bd28, 0x25dfdbfe, {0xb198c26fbf07b558, 0x0, 0x0, r5, 0x20, 0x2, 0x5}, [@NDA_DST_IPV4={0x8, 0x1, @broadcast}, @NDA_MASTER={0x8, 0x9, 0x80000001}, @NDA_DST_IPV6={0x14, 0x1, @ipv4={[], [], @multicast1}}]}, 0x40}, 0x1, 0x0, 0x0, 0xaf49329f8a86c8f8}, 0x800) keyctl$update(0x2, r0, &(0x7f0000000000)="e3de3dd0a67de7d463194ff4a669f8aed5", 0x11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(r4, &(0x7f0000000740), &(0x7f00000007c0)=0x6e, 0x80800) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000280)={r0, r6, r0}, &(0x7f00000000c0)=""/83, 0x53, 0x0) [ 2076.749779] gfs2: can't parse mount arguments [ 2076.760499] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2076.773800] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2076.783546] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2076.793114] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2076.804849] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2076.814504] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2076.823010] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2076.833296] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2076.840336] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:21:03 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xfff, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="2edfa0dfa91b1c631966929350443765d5ebf8dd7873c0fd46d660b02bc08ac0817d0ef8c42ff54c44a26490485592e97fd33b1c98adf655f629883c1eff7c9c4e38f667152209033294b2ebaafda58593b92e7e6301dde054c1b3ee442043c81981f8c6c582861eebfc46c40a77a367dc7fc40b3f1b59db57f7e709a7012116dd", 0x81, 0x5}], 0x100000, &(0x7f0000000200)={[{@nosuiddir='nosuiddir'}], [{@subj_user={'subj_user', 0x3d, 'mime_typecgroup'}}, {@subj_type={'subj_type', 0x3d, ']!userself'}}, {@appraise_type='appraise_type=imasig'}]}) 03:21:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x00l\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:21:03 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x400000, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000080)={0x18, 0x0, 0x4, {0xb623}}, 0x18) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7374617466735f7175616e74756d7d00d435a349e7b60600986e29413d307866660d26a9271566e19181b7502cb8351b192bb23477343ea060e6dea4ab409a51a8a23ae113affb388eb261deade58b7fb592c1467d7d634f5d469ac69cc15f1dd8fd67f96f18a97997ae04dc5925f0e759224850d7e89be58b0b4fe807faf55c43f29e18fb055c83e61a001087f26b6d96ae4a46d518938dd02378a6aba34b6f7b0eeb4928a8de935d2b9c6154e5810e654e46fe2ddb652d2add133162a0daef52963004bfe56b60d5f8390c54493a36f7480b68"]) [ 2076.867876] kobject: 'loop3' (00000000d74eb69e): kobject_uevent_env [ 2076.887606] kobject: 'loop3' (00000000d74eb69e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2076.927591] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2076.936787] kobject: 'loop0' (00000000d124de11): kobject_uevent_env [ 2076.943824] Invalid option length (1048446) for dns_resolver key [ 2076.954172] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:21:03 executing program 3: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000480)='\x00', 0x1, 0xfffffffffffffffe) syz_emit_ethernet(0xff64, &(0x7f00000008c0)={@random="4484f92978b8", @empty, [{[{0x9100, 0x9, 0x4, 0x4}], {0x8100, 0x7, 0x1, 0x4}}], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57049", 0x0, "cd98e8"}}}}}}, 0x0) r1 = socket$inet(0x2, 0x80000, 0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xdd49, 0x6e, 0x8, 0xd2, 0x9}, &(0x7f0000000200)=0x14) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000380)='\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x3000000, &(0x7f0000000680)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x6}}, {@nodevmap='nodevmap'}, {@debug={'debug', 0x3d, 0x2}}, {@cache_mmap='cache=mmap'}, {@msize={'msize', 0x3d, 0xfff}}, {@aname={'aname', 0x3d, 'user\x00'}}, {@cache_mmap='cache=mmap'}], [{@uid_eq={'uid', 0x3d, r2}}, {@uid_lt={'uid<', r3}}, {@seclabel='seclabel'}]}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@delneigh={0x40, 0x1d, 0x100, 0x70bd28, 0x25dfdbfe, {0xb198c26fbf07b558, 0x0, 0x0, r5, 0x20, 0x2, 0x5}, [@NDA_DST_IPV4={0x8, 0x1, @broadcast}, @NDA_MASTER={0x8, 0x9, 0x80000001}, @NDA_DST_IPV6={0x14, 0x1, @ipv4={[], [], @multicast1}}]}, 0x40}, 0x1, 0x0, 0x0, 0xaf49329f8a86c8f8}, 0x800) keyctl$update(0x2, r0, &(0x7f0000000000)="e3de3dd0a67de7d463194ff4a669f8aed5", 0x11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(r4, &(0x7f0000000740), &(0x7f00000007c0)=0x6e, 0x80800) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) [ 2076.979760] kobject: 'loop0' (00000000d124de11): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2077.008943] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2077.020482] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env 03:21:03 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:21:03 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='states_quantum=0xfffffffffffd\x00\x00\x00\x00']) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xfff, 0x8000) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x1, r1}) [ 2077.029455] Process accounting resumed [ 2077.031098] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2077.033798] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:21:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x00t\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2077.071389] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2077.082430] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2077.091925] gfs2: invalid mount option: statfs_quantum} [ 2077.100615] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:21:03 executing program 3: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000480)='\x00', 0x1, 0xfffffffffffffffe) syz_emit_ethernet(0xff64, &(0x7f00000008c0)={@random="4484f92978b8", @empty, [{[{0x9100, 0x9, 0x4, 0x4}], {0x8100, 0x7, 0x1, 0x4}}], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57049", 0x0, "cd98e8"}}}}}}, 0x0) r1 = socket$inet(0x2, 0x80000, 0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xdd49, 0x6e, 0x8, 0xd2, 0x9}, &(0x7f0000000200)=0x14) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000380)='\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x3000000, &(0x7f0000000680)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x6}}, {@nodevmap='nodevmap'}, {@debug={'debug', 0x3d, 0x2}}, {@cache_mmap='cache=mmap'}, {@msize={'msize', 0x3d, 0xfff}}, {@aname={'aname', 0x3d, 'user\x00'}}, {@cache_mmap='cache=mmap'}], [{@uid_eq={'uid', 0x3d, r2}}, {@uid_lt={'uid<', r3}}, {@seclabel='seclabel'}]}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@delneigh={0x40, 0x1d, 0x100, 0x70bd28, 0x25dfdbfe, {0xb198c26fbf07b558, 0x0, 0x0, r5, 0x20, 0x2, 0x5}, [@NDA_DST_IPV4={0x8, 0x1, @broadcast}, @NDA_MASTER={0x8, 0x9, 0x80000001}, @NDA_DST_IPV6={0x14, 0x1, @ipv4={[], [], @multicast1}}]}, 0x40}, 0x1, 0x0, 0x0, 0xaf49329f8a86c8f8}, 0x800) keyctl$update(0x2, r0, &(0x7f0000000000)="e3de3dd0a67de7d463194ff4a669f8aed5", 0x11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(r4, &(0x7f0000000740), &(0x7f00000007c0)=0x6e, 0x80800) 03:21:03 executing program 1: r0 = socket(0x5, 0x5, 0x7) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r1, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf8}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_AF={0x8}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x815}, 0x10) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000300)='./file0/file0\x00', 0x7, 0x4, &(0x7f00000006c0)=[{&(0x7f0000000340)="b26bd818ca8356e9e91cd0896a8e983e6d74be75a935b9cd53c7a600c209b68becd253ddea81c0d59ea36f3c523d6bc1aa4dfd44b60743936918b0cc1a03130fab2564b8e94a33d4c04452ee936ac08f4167c5fbb479c54f0b8f162042e3486c5ceb54e5f832733072bd7c957c3d9fa4d7ec20d09456196bd8bbfd202951907898c142966345b283ea29bd5643bbb5ca0bf35ef892edf6240b0a979208827d9ba88e64f3b561b32e28c19d624b97e4bc8c0e8129f5446ef997a7985ea41051208eccb5bf49f2c8d583d70cea6cf9cbadc48074291361839aa1133e9ef344ccaa386c1ae0", 0xe4, 0x401}, {&(0x7f0000000440)="71a149bd935b7cdce2fe4edd222c0e4a1f0fb8f9cbf55c490b2302edcd5d74475bc0c24c93c2beb94eb4755f1d163f52b013bc05512cf4c5fb9646907f244f6f2043e07b681dd21476a48b33b150d23cb03a8cd06bdcc786fcde2e9c68d102e01262afbcd72e500740207dda07eef9bdcab7e7917a409f4930", 0x79, 0x101}, {&(0x7f00000004c0)="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", 0xfe, 0x6}, {&(0x7f00000005c0)="d502fe73073ab8273cac5beb113fb58a0117d02b0caac323fa17787cda3f799c8ffba548301914fbc3f96b3d38918a4097d352b046215b60fa4de5bafe0017b6be631788351eb2d23ba227d75cb737b7d375725ebac209dbefb93c487ec7a535bcae34797d5df2a2d5e54247522cf73114d98ab82356cbccd0b99ccb9a9fec43d243fe686504e93623a898b49ee2e4d81413417e0cba7c17dab52e43f3283b5ad7e34bd1d2ea26443db73e4610c53624ce67bb6ff9f9627c8657ebe6b448dd02b6d6f549ac4e279924f542f348ac75e5e4c1372e6ff326d755841e27e77b235fadb125612017b55646", 0xe9, 0x5}], 0x0, &(0x7f0000000740)={[{@numtail='nonumtail=0'}, {@uni_xlateno='uni_xlate=0'}, {@utf8no='utf8=0'}, {@uni_xlateno='uni_xlate=0'}]}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7374617466735f7175616e74756d3d3078666666666666666666666666666666648d1bf67f7ab32b011968bedb31c3f1b10871025af60a14143f163a95ed9c5df968e77c87fefd6f25c2c5314082b53896090919aa504b82a3d23612bce171100ee6a6358faee3868503000000000000003b0e8d8a49174b9d15b84bd8adea4891e36bd25c54663bd0ecf625"]) [ 2077.115470] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2077.122482] gfs2: can't parse mount arguments [ 2077.131162] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2077.139430] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2077.154988] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2077.161475] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2077.178770] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2077.193620] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2077.204384] kobject: 'loop3' (00000000d74eb69e): kobject_uevent_env [ 2077.211454] kobject: 'loop3' (00000000d74eb69e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2077.214692] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env 03:21:03 executing program 1: r0 = syz_open_dev$media(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2077.222035] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2077.234209] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2077.234233] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2077.253303] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2077.255778] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2077.270579] Invalid option length (1048446) for dns_resolver key 03:21:03 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2077.278895] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2077.284007] gfs2: can't parse mount arguments [ 2077.289881] kobject: 'loop0' (00000000d124de11): kobject_uevent_env [ 2077.300768] kobject: 'loop0' (00000000d124de11): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2077.312643] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2077.319682] kobject: 'loop3' (00000000d74eb69e): kobject_uevent_env 03:21:03 executing program 1: r0 = socket$kcm(0x2, 0x2, 0x73) ioctl$sock_TIOCOUTQ(r0, 0x541b, &(0x7f0000000080)) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000040)=0x1c, 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x5, @mcast1, 0x4}, @in6={0xa, 0x10000, 0x0, @mcast2, 0x5}], 0x38) [ 2077.335034] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2077.353928] kobject: 'loop3' (00000000d74eb69e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2077.371533] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2077.378683] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2077.390578] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2077.397587] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2077.407667] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2077.414482] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2077.424229] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2077.431006] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2077.474696] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2077.481314] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2077.527126] kobject: 'loop0' (00000000d124de11): kobject_uevent_env [ 2077.533617] kobject: 'loop0' (00000000d124de11): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2077.545295] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2077.552044] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2077.559317] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2077.562286] kobject: 'loop3' (00000000d74eb69e): kobject_uevent_env [ 2077.570807] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2077.574529] kobject: 'loop3' (00000000d74eb69e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2077.594161] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2077.600875] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2077.610844] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2077.617491] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2077.627551] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2077.634096] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2077.634717] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2077.650426] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:21:04 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7374617466735f7175616e74756d3d307866666666666666666666666666666664f707bbb4d689d4806a7bdc1b9fdb4cdcb086871fe03cd28c8efc8a6547889dc4733ff30859b29f5a0a1402c739c7cf179ec13477068dd0ca7ae7fc1c8a5cc86c5ca9"]) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x2, 0x600800) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000100)=0xe, 0x4) 03:21:04 executing program 3: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000480)='\x00', 0x1, 0xfffffffffffffffe) syz_emit_ethernet(0xff64, &(0x7f00000008c0)={@random="4484f92978b8", @empty, [{[{0x9100, 0x9, 0x4, 0x4}], {0x8100, 0x7, 0x1, 0x4}}], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57049", 0x0, "cd98e8"}}}}}}, 0x0) r1 = socket$inet(0x2, 0x80000, 0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xdd49, 0x6e, 0x8, 0xd2, 0x9}, &(0x7f0000000200)=0x14) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000380)='\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x3000000, &(0x7f0000000680)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x6}}, {@nodevmap='nodevmap'}, {@debug={'debug', 0x3d, 0x2}}, {@cache_mmap='cache=mmap'}, {@msize={'msize', 0x3d, 0xfff}}, {@aname={'aname', 0x3d, 'user\x00'}}, {@cache_mmap='cache=mmap'}], [{@uid_eq={'uid', 0x3d, r2}}, {@uid_lt={'uid<', r3}}, {@seclabel='seclabel'}]}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@delneigh={0x40, 0x1d, 0x100, 0x70bd28, 0x25dfdbfe, {0xb198c26fbf07b558, 0x0, 0x0, r5, 0x20, 0x2, 0x5}, [@NDA_DST_IPV4={0x8, 0x1, @broadcast}, @NDA_MASTER={0x8, 0x9, 0x80000001}, @NDA_DST_IPV6={0x14, 0x1, @ipv4={[], [], @multicast1}}]}, 0x40}, 0x1, 0x0, 0x0, 0xaf49329f8a86c8f8}, 0x800) keyctl$update(0x2, r0, &(0x7f0000000000)="e3de3dd0a67de7d463194ff4a669f8aed5", 0x11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:21:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\x00z\x00'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:21:04 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f00000000c0)=ANY=[@ANYRESDEC]) 03:21:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="b1c4bd00ff513c8011a2293e770a7a8363f96214d16bf5a75e278bac6cd71b546890da68737da3a42230ddbc417bdd45f133f946532e80ac5d20aa", 0x3b, 0xfffffffffffffff9) getresuid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000380)) getresgid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$VIDIOC_G_EDID(r3, 0xc0285628, &(0x7f0000000400)={0x0, 0x800, 0xcd3, [], &(0x7f00000003c0)=0xfffffffffffff86b}) keyctl$chown(0x4, r0, r1, r2) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="b7000000000000003d36391000f6b11b2ae99439d082000000006800ec0000000003e162cbf14c91d0022d4c2cbebfa0764acfadf8a1dde2f01af176f8ef1b939cd803afc242bba8abeab762e311a7abb308000000000000006abd54673ccb204142d249017f32ada1077859bb2fe3ccac92855f950a49ba5b0bf2e510ef26189cee4f2f3426cc047e90d97ab243c6f6963953136a38b9559906b3d8bb2291eee15d63665c6d8451040a5b2ef7d9bc05cc20b8d48c085fa4b274287ba425f6d66bee8a0600000000000000554eb44c673a40d60d2b2bf9aeec00"], &(0x7f0000000180)='syzkaller\x00'}, 0x48) 03:21:04 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2077.699493] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2077.706131] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2077.737719] kobject: 'loop2' (00000000b2658362): kobject_uevent_env 03:21:04 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xfff, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="2edfa0dfa91b1c631966929350443765d5ebf8dd7873c0fd46d660b02bc08ac0817d0ef8c42ff54c44a26490485592e97fd33b1c98adf655f629883c1eff7c9c4e38f667152209033294b2ebaafda58593b92e7e6301dde054c1b3ee442043c81981f8c6c582861eebfc46c40a77a367dc7fc40b3f1b59db57f7e709a7012116dd", 0x81, 0x5}], 0x100000, &(0x7f0000000200)={[{@nosuiddir='nosuiddir'}], [{@subj_user={'subj_user', 0x3d, 'mime_typecgroup'}}, {@subj_type={'subj_type', 0x3d, ']!userself'}}, {@appraise_type='appraise_type=imasig'}]}) [ 2077.744390] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2077.744567] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2077.767476] Invalid option length (1048446) for dns_resolver key [ 2077.789382] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:21:04 executing program 3: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000480)='\x00', 0x1, 0xfffffffffffffffe) syz_emit_ethernet(0xff64, &(0x7f00000008c0)={@random="4484f92978b8", @empty, [{[{0x9100, 0x9, 0x4, 0x4}], {0x8100, 0x7, 0x1, 0x4}}], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57049", 0x0, "cd98e8"}}}}}}, 0x0) r1 = socket$inet(0x2, 0x80000, 0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xdd49, 0x6e, 0x8, 0xd2, 0x9}, &(0x7f0000000200)=0x14) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000380)='\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x3000000, &(0x7f0000000680)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x6}}, {@nodevmap='nodevmap'}, {@debug={'debug', 0x3d, 0x2}}, {@cache_mmap='cache=mmap'}, {@msize={'msize', 0x3d, 0xfff}}, {@aname={'aname', 0x3d, 'user\x00'}}, {@cache_mmap='cache=mmap'}], [{@uid_eq={'uid', 0x3d, r2}}, {@uid_lt={'uid<', r3}}, {@seclabel='seclabel'}]}}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@delneigh={0x40, 0x1d, 0x100, 0x70bd28, 0x25dfdbfe, {0xb198c26fbf07b558, 0x0, 0x0, r5, 0x20, 0x2, 0x5}, [@NDA_DST_IPV4={0x8, 0x1, @broadcast}, @NDA_MASTER={0x8, 0x9, 0x80000001}, @NDA_DST_IPV6={0x14, 0x1, @ipv4={[], [], @multicast1}}]}, 0x40}, 0x1, 0x0, 0x0, 0xaf49329f8a86c8f8}, 0x800) keyctl$update(0x2, r0, &(0x7f0000000000)="e3de3dd0a67de7d463194ff4a669f8aed5", 0x11) 03:21:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'kkk'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2077.827642] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2077.834130] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:21:04 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xfff, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="2edfa0dfa91b1c631966929350443765d5ebf8dd7873c0fd46d660b02bc08ac0817d0ef8c42ff54c44a26490485592e97fd33b1c98adf655f629883c1eff7c9c4e38f667152209033294b2ebaafda58593b92e7e6301dde054c1b3ee442043c81981f8c6c582861eebfc46c40a77a367dc7fc40b3f1b59db57f7e709a7012116dd", 0x81, 0x5}], 0x100000, &(0x7f0000000200)={[{@nosuiddir='nosuiddir'}], [{@subj_user={'subj_user', 0x3d, 'mime_typecgroup'}}, {@subj_type={'subj_type', 0x3d, ']!userself'}}, {@appraise_type='appraise_type=imasig'}]}) [ 2077.885042] gfs2: invalid mount option: 18446744073709551615 [ 2077.890982] gfs2: can't parse mount arguments [ 2077.891350] kobject: 'loop3' (00000000d74eb69e): kobject_uevent_env [ 2077.913648] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2077.920322] kobject: 'loop3' (00000000d74eb69e): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:21:04 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xfff, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="2edfa0dfa91b1c631966929350443765d5ebf8dd7873c0fd46d660b02bc08ac0817d0ef8c42ff54c44a26490485592e97fd33b1c98adf655f629883c1eff7c9c4e38f667152209033294b2ebaafda58593b92e7e6301dde054c1b3ee442043c81981f8c6c582861eebfc46c40a77a367dc7fc40b3f1b59db57f7e709a7012116dd", 0x81, 0x5}], 0x100000, &(0x7f0000000200)={[{@nosuiddir='nosuiddir'}], [{@subj_user={'subj_user', 0x3d, 'mime_typecgroup'}}, {@subj_type={'subj_type', 0x3d, ']!userself'}}, {@appraise_type='appraise_type=imasig'}]}) 03:21:04 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 2077.927857] Invalid option length (1048446) for dns_resolver key [ 2077.933505] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2077.952820] kobject: 'loop0' (00000000d124de11): kobject_uevent_env [ 2077.960581] kobject: 'loop0' (00000000d124de11): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2077.989280] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2077.998712] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2077.999645] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2078.013617] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2078.025464] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2078.032188] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2078.042235] gfs2: invalid mount option: statfs_quantum=0xfffffffffffffffd÷»´Ö‰Ô€j{ÜŸÛLÜ°†‡à<ÒŒŽüŠeGˆÄs?óY²ŸZ [ 2078.042235] Ç9ÇÏžÁ4wÐÊzçüŠ\Èl\© [ 2078.054795] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2078.058679] gfs2: can't parse mount arguments [ 2078.063127] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2078.068533] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2078.076284] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2078.084170] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2078.099752] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2078.100068] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2078.110214] kobject: 'loop0' (00000000d124de11): kobject_uevent_env [ 2078.122927] kobject: 'loop0' (00000000d124de11): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2078.125569] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2078.133178] kobject: 'loop3' (00000000d74eb69e): kobject_uevent_env [ 2078.148601] kobject: 'loop3' (00000000d74eb69e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2078.158485] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2078.165192] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2078.175933] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2078.176666] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2078.182395] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2078.201593] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2078.425433] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2078.434075] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2078.454721] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2078.461205] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2078.471443] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2078.478229] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2078.488465] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2078.495056] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2078.517288] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2078.523762] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2078.534415] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2078.540952] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:21:05 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7374617466735f7175626e74756d3d307866666666666666666666666666666664e61bc8325601b4979f1be7dc02ce370c665ae46c763eb012ce3f91141941bea7e80b2c5dc9616545b96668"]) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/checkreqprot\x00', 0x1, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20\x00', 0x10100, 0x0) pwrite64(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0xffffffff, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000500)={r1, 0xffffffffffff1825}) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffffffffffff, 0x1000}, 0xc) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0xf8, 0x7, 0x42d3, "c07554a38b9f23df92c8e00c131b1cf0", "f0bad7bf830585d2d6c686c1c5ca34559fcd4cea0d7a751e11b60c50ee732569dac584e2b6aecdbadfe74dfdd0fb32064603b2964c5d32af1e4a416889902fa2ac914d499765df785001b8c5b86135ca98a728026cd1b0e5dfa87f578ea73a8e4842282c04d5e79f14b0804047c370fae66efff9966a67ed481b9fcb7a8328a5ecd51fb9b4a9b2876981281ca9bfea9e3e3afe28ebcbdee486216d35a6190e08b7b1df5729db685a11c7fb3b5ca6290fdbcef867612911e8555e5654df602386519d83453502b69ed60b3697a0315ca1307feca26ee17529723ec45cbc6ee1106e33f0"}, 0xf8, 0x3) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000140)) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xbeea, 0x40000) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/member\x00', 0x2, 0x0) ioctl$BLKFLSBUF(r3, 0x1261, &(0x7f00000000c0)=0x7) ioctl$BLKIOOPT(r3, 0x1279, &(0x7f0000000080)) accept$unix(r3, &(0x7f0000000240), &(0x7f00000002c0)=0x6e) 03:21:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'\xff\xff\xfe'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:21:05 executing program 3: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000480)='\x00', 0x1, 0xfffffffffffffffe) syz_emit_ethernet(0xff64, &(0x7f00000008c0)={@random="4484f92978b8", @empty, [{[{0x9100, 0x9, 0x4, 0x4}], {0x8100, 0x7, 0x1, 0x4}}], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57049", 0x0, "cd98e8"}}}}}}, 0x0) r0 = socket$inet(0x2, 0x80000, 0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xdd49, 0x6e, 0x8, 0xd2, 0x9}, &(0x7f0000000200)=0x14) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000380)='\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x3000000, &(0x7f0000000680)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x6}}, {@nodevmap='nodevmap'}, {@debug={'debug', 0x3d, 0x2}}, {@cache_mmap='cache=mmap'}, {@msize={'msize', 0x3d, 0xfff}}, {@aname={'aname', 0x3d, 'user\x00'}}, {@cache_mmap='cache=mmap'}], [{@uid_eq={'uid', 0x3d, r1}}, {@uid_lt={'uid<', r2}}, {@seclabel='seclabel'}]}}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@delneigh={0x40, 0x1d, 0x100, 0x70bd28, 0x25dfdbfe, {0xb198c26fbf07b558, 0x0, 0x0, r4, 0x20, 0x2, 0x5}, [@NDA_DST_IPV4={0x8, 0x1, @broadcast}, @NDA_MASTER={0x8, 0x9, 0x80000001}, @NDA_DST_IPV6={0x14, 0x1, @ipv4={[], [], @multicast1}}]}, 0x40}, 0x1, 0x0, 0x0, 0xaf49329f8a86c8f8}, 0x800) 03:21:05 executing program 1: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xfff, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="2edfa0dfa91b1c631966929350443765d5ebf8dd7873c0fd46d660b02bc08ac0817d0ef8c42ff54c44a26490485592e97fd33b1c98adf655f629883c1eff7c9c4e38f667152209033294b2ebaafda58593b92e7e6301dde054c1b3ee442043c81981f8c6c582861eebfc46c40a77a367dc7fc40b3f1b59db57f7e709a7012116dd", 0x81, 0x5}], 0x100000, &(0x7f0000000200)={[{@nosuiddir='nosuiddir'}], [{@subj_user={'subj_user', 0x3d, 'mime_typecgroup'}}, {@subj_type={'subj_type', 0x3d, ']!userself'}}, {@appraise_type='appraise_type=imasig'}]}) 03:21:05 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:21:05 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/210, 0x106e, 0xd2}, 0x20) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x10000, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000200)) [ 2078.655792] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2078.662696] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2078.683463] Invalid option length (1048446) for dns_resolver key [ 2078.693842] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env 03:21:05 executing program 1: syz_mount_image$gfs2(0x0, &(0x7f0000000080)='./file0\x00', 0xfff, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="2edfa0dfa91b1c631966929350443765d5ebf8dd7873c0fd46d660b02bc08ac0817d0ef8c42ff54c44a26490485592e97fd33b1c98adf655f629883c1eff7c9c4e38f667152209033294b2ebaafda58593b92e7e6301dde054c1b3ee442043c81981f8c6c582861eebfc46c40a77a367dc7fc40b3f1b59db57f7e709a7012116dd", 0x81, 0x5}], 0x100000, &(0x7f0000000200)={[{@nosuiddir='nosuiddir'}], [{@subj_user={'subj_user', 0x3d, 'mime_typecgroup'}}, {@subj_type={'subj_type', 0x3d, ']!userself'}}, {@appraise_type='appraise_type=imasig'}]}) 03:21:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2078.714675] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2078.747745] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2078.755570] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:21:05 executing program 3: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000480)='\x00', 0x1, 0xfffffffffffffffe) syz_emit_ethernet(0xff64, &(0x7f00000008c0)={@random="4484f92978b8", @empty, [{[{0x9100, 0x9, 0x4, 0x4}], {0x8100, 0x7, 0x1, 0x4}}], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57049", 0x0, "cd98e8"}}}}}}, 0x0) r0 = socket$inet(0x2, 0x80000, 0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xdd49, 0x6e, 0x8, 0xd2, 0x9}, &(0x7f0000000200)=0x14) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000380)='\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x3000000, &(0x7f0000000680)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x6}}, {@nodevmap='nodevmap'}, {@debug={'debug', 0x3d, 0x2}}, {@cache_mmap='cache=mmap'}, {@msize={'msize', 0x3d, 0xfff}}, {@aname={'aname', 0x3d, 'user\x00'}}, {@cache_mmap='cache=mmap'}], [{@uid_eq={'uid', 0x3d, r1}}, {@uid_lt={'uid<', r2}}, {@seclabel='seclabel'}]}}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'vcan0\x00'}) [ 2078.784761] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2078.803985] kobject: 'loop0' (00000000d124de11): kobject_uevent_env [ 2078.810547] kobject: 'loop0' (00000000d124de11): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2078.824514] gfs2: can't parse mount arguments 03:21:05 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:21:05 executing program 1: syz_mount_image$gfs2(0x0, 0x0, 0xfff, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="2edfa0dfa91b1c631966929350443765d5ebf8dd7873c0fd46d660b02bc08ac0817d0ef8c42ff54c44a26490485592e97fd33b1c98adf655f629883c1eff7c9c4e38f667152209033294b2ebaafda58593b92e7e6301dde054c1b3ee442043c81981f8c6c582861eebfc46c40a77a367dc7fc40b3f1b59db57f7e709a7012116dd", 0x81, 0x5}], 0x100000, &(0x7f0000000200)={[{@nosuiddir='nosuiddir'}], [{@subj_user={'subj_user', 0x3d, 'mime_typecgroup'}}, {@subj_type={'subj_type', 0x3d, ']!userself'}}, {@appraise_type='appraise_type=imasig'}]}) [ 2078.829740] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2078.836619] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2078.840773] Invalid option length (1048446) for dns_resolver key [ 2078.846752] kobject: 'loop3' (00000000d74eb69e): kobject_uevent_env [ 2078.859492] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2078.866165] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2078.879694] kobject: 'loop3' (00000000d74eb69e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2078.889811] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2078.907311] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2078.912870] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2078.924004] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:21:05 executing program 1: syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="2edfa0dfa91b1c631966929350443765d5ebf8dd7873c0fd46d660b02bc08ac0817d0ef8c42ff54c44a26490485592e97fd33b1c98adf655f629883c1eff7c9c4e38f667152209033294b2ebaafda58593b92e7e6301dde054c1b3ee442043c81981f8c6c582861eebfc46c40a77a367dc7fc40b3f1b59db57f7e709a7012116dd", 0x81, 0x5}], 0x100000, &(0x7f0000000200)={[{@nosuiddir='nosuiddir'}], [{@subj_user={'subj_user', 0x3d, 'mime_typecgroup'}}, {@subj_type={'subj_type', 0x3d, ']!userself'}}, {@appraise_type='appraise_type=imasig'}]}) [ 2078.935814] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2078.938160] gfs2: invalid mount option: statfs_qubntum=0xfffffffffffffffdæÈ2V´—ŸçÜÎ7 fZälv>°Î?‘A¾§è [ 2078.942656] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2078.980821] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2078.985152] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2078.989186] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2078.998300] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2079.008321] gfs2: can't parse mount arguments [ 2079.014318] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2079.029576] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2079.040857] kobject: 'loop3' (00000000d74eb69e): kobject_uevent_env [ 2079.047559] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2079.048490] kobject: 'loop3' (00000000d74eb69e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2079.054031] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2079.055369] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2079.066959] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2079.073772] gfs2: can't parse mount arguments [ 2079.081946] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2079.092382] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2079.102268] kobject: 'loop0' (00000000d124de11): kobject_uevent_env [ 2079.111022] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2079.114987] kobject: 'loop0' (00000000d124de11): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2079.134841] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2079.141457] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2079.152395] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2079.159964] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2079.175501] gfs2: invalid mount option: statfs_qubntum=0xfffffffffffffffdæÈ2V´—ŸçÜÎ7 fZälv>°Î?‘A¾§è [ 2079.189216] gfs2: can't parse mount arguments 03:21:05 executing program 5: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) get_robust_list(r0, &(0x7f00000001c0)=&(0x7f0000000140)={&(0x7f0000000080)={&(0x7f0000000040)}, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)}}, &(0x7f0000000200)=0x18) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='statfs_quantum=0xfffffffffffffffd']) 03:21:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:21:05 executing program 3: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000480)='\x00', 0x1, 0xfffffffffffffffe) syz_emit_ethernet(0xff64, &(0x7f00000008c0)={@random="4484f92978b8", @empty, [{[{0x9100, 0x9, 0x4, 0x4}], {0x8100, 0x7, 0x1, 0x4}}], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57049", 0x0, "cd98e8"}}}}}}, 0x0) r0 = socket$inet(0x2, 0x80000, 0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xdd49, 0x6e, 0x8, 0xd2, 0x9}, &(0x7f0000000200)=0x14) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000380)='\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x3000000, &(0x7f0000000680)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x6}}, {@nodevmap='nodevmap'}, {@debug={'debug', 0x3d, 0x2}}, {@cache_mmap='cache=mmap'}, {@msize={'msize', 0x3d, 0xfff}}, {@aname={'aname', 0x3d, 'user\x00'}}, {@cache_mmap='cache=mmap'}], [{@uid_eq={'uid', 0x3d, r1}}, {@uid_lt={'uid<', r2}}, {@seclabel='seclabel'}]}}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) 03:21:05 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:21:05 executing program 1: syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000200)={[{@nosuiddir='nosuiddir'}], [{@subj_user={'subj_user', 0x3d, 'mime_typecgroup'}}, {@subj_type={'subj_type', 0x3d, ']!userself'}}, {@appraise_type='appraise_type=imasig'}]}) 03:21:05 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="7374617466735f717f616e74756d3d347866666666666666666666666666666664"]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x10001, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r1}) [ 2079.224806] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2079.231575] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2079.241866] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2079.248428] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:21:05 executing program 1: syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000200)={[{@nosuiddir='nosuiddir'}], [{@subj_user={'subj_user', 0x3d, 'mime_typecgroup'}}, {@subj_type={'subj_type', 0x3d, ']!userself'}}, {@appraise_type='appraise_type=imasig'}]}) [ 2079.322825] Invalid option length (1048446) for dns_resolver key [ 2079.329349] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2079.338061] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:21:05 executing program 1: syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000200)={[{@nosuiddir='nosuiddir'}], [{@subj_user={'subj_user', 0x3d, 'mime_typecgroup'}}, {@subj_type={'subj_type', 0x3d, ']!userself'}}, {@appraise_type='appraise_type=imasig'}]}) [ 2079.364848] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2079.379604] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2079.397145] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:21:05 executing program 3: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000480)='\x00', 0x1, 0xfffffffffffffffe) syz_emit_ethernet(0xff64, &(0x7f00000008c0)={@random="4484f92978b8", @empty, [{[{0x9100, 0x9, 0x4, 0x4}], {0x8100, 0x7, 0x1, 0x4}}], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57049", 0x0, "cd98e8"}}}}}}, 0x0) r0 = socket$inet(0x2, 0x80000, 0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xdd49, 0x6e, 0x8, 0xd2, 0x9}, &(0x7f0000000200)=0x14) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000380)='\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x3000000, &(0x7f0000000680)={'trans=virtio,', {[{@debug={'debug', 0x3d, 0x6}}, {@nodevmap='nodevmap'}, {@debug={'debug', 0x3d, 0x2}}, {@cache_mmap='cache=mmap'}, {@msize={'msize', 0x3d, 0xfff}}, {@aname={'aname', 0x3d, 'user\x00'}}, {@cache_mmap='cache=mmap'}], [{@uid_eq={'uid', 0x3d, r1}}, {@uid_lt={'uid<', r2}}, {@seclabel='seclabel'}]}}) 03:21:05 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:21:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) [ 2079.406619] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:21:05 executing program 1: syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@nosuiddir='nosuiddir'}], [{@subj_user={'subj_user', 0x3d, 'mime_typecgroup'}}, {@subj_type={'subj_type', 0x3d, ']!userself'}}, {@appraise_type='appraise_type=imasig'}]}) [ 2079.438284] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2079.445618] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2079.452914] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2079.469302] gfs2: invalid mount option: statfs_qantum=4xfffffffffffffffd [ 2079.476430] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2079.484510] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2079.493729] gfs2: can't parse mount arguments [ 2079.512339] Invalid option length (1048446) for dns_resolver key [ 2079.514168] kobject: 'loop3' (00000000d74eb69e): kobject_uevent_env [ 2079.525272] gfs2: can't parse mount arguments [ 2079.540674] kobject: 'loop3' (00000000d74eb69e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2079.556638] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2079.563134] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2079.573376] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2079.582460] kobject: 'loop0' (00000000d124de11): kobject_uevent_env [ 2079.585581] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2079.589956] kobject: 'loop0' (00000000d124de11): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2079.621846] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2079.628362] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2079.635030] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2079.647811] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2079.658294] kobject: 'loop3' (00000000d74eb69e): kobject_uevent_env [ 2079.664904] kobject: 'loop3' (00000000d74eb69e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2079.667556] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2079.674893] kobject: 'loop0' (00000000d124de11): kobject_uevent_env [ 2079.681423] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2079.687394] kobject: 'loop0' (00000000d124de11): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2079.687825] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2079.700395] gfs2: invalid mount option: statfs_qantum=4xfffffffffffffffd [ 2079.706484] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2079.706908] kobject: 'loop2' (00000000b2658362): kobject_uevent_env [ 2079.718906] gfs2: can't parse mount arguments [ 2079.720626] kobject: 'loop2' (00000000b2658362): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2079.730266] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2079.736452] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2079.743206] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2079.750059] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2079.782536] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2079.789091] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2079.798986] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2079.805693] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2079.814390] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 2079.826361] gfs2: can't parse mount arguments [ 2079.866702] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2079.873204] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:21:06 executing program 5: r0 = socket(0xf, 0x0, 0x401) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') connect$llc(r0, &(0x7f0000000140)={0x1a, 0x31f, 0x1ff, 0x1ff, 0xdc, 0x6, @random="e1d4174a1197"}, 0x10) setsockopt$inet_dccp_int(r0, 0x21, 0xf, &(0x7f0000000300)=0x5, 0x4) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x120, r1, 0xaa7ba029956a687c, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5d2fbc80}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x25}}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000000}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x52e6e946}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1ff}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x200400d0}, 0x40040) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[]) 03:21:06 executing program 3: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f0000000480)='\x00', 0x1, 0xfffffffffffffffe) syz_emit_ethernet(0xff64, &(0x7f00000008c0)={@random="4484f92978b8", @empty, [{[{0x9100, 0x9, 0x4, 0x4}], {0x8100, 0x7, 0x1, 0x4}}], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57049", 0x0, "cd98e8"}}}}}}, 0x0) r0 = socket$inet(0x2, 0x80000, 0x1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xdd49, 0x6e, 0x8, 0xd2, 0x9}, &(0x7f0000000200)=0x14) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) fstat(r0, &(0x7f0000000600)) 03:21:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) 03:21:06 executing program 1: syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@nosuiddir='nosuiddir'}], [{@subj_user={'subj_user', 0x3d, 'mime_typecgroup'}}, {@subj_type={'subj_type', 0x3d, ']!userself'}}, {@appraise_type='appraise_type=imasig'}]}) 03:21:06 executing program 2: r0 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'syz_tun\x00', {0x2, 0x0, @loopback}}) syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x76) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020425bd7000fddbdf2502000000080002b488f3b80014000100fe88000000000000000000000000010114000100eb64f56b053dfa67a03cc179a01e4f281400010000000000000000000000000000008000"], 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x8014) bind$inet(0xffffffffffffffff, 0x0, 0x0) recvfrom$netrom(r0, &(0x7f0000000400)=""/143, 0x8f, 0x0, &(0x7f0000000500)={{0x3, @default, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000100)={0x6, 0x2}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x1, 0x2, 0x7, 0x66, 0x0, 0x0, 0x9, 0xc, 0x641, 0x5], 0xa, 0x3, 0x400, 0x20, 0x8000, 0x8000, {0xcf, 0x7, 0x5, 0x100, 0x3, 0x7, 0xffffffff, 0x2, 0x2751, 0x0, 0x2, 0x0, 0x7, 0x8, "e73e60a84f09e99485f10a81fe795008efb679e306b9aee4f049fb72e048bbf7"}}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000580)={0x10, 0x0, 0x6}, 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:21:06 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="7374617466735f717561ff0700003d307866666666666666666666666666640000"]) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) [ 2080.129276] kobject: 'loop4' (00000000a23b1a34): kobject_uevent_env [ 2080.135836] kobject: 'loop4' (00000000a23b1a34): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:21:06 executing program 1: syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@nosuiddir='nosuiddir'}], [{@subj_user={'subj_user', 0x3d, 'mime_typecgroup'}}, {@subj_type={'subj_type', 0x3d, ']!userself'}}, {@appraise_type='appraise_type=imasig'}]}) [ 2080.180162] kobject: 'loop5' (0000000032774185): kobject_uevent_env [ 2080.201809] kobject: 'loop5' (0000000032774185): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:21:06 executing program 1: syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0) 03:21:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e21, 0x7ff, @loopback, 0x1}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0xdf0}], 0x4c) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x1, 0x4, 0x3}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0