[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 43.307403][ T26] audit: type=1800 audit(1562680305.859:25): pid=7933 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 43.344911][ T26] audit: type=1800 audit(1562680305.859:26): pid=7933 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 43.383174][ T26] audit: type=1800 audit(1562680305.869:27): pid=7933 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.253' (ECDSA) to the list of known hosts. 2019/07/09 13:51:54 fuzzer started 2019/07/09 13:51:57 dialing manager at 10.128.0.26:46507 2019/07/09 13:51:57 syscalls: 2465 2019/07/09 13:51:57 code coverage: enabled 2019/07/09 13:51:57 comparison tracing: enabled 2019/07/09 13:51:57 extra coverage: extra coverage is not supported by the kernel 2019/07/09 13:51:57 setuid sandbox: enabled 2019/07/09 13:51:57 namespace sandbox: enabled 2019/07/09 13:51:57 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/09 13:51:57 fault injection: enabled 2019/07/09 13:51:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/09 13:51:57 net packet injection: enabled 2019/07/09 13:51:57 net device setup: enabled 13:52:44 executing program 0: clone(0x3102003bfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mount$overlay(0x0, &(0x7f0000000240)='./bus\x00', &(0x7f0000000380)='overlay\x00', 0x0, &(0x7f0000000300)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@upperdir={'upperdir', 0x3d, './bus'}, 0x5c}]}) gettid() tkill(0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) syzkaller login: [ 101.554159][ T8096] IPVS: ftp: loaded support on port[0] = 21 13:52:44 executing program 1: setxattr$security_ima(&(0x7f0000000100)='.\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) [ 101.668468][ T8096] chnl_net:caif_netlink_parms(): no params data found [ 101.746590][ T8096] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.765681][ T8096] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.774134][ T8096] device bridge_slave_0 entered promiscuous mode [ 101.790055][ T8096] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.797675][ T8096] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.806879][ T8096] device bridge_slave_1 entered promiscuous mode [ 101.821593][ T8099] IPVS: ftp: loaded support on port[0] = 21 [ 101.859869][ T8096] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 101.877872][ T8096] bond0: Enslaving bond_slave_1 as an active interface with an up link 13:52:44 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4442, 0x0) [ 101.908122][ T8096] team0: Port device team_slave_0 added [ 101.926567][ T8096] team0: Port device team_slave_1 added [ 102.017695][ T8096] device hsr_slave_0 entered promiscuous mode [ 102.056237][ T8096] device hsr_slave_1 entered promiscuous mode 13:52:44 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localflocks']) 13:52:44 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x24000, 0x0) [ 102.241893][ T8103] IPVS: ftp: loaded support on port[0] = 21 [ 102.251314][ T8096] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.258782][ T8096] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.266768][ T8096] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.273871][ T8096] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.285480][ T8101] IPVS: ftp: loaded support on port[0] = 21 [ 102.413066][ T8099] chnl_net:caif_netlink_parms(): no params data found [ 102.549144][ T8107] IPVS: ftp: loaded support on port[0] = 21 [ 102.566329][ T8096] 8021q: adding VLAN 0 to HW filter on device bond0 13:52:45 executing program 5: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000240)=""/248) [ 102.641581][ T8099] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.650766][ T8099] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.659110][ T8099] device bridge_slave_0 entered promiscuous mode [ 102.701512][ T8096] 8021q: adding VLAN 0 to HW filter on device team0 [ 102.719792][ T8099] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.729050][ T8099] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.737027][ T8099] device bridge_slave_1 entered promiscuous mode [ 102.744331][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.753909][ T8110] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.762331][ T8110] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.771004][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 102.804261][ T8113] IPVS: ftp: loaded support on port[0] = 21 [ 102.826158][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 102.836131][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 102.844423][ T2999] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.851535][ T2999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.859144][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 102.867769][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 102.876537][ T2999] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.883583][ T2999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.891317][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 102.900005][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 102.908784][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 102.917504][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 102.931343][ T8103] chnl_net:caif_netlink_parms(): no params data found [ 102.951728][ T8099] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 102.968530][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 102.980562][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 102.990452][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 103.003062][ T8101] chnl_net:caif_netlink_parms(): no params data found [ 103.017407][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 103.026946][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 103.039911][ T8099] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 103.081192][ T8099] team0: Port device team_slave_0 added [ 103.091379][ T8099] team0: Port device team_slave_1 added [ 103.117232][ T8096] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 103.128694][ T8096] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 103.138446][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 103.146726][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 103.181545][ T8103] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.190339][ T8103] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.198279][ T8103] device bridge_slave_0 entered promiscuous mode [ 103.208841][ T8103] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.216051][ T8103] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.223634][ T8103] device bridge_slave_1 entered promiscuous mode [ 103.249482][ T8101] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.257737][ T8101] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.265903][ T8101] device bridge_slave_0 entered promiscuous mode [ 103.284377][ T8103] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 103.296575][ T8103] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 103.357656][ T8099] device hsr_slave_0 entered promiscuous mode [ 103.415669][ T8099] device hsr_slave_1 entered promiscuous mode [ 103.456792][ T8101] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.463877][ T8101] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.472440][ T8101] device bridge_slave_1 entered promiscuous mode [ 103.518118][ T8101] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 103.549991][ T8101] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 103.584489][ T8103] team0: Port device team_slave_0 added [ 103.592403][ T8096] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 103.602556][ T8103] team0: Port device team_slave_1 added [ 103.621117][ T8101] team0: Port device team_slave_0 added [ 103.684173][ T8101] team0: Port device team_slave_1 added [ 103.690459][ T8107] chnl_net:caif_netlink_parms(): no params data found [ 103.737287][ T8103] device hsr_slave_0 entered promiscuous mode [ 103.805116][ T8103] device hsr_slave_1 entered promiscuous mode [ 103.892915][ T8113] chnl_net:caif_netlink_parms(): no params data found 13:52:46 executing program 0: syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 103.960232][ T8122] overlayfs: './bus' not a directory [ 103.969826][ T8125] overlayfs: './bus' not a directory [ 103.978227][ T8101] device hsr_slave_0 entered promiscuous mode [ 104.015162][ T8101] device hsr_slave_1 entered promiscuous mode [ 104.024118][ T8128] erofs: read_super, device -> /dev/loop0 [ 104.036618][ T8128] erofs: options -> [ 104.041974][ T8128] erofs: cannot find valid erofs superblock [ 104.112126][ T8128] erofs: read_super, device -> /dev/loop0 [ 104.120498][ T8128] erofs: options -> [ 104.129324][ T8128] erofs: cannot find valid erofs superblock [ 104.132034][ T8099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 104.181294][ T8107] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.189165][ T8107] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.198533][ T8107] device bridge_slave_0 entered promiscuous mode 13:52:46 executing program 0: [ 104.229160][ T8113] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.238570][ T8113] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.248266][ T8113] device bridge_slave_0 entered promiscuous mode [ 104.269260][ T8107] bridge0: port 2(bridge_slave_1) entered blocking state 13:52:46 executing program 0: [ 104.281466][ T8107] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.290083][ T8107] device bridge_slave_1 entered promiscuous mode [ 104.311200][ T8113] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.324374][ T8113] bridge0: port 2(bridge_slave_1) entered disabled state 13:52:46 executing program 0: [ 104.345852][ T8113] device bridge_slave_1 entered promiscuous mode 13:52:46 executing program 0: [ 104.404081][ T8099] 8021q: adding VLAN 0 to HW filter on device team0 [ 104.433266][ T8113] bond0: Enslaving bond_slave_0 as an active interface with an up link 13:52:47 executing program 0: 13:52:47 executing program 0: prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffb000/0x2000)=nil) [ 104.454563][ T8113] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 104.483738][ T8107] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 104.495577][ T8107] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 104.535943][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 104.550193][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 104.578100][ T8101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 104.598235][ T8113] team0: Port device team_slave_0 added [ 104.613128][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 104.622505][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 104.630851][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.637931][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.646065][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 104.654490][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 104.663730][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.671076][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.679133][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 104.688449][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 104.700623][ T8113] team0: Port device team_slave_1 added [ 104.716957][ T8107] team0: Port device team_slave_0 added [ 104.727291][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 104.737577][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 104.746862][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 104.756609][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 104.776429][ T8107] team0: Port device team_slave_1 added [ 104.837907][ T8113] device hsr_slave_0 entered promiscuous mode [ 104.905066][ T8113] device hsr_slave_1 entered promiscuous mode [ 104.963368][ T8099] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 104.973920][ T8099] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 104.998526][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 105.006281][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.013958][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 105.023417][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 105.032097][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 105.040706][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.049716][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 105.059128][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.070154][ T8101] 8021q: adding VLAN 0 to HW filter on device team0 [ 105.083288][ T8103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 105.158573][ T8107] device hsr_slave_0 entered promiscuous mode [ 105.215143][ T8107] device hsr_slave_1 entered promiscuous mode [ 105.275233][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 105.300710][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.327290][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.337695][ T3502] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.344845][ T3502] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.352573][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.361851][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.370676][ T3502] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.377742][ T3502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.398021][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 105.405924][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 105.413747][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.438315][ T8103] 8021q: adding VLAN 0 to HW filter on device team0 [ 105.456066][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 105.464664][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 105.473605][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 105.483331][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 105.491972][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 105.500965][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 105.509816][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 105.518211][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.527609][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 105.553095][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.562542][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.571264][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.578406][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.588312][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.597616][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.606052][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.613094][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.620793][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 105.630516][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 105.639879][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 105.655845][ T8147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 105.665633][ T8147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.683558][ T8103] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 105.695052][ T8103] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 105.718479][ T8101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 105.727002][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 105.736538][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 105.745571][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 105.754169][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 105.763225][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 105.771673][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.780863][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 105.789161][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.798364][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 105.806249][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 105.846125][ T8113] 8021q: adding VLAN 0 to HW filter on device bond0 [ 105.854554][ T8099] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 105.888067][ T8101] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 105.909882][ T8113] 8021q: adding VLAN 0 to HW filter on device team0 [ 105.921181][ T8103] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 105.940325][ T8107] 8021q: adding VLAN 0 to HW filter on device bond0 [ 105.950042][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 105.974669][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 13:52:48 executing program 1: [ 106.020988][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.035472][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.043952][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.051104][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.072431][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.090316][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.099672][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.106785][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.125362][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 106.161969][ T8107] 8021q: adding VLAN 0 to HW filter on device team0 [ 106.175954][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.183992][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 106.196391][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 13:52:48 executing program 2: [ 106.223618][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.233934][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 106.243423][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.253678][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 106.262882][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.271311][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 106.280302][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 106.295519][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 106.303286][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.312372][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 106.341848][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.353366][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.364767][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.371813][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.380426][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.389131][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.397526][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.404668][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.412308][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 106.422279][ T8113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 106.464127][ T8172] gfs2: not a GFS2 filesystem [ 106.470121][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.483493][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 106.492296][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 106.501315][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.510917][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 106.531348][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 106.541148][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.549880][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 106.558802][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.567631][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 106.579834][ T8172] gfs2: not a GFS2 filesystem [ 106.581044][ T8110] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 106.604123][ T8113] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 106.616198][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 13:52:49 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localflocks']) [ 106.659773][ T8107] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 106.763278][ T8187] gfs2: not a GFS2 filesystem 13:52:49 executing program 4: 13:52:49 executing program 0: 13:52:49 executing program 1: 13:52:49 executing program 2: 13:52:49 executing program 5: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000240)=""/248) 13:52:49 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localflocks']) 13:52:49 executing program 5: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000240)=""/248) 13:52:49 executing program 0: 13:52:49 executing program 2: 13:52:49 executing program 1: [ 107.058732][ T8206] gfs2: not a GFS2 filesystem 13:52:49 executing program 5: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000240)=""/248) 13:52:49 executing program 4: 13:52:49 executing program 0: 13:52:49 executing program 2: 13:52:49 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localflocks']) 13:52:49 executing program 1: 13:52:49 executing program 4: 13:52:49 executing program 5: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:52:49 executing program 0: 13:52:50 executing program 1: 13:52:50 executing program 2: [ 107.430281][ T8237] gfs2: not a GFS2 filesystem 13:52:50 executing program 4: 13:52:50 executing program 5: 13:52:50 executing program 3: syz_mount_image$gfs2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localflocks']) 13:52:50 executing program 0: 13:52:50 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) chown(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 13:52:50 executing program 1: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0']) 13:52:50 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb']) 13:52:50 executing program 5: timerfd_gettime(0xffffffffffffffff, 0x0) 13:52:50 executing program 3: syz_mount_image$gfs2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localflocks']) [ 107.768881][ T8262] gfs2: quota_quantum mount option requires a positive numeric argument [ 107.789990][ T8262] gfs2: can't parse mount arguments 13:52:50 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) chown(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 13:52:50 executing program 5: ftruncate(0xffffffffffffffff, 0xffffffffffffff2e) 13:52:50 executing program 0 (fault-call:0 fault-nth:0): semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) [ 107.860704][ T8273] gfs2: not a GFS2 filesystem 13:52:50 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:52:50 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb']) 13:52:50 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x200}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}}], 0x1, 0x0) 13:52:50 executing program 5: socket$kcm(0x10, 0x9, 0x0) r0 = semget(0x3, 0x6, 0x41) semctl$IPC_INFO(r0, 0x1, 0x3, &(0x7f00000004c0)=""/125) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000200), 0x4) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x113bc742, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@initdev, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0xf23f, 0x9fd0, 0xca, 0x7, 0x40}, &(0x7f0000000a80)=0x98) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x0, 0xc) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000100)={0x18, 0x0, {0x0, @dev={[], 0xa}, 'caif0\x00'}}) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)}, 0x0) pkey_alloc(0x0, 0x0) 13:52:50 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000080)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0xe8) r1 = geteuid() setreuid(r1, r0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 13:52:50 executing program 0: semctl$IPC_STAT(0x0, 0x2, 0x2, 0x0) 13:52:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) 13:52:50 executing program 0: semctl$IPC_STAT(0x0, 0x2000000, 0x2, 0x0) [ 108.257617][ T8300] gfs2: not a GFS2 filesystem 13:52:50 executing program 3: syz_mount_image$gfs2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localflocks']) [ 108.370410][ C0] hrtimer: interrupt took 43762 ns 13:52:51 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb']) 13:52:51 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localflocks']) 13:52:51 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:1:/0:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) 13:52:51 executing program 0: semctl$IPC_STAT(0x0, 0x200000000000000, 0x2, 0x0) 13:52:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='3\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000000000010000000000000002410000001000137564703a73797a3200000000"], 0x2c}}, 0x0) io_setup(0x5, &(0x7f0000000380)=0x0) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x5000000, 0x0, 0x700000000000000, 0x0, 0x0, r1, &(0x7f0000000340), 0x150}]) symlink(&(0x7f000000a880)='\x00', &(0x7f000000a900)='./file0\x00') clock_gettime(0x0, &(0x7f000000ab00)={0x0, 0x0}) recvmmsg(r0, &(0x7f000000a6c0)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/181, 0xb5}], 0x1}, 0x5}, {{&(0x7f0000000300)=@generic, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000480)=""/204, 0xcc}, {&(0x7f0000000580)=""/233, 0xe9}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x4}}, {{&(0x7f0000000680)=@rc, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000700)=""/83, 0x53}, {&(0x7f0000000780)=""/26, 0x1a}, {&(0x7f00000007c0)=""/238, 0xee}, {&(0x7f00000008c0)=""/212, 0xd4}, {&(0x7f00000009c0)=""/166, 0xa6}], 0x5, &(0x7f0000000b00)=""/9, 0x9}, 0x3}, {{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000b40)=""/194, 0xc2}, {&(0x7f0000002480)=""/4096, 0x1000}], 0x2, &(0x7f0000000c80)=""/208, 0xd0}, 0x7}, {{&(0x7f0000000d80)=@tipc, 0x80, &(0x7f0000001180)=[{&(0x7f0000000e00)=""/65, 0x41}, {&(0x7f0000000e80)=""/86, 0x56}, {&(0x7f0000003480)=""/4096, 0x1000}, {&(0x7f0000004480)=""/4096, 0x1000}, {&(0x7f0000005480)=""/4096, 0x1000}, {&(0x7f0000000f00)=""/207, 0xcf}, {&(0x7f0000006480)=""/4096, 0x1000}, {&(0x7f0000001000)=""/103, 0x67}, {&(0x7f0000001080)=""/241, 0xf1}], 0x9, &(0x7f0000007480)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000001240)=""/246, 0xf6}, {&(0x7f0000001340)=""/12, 0xc}, {&(0x7f0000001380)=""/39, 0x27}], 0x3, &(0x7f0000008480)=""/168, 0xa8}, 0x8}, {{&(0x7f0000008540)=@nfc_llcp, 0x80, &(0x7f0000001400)=[{&(0x7f00000085c0)=""/4096, 0x1000}, {&(0x7f00000095c0)=""/78, 0x4e}, {&(0x7f0000009640)=""/78, 0x4e}], 0x3, &(0x7f00000096c0)=""/4096, 0x1000}, 0x7fffffff}], 0x7, 0x2, &(0x7f000000a8c0)={r3, r4+10000000}) 13:52:51 executing program 0: semctl$IPC_STAT(0x0, 0xffffffff00000000, 0x2, 0x0) [ 108.581111][ T8345] 9pnet_virtio: no channels available for device [d::]:1:/0: 13:52:51 executing program 5: socket$kcm(0x10, 0x9, 0x0) r0 = semget(0x3, 0x6, 0x41) semctl$IPC_INFO(r0, 0x1, 0x3, &(0x7f00000004c0)=""/125) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000200), 0x4) r1 = creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, 0x0, 0x113bc742, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@initdev, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0xf23f, 0x9fd0, 0xca, 0x7, 0x40}, &(0x7f0000000a80)=0x98) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r3 = socket$inet(0x10, 0x0, 0xc) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000100)={0x18, 0x0, {0x0, @dev={[], 0xa}, 'caif0\x00'}}) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)}, 0x0) pkey_alloc(0x0, 0x0) [ 108.640651][ T8338] gfs2: not a GFS2 filesystem 13:52:51 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localflocks']) 13:52:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="02070000020000000000400000000000"], 0x10}}, 0x8000) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0xd8}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x101, 0x8000) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000140)={0x1ff, 0x5, 0x3f, 0x7, 0x5, 0x20, 0x80000001, 0x3, 0x6, 0x9, 0x5, 0x1000}) sendmmsg(r1, &(0x7f0000003c40)=[{{&(0x7f0000000bc0)=@generic={0x4, "8d99c12d4241d2b1d2c051d140c0e779a3b71cb5d50f13d3ccbcc01743a7f0cceb662954243eb520f9a1e642291946cf4a77feb42eec33e8db1e46921c0eabaac39882bacd5c0d7494b8b5570d0657868fa55ecb3bc75fa1afca49742cbb2202cad9a9556c60f6c1112dab56b6208fd9b89830d8a82e9c8990c61182fd97"}, 0x0, &(0x7f0000001f80)=[{&(0x7f0000000c40)="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"}, {&(0x7f0000001c40)="a47e72fdef92d2e61c1d1a1c743ab69bbe790c4b31129b419c358e1f73b7b289e9865832d46c35663c7917a270faf44c9baa33c3ed26a145735de2f387dc373866a516906f6d"}, {&(0x7f0000001cc0)="e7fbbb7258882cab6f3e28657ad46b21"}, {&(0x7f0000001d00)="f6b3a9cfff784d5b3903537911877918d7f01ae16d24659cee099e63cd5dd84999a49bceef190575b1c25e35095372d352eef529fcf6e3a3cddf03b31ab07e923f235c0891dcb429033afa0346a011190a51b8379967d417a6cc"}, {&(0x7f0000001d80)="9c728920df265f2b4dd69dcc1dfe776af42aedde5d4f177ad766ce2a5ba34139edbc852e91f9155d9ddad23e7e7cdafb106ff1565d68f61ade7385ab47096c16a8ce07a978fbc61aaa9440f9f4118ed7b1fe7cf5508a2e1f271e0bcfd6e76c6e04948fdaf67217bcfacc9ed90bf4287e2f1efd1a8d1f24f5707688882f35b92998d40024f6ad59d52962468c07d9727f64a4ab6e8fde2755134ed83c8c298d194da836599df3b470a32180eb5b14f1af8718b07e2dda61e6ffeda3acbdf73edf744cdeda3e1d5959e03565f3365edeb54555e191eda57138ea5c"}, {&(0x7f0000001e80)="331457304afa2a5bcfebdccfc69f7affb98a81cd77f9dc6064a60d20588761d2312ec7bce25dcc3d8021b6cd0913562d20c0ab9ebb98beac4d1e9a1ce64bf651bd174e6af43197d5f59275f1780525af33cf35b4907a0392ed67b43aa55f6e7335413ffda4dda6f920f8de7f1a5a37388baacf7b40a46bb004d3b6db15f39b0924b9ff80803032c4695e7032217c04e621bd7195d164ae7e592a0de83bf18d29b805afc00cbb7ed61b6c321195334209aa70e1f5103e90900355f1697f7cbd66abd8f07cae3c1b21d582a6c8113d6a0f7245ab346a1c700f38b22e"}], 0x0, &(0x7f0000002000)=[{0x0, 0x103, 0xffd, "c3e83e32c110e22433b8f716bcd8cf8ab8048da3228b947cd23b9839ddbdc9260b164f7acb8e884143fb53ebbd53b2887b5b1af72b194e6ada614b276eac8530631f5b7b918bb54c42b641d4b94de61eee451b69f71df590ee1e84e7553c597a3c379f92980d5486c76bc03e46208cfef289589445e429624d80b346d09d609a7f446964a89969777be25116ae2e5e30ba60b397c126db2f654742046184910f2f218c78e2109a818fad2a6e5e8d81dce436d7014bd8"}, {0x0, 0x189, 0xffffffffffffff72, "0903b3151fb16218e7cc364aa597417b4c75c019affdb9b68b571dff85aa7871cef4828aeef8a38da650f5aac5d4e014527be14a3fc44512e326f5adfa1cc75d87af1bdf453bc1198656ac345ec7baf0459b4dcb8df73bb3862860e266d32f2a6507fc37df43a76d9bf07c1f6427b7"}, {0x0, 0x1ff, 0x8000, "2d401a6179fba69b87e616630cfe284f82f32bb6021faff76b4078ce7a815d2e7bd3463374657943e2cbb22694c038734068def8b5bb69a2f078dbc14ff80e449eb3e31bf7ac22310207a8a09cf1c57acb973e38c4aee2ebae80e78869c6edee479cdb0402dac20ed2b0a94b08d86e33cdb2cff9a25b0534831452d5aedc27fa0c775d0f3ca81e"}, {0x0, 0x110, 0x6000, "b9fc585c39e0aab66400cf7906f7443c5a546869ba5f0df8157846829587f4030a1e2b68f704c027cb42d8c63510ec761ba373c36c0d33dde9eca9f1168c5fdbec01ba9734f388bdc9910ac39ab67c43dccb88ccb6db19c961e39196d53df878e51c5fc8431e974430a291c6cbfdc090fcbffa5393f995760dce2e6923de6658080563d8524acf5595cd0f0b73b6ac23cdbff87e82234505719d0df2ab4e0ede6c51224269eee101a15f4ec0b5846431"}, {0x0, 0x0, 0x2, "7b115daf78142f436559a7616526031c2e7d7ac60d4e800c7efcc80a9cc502f160e3e27f35ba5feb58171c880fe848dea0e5c3ba941d9038e87c9133759dab69f4c0505c59f711550c467f2d6253b25614e09265202e94c6672ab68df4405d4d2626aaa96c3e8741bbd9fa79e9819971f789e00325341f7269acac44db3a9729171b81ef90bb1a911b991b5724d51a98635bb3f4c9a17e8c4f19a1636a3d2e550b0d57385bcf2c4095811323d4db9f73da545f8b58c7e67188"}, {0x0, 0x18d, 0x40, "dd7a88a69092d52cb5193ebeab93c91eea2efe7f2d1d4fbe55a6c1823a1a09727ea6e206acd9a1c872f9a785ee2213bebe33e60d462959b706d6111607bb28cd5583248a50919c023f9dcada8e2be901e08e78c83302447e006ef2c450a0bb766809836a40844e8f5fb5c5692ec5659bfae73b357c091614262c988cd34ca18b6c090e37eda378395e044075efbd773d4886d503f0a31c8eab2aa458f343a853d937747ca9243a146e468470416104c9abaa22358972df2b5693d31fd67b779e2fc097b0e973501127f84c9ff8c2afae7c2b"}]}}, {{&(0x7f0000002480)=@pppoe={0x18, 0x0, {0x0, @remote, 'tunl0\x00'}}, 0x0, &(0x7f0000003980)=[{&(0x7f0000002500)="84144e7d982a80a8ff3c7330cdf017ba5ceae77f5cd2059cf1a10ada5f959ef2d7ecf42f"}, {&(0x7f0000002540)="c8053febad65907c3cc64242781aabac4e6053ddb7bc49bf2813590b23045e05a3d5295ac0ac678f6a379eb0f1206a0b82dc01ddca2b3de8bb20820497a112c7b57c614e199b981ebf06261e0422e3938fc2542b5dce5d01114ff2b61b15920f983af88b4e88dcde91413aadc4a4d580e8a805e9c93dd7dc58d7caab90c970465abdb7d7dd04f168b4d5e9d71970b855171f9fadadd91f1e219755b97824657140715d75"}, {&(0x7f0000002600)="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"}, {&(0x7f0000003600)='x'}, {&(0x7f0000003640)="f7ed7afe52452a3ad6b78923479d7e6d28f7334f349ecacf67da603d21d10e0bd2a1c6ebeed8dd05d9d5c7a6cb53e7be4b482e0f3f1cddb83cb2b4ceb1832f7334e3618706f9d84eb9b5fc69cb540dfe218b48b33cd14f5f118b1b36c7c34b9e4468e1f0574ebdf7007559bcdbf4fcdde74ded8a25484f7c086a392dab43e8bf1c04dc99c2d4e933105c70abf21f22217ea85f6bda69"}, {&(0x7f0000003700)="0f75151aeb1b6ffeff4032e13a48946dcf8bdf8a6c5fac3abd1700cf5e1a308859db519b600b90c3e6c727f9b6a1d51dce06c86b4bd271c226620c8d62453088220f7e610412be02b309319ca072de565e3e874169117cca2553626b4390051d2db99115302965ece333ac49515ce31f53ab6d77df6aa90f84a6297ba7b1bc926c34385f9f835815472eda870b39ebc164bd1d79"}, {&(0x7f00000037c0)="77fbd7f2654f49d06393def6c9ec0f921beccb8727d23d35f44c6fdb8e50651042e001bc67c657d039e3bf4d1309ee56c2425aac5fc7f22bb2c55df699e7936e80db1ad07dffb76126916d637a9c4676409b6334875032db0dd3ab8d0ad8f9218e53f224054adf7c1907a385224fe06ff8e5c339d8db"}, {&(0x7f0000003840)="4613685cb1b2f358aa9882a0da810f5fba5a2fd8de4e2684da721656e4152a46dd90e8fa1fb1118b73eb30d462c4442f4bac27a49ac60dec92f547ae2c7ebb3ce3a8e0010e074b5d7337b6ecb78c288bb5781d0dd950b7524b815bd924af69b7ecfc03117ab694743fbc864dbe7883a8e9b3589de2a9b8d88c9b556317fdaa0cf143ad34f178608ce30efe0733335c2b765f0d71449bfc8a0476703950d910e252ddf5ab4c795f02061be71482ba4a0aa04de707f5e65dfdbdde530291002d88c20606ea9276164ef5918e4a2a97590513027ec7a7f3651047c709a85a059136ee3739b6625a91bf6faba35164086f8ec1a25c103a4c"}, {&(0x7f0000003940)}], 0x0, &(0x7f0000003a40)=[{0x0, 0x10c, 0x7, "4d02fb4099ff0a283bca1c127ddb2ca750f75c3a9befd15dd18284b8773524d5bb36747265975ea6601e957f0b3c2be2"}, {0x0, 0x117, 0x5467, "c6bc45b64cfed0b1403d13cab1f8c2cc1c7d054a9ea619f1344bf9f81694028a6c868b75694c51b9f45537c2933e97641c0b797a3b66b63cee949651aeb21ea370546cde3a9929"}, {0x0, 0x11f, 0x10001, "69fda07682c16621dd66e2b3ca55f63d9ce3f225d5b2664236b365397166d99eb50dc5c7719ef6e1a3e65afab44d929abcfb66a66eea8b5e7cd01999841559bdc2307c32121d6b61e8392c58f22a682415e50125c6f4767d8bf6d2758e9afdbbfd9c31ad764a8f0e06ac42bf75aed17cf1628478c787104455edf8c7fc53ee8f790916c2bf16d1d2760b18ef88bef813f21bf1d26b4cfcd1d8a6ece791826df2400d161525046e21088d12f8e33bafdc452519ee2836b52a7985d6"}, {0x0, 0xff, 0x8, "d6b0e32046f37243abb452466de0d893"}, {0x0, 0x0, 0x8000, "7b38b7152e97ec666b3a180132c4e1fed656b96a7e40ffd48248563664836976fc71b3b9920cee4c4c00632ba19d3e34870b7ac63a13b1a338400663330de2399ff56ddc6926a5febc0024b2f40ec3510daba8"}, {0x0, 0x11f, 0x3}]}}], 0x400000000000433, 0x0) 13:52:51 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb']) 13:52:51 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x3, 0x0) 13:52:51 executing program 2: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0x40082406, &(0x7f0000000100)) mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000001, 0x50, r0, 0x0) 13:52:51 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localflocks']) [ 108.854320][ T8369] gfs2: not a GFS2 filesystem 13:52:51 executing program 5: keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ubi_ctrl\x00', 0x642, 0x0) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000500)={0x5, "b6a6f0aec0851e1eee35ce4bafb068605217f5226df40f0351a627efbf718caf", 0x3, 0x2, 0x100000000, 0xffffffffffffff81, 0x2, 0x3, 0x5, 0x80000000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000003c0)={0xd6, 0x4, "a9675e318a6aced293e58cb26ebeac0c64c0df872a8e2c7d9ea089520bc707bbaa8d4d38d7b8f88b2b4c20dca3f64f8b04fcc9d5e108deaad0f6e84b2e0bc69f83c061775bc4f62fc016eafdf8b3f1c89999b5c6c343ca0cdf88bc9bee910d86152b924388dc6f55283e2a6839da6e4e2b5abec004fc973f395608d40c95c6b65a01ecc586a88d673036575f2040718867b344c76708381ca31ab614b8cc279717e53f4894f0ab248b2c717c1adb1a1e82bd534898224152b0dbde4b5e48f2087217ef70bea344ddc20f595603c3"}, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000200)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) fchownat(r2, &(0x7f0000000580)='./file0\x00', r3, r4, 0x1400) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5050bcfec7be07069307890764ca07946103631ee805a689f19cbab4aa3446cfd26a4edce2ce6914449d90860c3a1acc07dd8cf20d0136071ec3cd78fc118f7601df3ba7b36057cc8f223abf22b7003ed52cd5b5d0124c69f64394fc9146e7f063a80fba2112ec494fe4c1d0be0fa6cf4522e346dc2383a3901e4ba7ac63c700f021fc50edeaab83fa2e224777fb831ec00b747567184d9deb5c291b694e52ffa06d53fd122cfdac6fe48835ba78d30466a65f8cffb5c9486c0cf94af51b3bc9d3037dd1a7563de40d65e1b3422e11400af29a5cfbfa479c4429e42cb17abfbb6e274a26bde0f700290ec55a1e4c13c") prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1000084000, 0x0) ioctl$VIDIOC_ENCODER_CMD(r5, 0xc028564d, &(0x7f0000000040)={0x0, 0x1, [0x10000, 0x7, 0x5, 0x5, 0x1, 0x4, 0x6, 0x4]}) 13:52:51 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0xb, 0x0) 13:52:51 executing program 4: syz_mount_image$gfs2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb']) 13:52:51 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRESHEX, @ANYRES32=r0, @ANYRES64], 0x46) socket$inet(0x2, 0x3, 0x4) getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000180)=""/169, 0xa9, 0x10000, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000340)={"f85e27d22cc6d24c6f87e3bc3f8b52d5c46750ed7b05129648e31c64c27a63bc08ba7f1d5ad78f98e0e024b76670cb03def42737a5cb1f06054d8c0b0c53345eb11989f28c46522cdaae11d4509e59c7a30c4fb7ad469e076fc0cbdb59b0795ad9ecfa4116e90b0bb897fca02ac053f7b04a1b598819400f424ace47cefb217c2a4493cc2a1b9a3cdcde3464fce7573ce8a3726535d50913882f59837c45f3fb95d131d8380d5f95e5d3be16c16f72e00a794993620cd027ab67ea31235f71c9ccc96756761c403c0e33e47eba4cc37bd71b5dbe40bd8a78e9aacdae3c4b9d798631ead4cff8f183915e68c5440aa9ab1841155d9af0bf4020140b6ea3205f8f8cc6f270ebdf68e33e4e69ba1182c5d4f67b5674e91ba5a752466c1bde9ee1aad7565f21ab322b39aee263cfd8b69558a352e6527187d39a035c5b1c075772dc3373914588061e2964014f38fb9dcfa123fecd883dc87184229e27a0d237d2470e7ac595b372bc0a18bb93bd7f1ea442be04756683b2f814898316dbe9c0ad0711d1d9c27420fd840f3c5e3e407dd0f5e002e1b1e9a0cbcfc8da8268ec903085714bdc3af36694e6be1c9596b92b6a8eaf69074350385f0f11e3c8b04b1d0a68802b4a4da5db62b58ab71ce420dba7b786423a197272fa4aef2ad9957173caf0f2cb9e7a3547576d856cc4e7009aa23a2453ef30f8512c2209671875031631e954b73645c49bf6276e5112b8eb5e2ad7e937949e86b06a1ecf7297be1e32d503c78664f42fea96e2fa2835e9d61656f5c50a6589048753b14800a93c767614d4636f9f37ebba2a4e3265ab4ca2f2452eeaff38ddda24f880396f3f10599900c8004bd0f94f0f14e10c065a672b250d97ae5e68419bc60804ee34205538e3dbacfc3e21cf3d124ad8f4ad3a7d4cb5c48cfc39097f8d942602d19c476b9274dc810e6af56df73ccca57edaaed3064657d492c0028981916d03a68af8ef463285437ba9aa1d2c5c4417a60e83f3709f14bbb29c85d266e5eba50058feeadf4257d1fb190f64340cafd728238fd67cc8b0b3936431d44f3e5bdf9ddef0402df495380b562c273d58e712f6c77ddae475f73c629d4b995195c2a18e588236175c28f6a0518e0bbbc7ed7951b4f0510ae2aeac1f2545a5b2b9637f8dc8d772357390dc26b0de3582f60ae410b0c5ed461f212c1578cd3a27aafb4b623dd44e6d0282d1f5dc7024bc430836cfa32a51921f6ef74356bfba15f4b66627782139060dcfe5ed0e7f1373c6ffb7e75204f80cce3b7fffe290935611ad4e3550ca42d5be91f7008e7f9286acbd8a0320d443086216ff80dbf3323569c0ef44a57a810bd98d654e5856b6fc3d9c86be3948780deb744448f0102ed02570ce9abdea6cb41ea7268d8c5efaf2636afae15e973e67af3838d4ddcaf805ffdc78b1ab8c7b66ac4e21"}) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000100)={{0x2, 0x4e21, @rand_addr=0x5}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x40, {0x2, 0x4e20, @empty}, 'syzkaller1\x00'}) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 13:52:51 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0xc, 0x0) 13:52:51 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:52:51 executing program 4: syz_mount_image$gfs2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb']) 13:52:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x20000000000001, 0x3, &(0x7f0000000340)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x45, 0x0, 0x0, 0x10}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x10000000000001, 0x39c, &(0x7f0000000580)=""/195, 0x0, 0x0, [0x42]}, 0x48) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0x3, 0x7fff, 0x1f, 0x4, 0x18, 0xe0, 0x400, 0xfff, 0x6, 0xff}) 13:52:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$rxrpc(r1, &(0x7f0000000180)="53a612c178be853f2d9471fe1498ce2c95ba19ca89d94ebd2810ff0b142558fc256b67fd0750f85e39f2ec783872d70fbe6b1b37cb9e92a409a8b67f28eca4f170e873d75688a2a8638cf3674eb8ef04672628bbb93c1d49d312c1353876ef192285001fc3150a738f1a90886fbdf7a6e5a076c5b684521298", 0x79, 0x4000050, &(0x7f0000000080)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e20, 0xffffffff, @rand_addr="989eaffa8744c9811df1db3877b2dc48", 0xfffffffffffff85b}}, 0x24) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) sendmmsg$sock(r1, &(0x7f0000003f80)=[{{&(0x7f0000000240)=@rc={0x1f, {0x7a5, 0x67e8, 0x0, 0x8, 0xfff, 0xfffe0000}, 0xfffffffffffffffe}, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)="6a01911e7eeda3dc5213e88617244a1a414e3c97701fa0007a202dbea2f7143f2b11b5722a6ff2c703b7f7027f4e366fe318012103a7365e58cc6bcfb9a3d33a5e9d9567f8826801f6f2c449193fe7dc316c597821907a703eb7602fb48b7e33f7379857d14c46e5ae9964af2de0b8f5ca38b244c752d09ef356d2", 0x7b}, {&(0x7f0000000340)="fa86ad686588e55388c6dea8165b6f71738921a8c293c71fe24c5ad4b14e0562491024a627fe46b827b8d87762b02312131565a178f389073b0fc96e46fe8bf8fd45b322026a7e1600b90923ce638d4ee6c24a5a7e139bd0a6386e446cc84c314170970e2843f2caf7896670bc95f183e67aea2aa9d277efe95968774bf73d5181de340d7bc465b9f9650760ea2d89436bd0db31b23cac25", 0x98}, {&(0x7f0000000400)="34bf2b9ce9290b01b6fd9736d500dfafbec48a84ff9a0f8aa14e707d998992bdd7349f5cf3d6e2c544ea34e12ee5bcd26d8172d174ac5c70b825544bbeea7ef1c81820fa9acb6e5584126b39994effb06b4bd12dc8244d608df2b2225b2695a3d6aa63ba410610f1efa31a42cea3c8fd2d48bf50450ad2966cd380c0b0f11b6ae751ccdb975e177b9191356b1ea785f4bd61a5b5531a38148ccd50b9fff44402ab8a24e65b89022f882678134d1c46835988d686fbb6f4ec99c3782f349b53cba2078468031a1c74e40becb25afc10d76bfcc64cfebe8114545f", 0xda}, {&(0x7f0000000500)="9b74d6dc123b2d9032e1012ff32bef68ca22d01b54948c22b28deb7b1d9db51a71760d7b2ec8869c748e4bc66231b9ceb1841c47d4177a167b0e5312bad87075da6a716ac870a2f4ea8a43add083b6b355c40f56a200d2ba632864fcad991272510b8e748dfd1957ef175d01d7a441ef9b3d92da4e304544b40cbc911c828bda9ac920dd2aedc942074f5e16ff1c211423294c9ad829b2f0b1e929f211a6c2782dfc95", 0xa3}, {&(0x7f00000005c0)='b#', 0x2}], 0x5, &(0x7f0000000680)=[@mark={{0x14, 0x1, 0x24, 0x39e7400000}}, @txtime={{0x18}}], 0x30}}, {{&(0x7f00000006c0)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(anubis-generic)\x00'}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000740)="1170ade49f9d00e5a2dd665ab7059f51533ae2ccedcae3eb109c5631956e8182645d5121a9ccb8fa79fbe1fd77f6db8d3bc43678d20b95a656e589b90128950ee2273c52a5a0135b73eb388c354e40a698827a237d322b789490171ae08d896866b0eee59bb4b6d37b9adbdebc166c5fbee8cad9fd02600620c9880f2149bc86131c7c56ada368", 0x87}, {&(0x7f0000000800)="2effbaf4886fd4b5ec8047729f0cbe3c5a4de05254999835e0c012530cd8586c79a116408428cb49103d83c934f675715105ea196e50b5c3b92953578bb94a88e568afed635192f0ad867cb6aba7e001813a351c88d3762d1327f2d5a735ff6917dbcd760f80f02095801f8aeda8a3b0254f2a05d730c9149640444b15e53f5188261bde5581e89e625f06fac396887987ca14f90baf4243ddfd0ebc6eace93de41582db795418d030d1e259bed365604caed90e54f309cd566ce3f1b31a9a13462f6f5542ce226ef58c0ca494585d1f755d7291d743d521a9f236", 0xdb}, {&(0x7f0000000900)="fbed19eda0db447d54ff736715d04f099f1da16046bf3188d3a3f4b78c57fe71de8bc54f5c1f073d9a677b6442503edcd51ded692d4a276a7004a9176fb03dc1ddd991eed90305e18513537e762dc583e6d49b4128b3b4127391ab41f7527bb912bd46697f01957ca4c87d929ac832f52b", 0x71}, {&(0x7f0000000980)="0aa3d7ee943fc0313c300b70b736a4810df080b03772dbad3a6526b3c473f614f4256527def1f83ac20f262a3a7dff56946fb9e3ed5b3019cc1ee6de061c7c75ef5de5a4e0ff9e7f811b1eede32352b17c05aaf5d935", 0x56}, {&(0x7f0000000a00)="87e96a425239e778a65ce1c444a4fcd40c0aa6e09491b7bb9b82e477ded80832c9809957ef005c60a3dd543ecf53942a0d893736c47a2c6211e22b7eb8ed97bd1ab65e0d521faf5c225da8dba5211c33cdcbc805811b1957224d6d4d0a1bc6c221fd54566745c777f12eea65d7ba200456abb2c70ea922b86ef0c0ecea2727499a28d152f4f3717c626b6b9173f9ef322c00411dc2b25758941273fb3e6ba84458599c839bcc67b23c88a998201e2b3502c873d059b40b4a9312aca381bf08", 0xbf}, {&(0x7f0000000ac0)="c9ad118485d4618918e61833ed01463e7f1f3d150d55794d3070ee2f7b03f6059c9c8b82ea7002c06fa7a785837157d83067eb842b6353ae77958d851b", 0x3d}], 0x6, &(0x7f0000000b80)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x100}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0xf8}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x1000}}], 0xd8}}, {{&(0x7f0000000c80)=@x25={0x9, @remote={[], 0x1}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000000d00)="12b0bd8e8f256dc1256e5cb5fc532bc6a09cf267a18ad57676780b770476f2a030295230f427ab16563aa477ffb7763c98689c97b51cbabf50595a63c7c599ae09d23d6b1cb38fb1c6e196dd5df1980b24bf6ce2944dc0e0bf6a05db0ebf8236a05ebe22f917891de616eff5f7ff42c9372748ea2887ba7923101385617b74de9d90bec3e15671fd83b04d982fb8e19e1aa33e005d88d9430f2b3996a91ac6c92453bb", 0xa3}, {&(0x7f0000000dc0)="0a8cc1c21b3026ce7faf1859e2f502eb057f6437243a1f4ca34d03e4b8418fce3b4143b755bec24b419e7a3593e66a774db51093fe9a96ac801a815cca6e232cc2af053efa9487d3adecee2b565c772c7676baa72926eb3a3b27b5dc665505791f5905c49120b174addb8635026f0b94d0629a5ac2e074843d9508f2d5d9df47e6b73abb1c084b10819980c5ba0aeb90aa908d3512acaac9380f938769f8f758f90efe20acee8ed44ed1e4ce4c69cd2e96bb2f7ecf2d9a77a8f71976de1b3eb6", 0xc0}, {&(0x7f0000000e80)="658c220fdb8b4b3b217ad7791b64f66bf032b6b818fd971f9f6d10621ab5a4defacb3489b72726a5ab3ae07b4f4732ea6ed774e2c9e1b2f00f97af7cc0f445d4832428c9d51b07e6e60612d7d2d27d88ff2dc3757f271b32b3254aa83e73ae188556506f2114161d5c98c48c22e1e7e5c4775e629e880a4b8bb919bacc01669b28c6ec9bddeb003abe72d7c49c7af31ff46d76987ed949887aae40cc7aece51d612cad9742126b8ea16191b8582897ef934aac56df37abcaeb938a", 0xbb}, {&(0x7f0000000f40)="f18587b7093adb4126686221dd36676e33ba9480e08f0cc52ff086a877c77e5df6899b542f01f278f8f9739d8532ac7dbf019f50057d7b786181a25cdb8f3bf0bb298b34cb81c53e48930bde7fa5142d21e0c7dd9098017bbc748e526fff2532bb310f68326e2e5595ffbc3622", 0x6d}, {&(0x7f0000000fc0)="06fd395e92f9236531f8e21656940b010e13804b35667bd506715cf12bfc3ca0b3afda5e32e84c0bbb66a509ff2961f0b89477f525c3b7485e437b9d4ed162b896bf2c0ab7cbe3ffb1a7db1f7a1afe206598325da617443da2ae898c17a2940f1091d5bf700762a71054f53daf97ce293cb63b259444172ef1a26b70b02cd2fa511d429b4bf93b8f165046e3f160f39a6b4f44510df7977db1e15ed1fe018ac57d8483214eb6baf6c38333d1440af9177371b52908b33cf8b35a47e320a33df5179db2c240693c192ed460c8a3fe5206828492c0027a2a57ff97", 0xda}, {&(0x7f00000010c0)="70609d8a16eb6ca850be5a473b69e4bec78ccc67dcfccf28a0199afb812f983dffaab5bff044bc12fba63de91d68b42d7b262ad927a928ec6748f44aff454ce4852bc6308de2ade6ad0e72ee7d507830e2a7a45c193cfc6d0e739747dde07d831b8d575ba9c72e", 0x67}], 0x6}}, {{&(0x7f00000011c0)=@sco={0x1f, {0xfffffffffffffff7, 0x7, 0x0, 0x7fff, 0x4ab, 0x1}}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000001240)="d796d9e493b6fd8946", 0x9}, {&(0x7f0000001280)="f65a0715816a4cb13ce4fe9a136b3361a4c8b618ef9f8112d673930b6c0e52ad72e90a6f1441db7f30c6a3b4ac7fa2c93d9b788ccb03f061a64b70bd2ca1ba3081f50a95e184ed3668de2cc1868c85812e0887af9b90231379ca5f5a837ca8a7cf36f281fc26eaf515cf3e16e2b1d622ea2b0e4e77dd512312cef5a68492e5c3aa5c461a2635bf87fc5ddd5f35", 0x8d}, {&(0x7f0000001340)="822aa65fbc5ca13e5b4573be05749e375cbbede7daf8e52b7878afa568e0a975ec5c20dc1f75e6efbcc1ae2eabec5605f95bcf1d440fc98523f6cc956f89300bd52f4f7da84d49896b11f99ddb93574e2334d3b81c448e04d0ef1d5ab7d4250388743851a5cb71438a1fa60cbb46fe688aa3703646784a89bef1e9e6d552ded033005931767122e0293109", 0x8b}, {&(0x7f0000001400)="ca77dc4117887aa836403ee02b5eef6cc0f9899263256d34a774b18d6dbaf8e9225153cab21a20da13823666bc771fd3b10e26bfa4a2630ac1a3718d7271d9b47d28ed9eb9b48195e14056141559951392f8eeb22752759692393a", 0x5b}, {&(0x7f0000001480)="ae6063b880bc2a10d83d5ad6a7331dab607b5568f67ba050143da9303c2565919b2e19a3d2654a4a9cb2743ff11d85ddfb1ea27397", 0x35}, {&(0x7f00000014c0)="3ae17b6abe387a29d0bfdf41fafec3903cbdfffddb296afeed0633926ede1996aa1176a682f31f6cae0a85b23b6d6d4f285e0d39ce2824f544197c74b7d8624edf461db5aef8db85a2ab1f2448d558bd7c6cfbfe263805531b2d357bb802d353deebd463c5bb5ff75a6d99bbb1b18375bfcecdcca757de4783a0c3c8286841800f813fc7cc9e749952fa111ddb462d2d889e3f7ae458cdddb2ef17d4968cd38ab0fabea73834f0029a8861a8692ed5260cb0bbfd87702786dd0c1522f0a3b6a95402a7b8b4e9208267e7c105e1f9213b945115c200dd1c89b55129a153f848f514c99f012217f1494d1bacd7", 0xec}, {&(0x7f00000015c0)="81d50174110f69e6ec1e21b048ac5a15", 0x10}, {&(0x7f0000001600)="c6ed095177095aa3c672a98aa75a1325d79139fc4f5ddba7e1ca6c094c3b6e8ee112ccd0cfee90d2c9deeeb5f940cc6a9873035f5254d2f79508dce2cd2aacc99c697f41e6296ae350d930a5c03c47c572952e5d9e43654c200c8068b17832635bb8bfd467b13f71332fd788201862a770f85a9150ce818a786feb002f2bc3085838dea1f5badadbefe7fcfc215dc49d850fb6eaf82b6e77fd99921397d2f8f9e2c99a8a648823b158a27706c21902fa837d99221bc554785995a8c35f4b982e", 0xc0}], 0x8}}, {{&(0x7f0000001740)=@sco={0x1f, {0x5, 0x8, 0x3f, 0x1f, 0x2, 0xfffffffffffffffd}}, 0x80, &(0x7f0000001980)=[{&(0x7f00000017c0)="72d8a27c6b061369d0274bd667de8e101cfe2ad297", 0x15}, {&(0x7f0000001800)="8b96a5e69e82dabfa19b499de6650e967abc011d021faa0d1ced9bb424d0dc1cf0a55e11f91632febd3e5f6286961a2579c8648846e97c306ae53ac0598e050d7d759bd59869f1ee83ec9b686d262d6add20088e86051fe1480d56e8fe8e91fb1ec32f30cea8876f03458e1b0a44f9ee36326037", 0x74}, {&(0x7f0000001880)="54b77304a20df11fcb2ad94df2eb79feffd8073cb4dc58505789d0422661029639d3574fa6c05e4b00a4e2533308916f9bd68d9c456eebd1133ff4f80802a0de7fb5592d11a54b5aa004d75e4938f81a7533ee340a462c381e1a65fb383c0dd8b719a66fac5ba5873ab290520f840d799b090045bd90c472a72dafb6aa1f1d4a4a048aad38093f90c3638fcf840a57e029997ea793006c28af2447932c57c508b7ccb7be39409d0e62992274b50722a112f5ddf27cae460c716d06675eef16a0e84fe6e0b35bcf8c2eef18ca86a03732c94b16", 0xd3}], 0x3, &(0x7f00000019c0)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x80}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x7ff}}, @timestamping={{0x14, 0x1, 0x25, 0xa8b}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}], 0x90}}, {{0x0, 0x0, &(0x7f0000003d00)=[{&(0x7f0000001a80)="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", 0x1000}, {&(0x7f0000002a80)="a2b0dad2ccad61ecc1ee01be46289288c0755c616e7f8a3b0b988d4d904c345e7479bd21c11ea5550cf0411de42db416d753d2ac152fb655834a722c779505a83dde29a4b7dcbc41b5c00232f19109d39895af9391a60c259f5d2f351a70620d8270357a3c8eaa4431b6b2028d792c9af4b6cf259dcf65e947a7f757cce187a6bcb929961a0fa0b97e9c050998bfc0e2e8d9495388563765afeb1ae3803cc90367c91b8f54d21b8c1dfff1ca", 0xac}, {&(0x7f0000002b40)="1be71f64b95266b1d95494fc0805bd0fe43334b96fcbfadcc3d9b1a600e877214f4f2fcda235dc2bd8e0ac8a9714b591e13315c3f15c21f0caaa624fb9c4f70ea2837d177517d2b91733ec3b68a8745124ba6ea54a8b4f650ad4a237f734cd647797eee5e6492220863ba1a6e3d4", 0x6e}, {&(0x7f0000002bc0)="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", 0x1000}, {&(0x7f0000003bc0)="be0f3f019c220987f15fb88e8a8544b7a87dcf29a891c6575fdb1ed5d025f4549edadeea86f43adac7886e076477baf445e1480d6ac1f41c22661c6ea36ff7d5b79d1925181a010d414bab3d3bca55592833f562ca76bb90e87c243a29c5d74bfa90a714b0eea95e4f22bed40a212ebcc42fe57ad2db589d", 0x78}, {&(0x7f0000003c40)="cad089d5492aa066fb4aaf96d82edf642f41cf847b1e727b9ecbea4432b969007bd0588b604774759a01638564a3ef9946b075a31274c07d22df95562d1674c8cfc4", 0x42}, {&(0x7f0000003cc0)="8a4b28a0eed18cf23544199fb8dc6361b547458de1f163eec53535b7d9", 0x1d}], 0x7, &(0x7f0000003d80)=[@mark={{0x14, 0x1, 0x24, 0x7f}}], 0x18}}, {{&(0x7f0000003dc0)=@tipc=@name={0x1e, 0x2, 0x2, {{0x42, 0x1}, 0x3}}, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000003e40)="eae15c531bdb6a3368a811c705c31123cb3d37e44f234e5539e2a3ee7f3117a171f9935ebc52719c40786a7bbfb5ef482435527341599665fadeec2aecaa55cc599bcd0a3dbc1383b38d0d4d9af6a08450d396301156", 0x56}], 0x1, &(0x7f0000003f00)=[@mark={{0x14, 0x1, 0x24, 0x2}}, @mark={{0x14, 0x1, 0x24, 0xfffffffffffffffe}}, @timestamping={{0x14, 0x1, 0x25, 0x8001}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}], 0x60}}], 0x7, 0x20000000) ptrace$setregs(0xd, r2, 0x0, &(0x7f00000000c0)="f50e2ee87c3bc2601ea1273c5fe2c566b00bcd29e5379ef37afd318871e68e6f24b58c7b9cc8477d12c79020f57cf3520f3f5617ed1fafa8f88bffcda2443ac112f5d8c6a119c936fbc3f549cc9b0f83d5d38d69940296fd932c9dec7cb9ac28cbf173f72c868b13800c81eedb43587ebe85ba1047cd43c78dacba5cf742936f530c9579b5cb6ccf0f") ptrace$cont(0x20, r2, 0x0, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f0000000200)) 13:52:51 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0xd, 0x0) [ 109.302007][ T8406] gfs2: not a GFS2 filesystem 13:52:51 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:52:51 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRESHEX, @ANYRES32=r0, @ANYRES64], 0x46) socket$inet(0x2, 0x3, 0x4) getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000180)=""/169, 0xa9, 0x10000, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000340)={"f85e27d22cc6d24c6f87e3bc3f8b52d5c46750ed7b05129648e31c64c27a63bc08ba7f1d5ad78f98e0e024b76670cb03def42737a5cb1f06054d8c0b0c53345eb11989f28c46522cdaae11d4509e59c7a30c4fb7ad469e076fc0cbdb59b0795ad9ecfa4116e90b0bb897fca02ac053f7b04a1b598819400f424ace47cefb217c2a4493cc2a1b9a3cdcde3464fce7573ce8a3726535d50913882f59837c45f3fb95d131d8380d5f95e5d3be16c16f72e00a794993620cd027ab67ea31235f71c9ccc96756761c403c0e33e47eba4cc37bd71b5dbe40bd8a78e9aacdae3c4b9d798631ead4cff8f183915e68c5440aa9ab1841155d9af0bf4020140b6ea3205f8f8cc6f270ebdf68e33e4e69ba1182c5d4f67b5674e91ba5a752466c1bde9ee1aad7565f21ab322b39aee263cfd8b69558a352e6527187d39a035c5b1c075772dc3373914588061e2964014f38fb9dcfa123fecd883dc87184229e27a0d237d2470e7ac595b372bc0a18bb93bd7f1ea442be04756683b2f814898316dbe9c0ad0711d1d9c27420fd840f3c5e3e407dd0f5e002e1b1e9a0cbcfc8da8268ec903085714bdc3af36694e6be1c9596b92b6a8eaf69074350385f0f11e3c8b04b1d0a68802b4a4da5db62b58ab71ce420dba7b786423a197272fa4aef2ad9957173caf0f2cb9e7a3547576d856cc4e7009aa23a2453ef30f8512c2209671875031631e954b73645c49bf6276e5112b8eb5e2ad7e937949e86b06a1ecf7297be1e32d503c78664f42fea96e2fa2835e9d61656f5c50a6589048753b14800a93c767614d4636f9f37ebba2a4e3265ab4ca2f2452eeaff38ddda24f880396f3f10599900c8004bd0f94f0f14e10c065a672b250d97ae5e68419bc60804ee34205538e3dbacfc3e21cf3d124ad8f4ad3a7d4cb5c48cfc39097f8d942602d19c476b9274dc810e6af56df73ccca57edaaed3064657d492c0028981916d03a68af8ef463285437ba9aa1d2c5c4417a60e83f3709f14bbb29c85d266e5eba50058feeadf4257d1fb190f64340cafd728238fd67cc8b0b3936431d44f3e5bdf9ddef0402df495380b562c273d58e712f6c77ddae475f73c629d4b995195c2a18e588236175c28f6a0518e0bbbc7ed7951b4f0510ae2aeac1f2545a5b2b9637f8dc8d772357390dc26b0de3582f60ae410b0c5ed461f212c1578cd3a27aafb4b623dd44e6d0282d1f5dc7024bc430836cfa32a51921f6ef74356bfba15f4b66627782139060dcfe5ed0e7f1373c6ffb7e75204f80cce3b7fffe290935611ad4e3550ca42d5be91f7008e7f9286acbd8a0320d443086216ff80dbf3323569c0ef44a57a810bd98d654e5856b6fc3d9c86be3948780deb744448f0102ed02570ce9abdea6cb41ea7268d8c5efaf2636afae15e973e67af3838d4ddcaf805ffdc78b1ab8c7b66ac4e21"}) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000100)={{0x2, 0x4e21, @rand_addr=0x5}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x40, {0x2, 0x4e20, @empty}, 'syzkaller1\x00'}) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 13:52:51 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRESHEX, @ANYRES32=r0, @ANYRES64], 0x46) socket$inet(0x2, 0x3, 0x4) getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000180)=""/169, 0xa9, 0x10000, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000340)={"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"}) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000100)={{0x2, 0x4e21, @rand_addr=0x5}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x40, {0x2, 0x4e20, @empty}, 'syzkaller1\x00'}) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 13:52:52 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0xe, 0x0) [ 109.605570][ T8438] gfs2: not a GFS2 filesystem 13:52:52 executing program 4: syz_mount_image$gfs2(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb']) 13:52:52 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRESHEX, @ANYRES32=r0, @ANYRES64], 0x46) socket$inet(0x2, 0x3, 0x4) getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000180)=""/169, 0xa9, 0x10000, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000340)={"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"}) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000100)={{0x2, 0x4e21, @rand_addr=0x5}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x40, {0x2, 0x4e20, @empty}, 'syzkaller1\x00'}) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 13:52:52 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:52:52 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0xf, 0x0) 13:52:52 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRESHEX, @ANYRES32=r0, @ANYRES64], 0x46) socket$inet(0x2, 0x3, 0x4) getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000180)=""/169, 0xa9, 0x10000, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000340)={"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"}) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000100)={{0x2, 0x4e21, @rand_addr=0x5}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x40, {0x2, 0x4e20, @empty}, 'syzkaller1\x00'}) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 109.889164][ T8457] gfs2: not a GFS2 filesystem 13:52:52 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRESDEC=r1, @ANYRESHEX, @ANYRES32=r0, @ANYRES64], 0x46) socket$inet(0x2, 0x3, 0x4) getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000180)=""/169, 0xa9, 0x10000, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000340)={"f85e27d22cc6d24c6f87e3bc3f8b52d5c46750ed7b05129648e31c64c27a63bc08ba7f1d5ad78f98e0e024b76670cb03def42737a5cb1f06054d8c0b0c53345eb11989f28c46522cdaae11d4509e59c7a30c4fb7ad469e076fc0cbdb59b0795ad9ecfa4116e90b0bb897fca02ac053f7b04a1b598819400f424ace47cefb217c2a4493cc2a1b9a3cdcde3464fce7573ce8a3726535d50913882f59837c45f3fb95d131d8380d5f95e5d3be16c16f72e00a794993620cd027ab67ea31235f71c9ccc96756761c403c0e33e47eba4cc37bd71b5dbe40bd8a78e9aacdae3c4b9d798631ead4cff8f183915e68c5440aa9ab1841155d9af0bf4020140b6ea3205f8f8cc6f270ebdf68e33e4e69ba1182c5d4f67b5674e91ba5a752466c1bde9ee1aad7565f21ab322b39aee263cfd8b69558a352e6527187d39a035c5b1c075772dc3373914588061e2964014f38fb9dcfa123fecd883dc87184229e27a0d237d2470e7ac595b372bc0a18bb93bd7f1ea442be04756683b2f814898316dbe9c0ad0711d1d9c27420fd840f3c5e3e407dd0f5e002e1b1e9a0cbcfc8da8268ec903085714bdc3af36694e6be1c9596b92b6a8eaf69074350385f0f11e3c8b04b1d0a68802b4a4da5db62b58ab71ce420dba7b786423a197272fa4aef2ad9957173caf0f2cb9e7a3547576d856cc4e7009aa23a2453ef30f8512c2209671875031631e954b73645c49bf6276e5112b8eb5e2ad7e937949e86b06a1ecf7297be1e32d503c78664f42fea96e2fa2835e9d61656f5c50a6589048753b14800a93c767614d4636f9f37ebba2a4e3265ab4ca2f2452eeaff38ddda24f880396f3f10599900c8004bd0f94f0f14e10c065a672b250d97ae5e68419bc60804ee34205538e3dbacfc3e21cf3d124ad8f4ad3a7d4cb5c48cfc39097f8d942602d19c476b9274dc810e6af56df73ccca57edaaed3064657d492c0028981916d03a68af8ef463285437ba9aa1d2c5c4417a60e83f3709f14bbb29c85d266e5eba50058feeadf4257d1fb190f64340cafd728238fd67cc8b0b3936431d44f3e5bdf9ddef0402df495380b562c273d58e712f6c77ddae475f73c629d4b995195c2a18e588236175c28f6a0518e0bbbc7ed7951b4f0510ae2aeac1f2545a5b2b9637f8dc8d772357390dc26b0de3582f60ae410b0c5ed461f212c1578cd3a27aafb4b623dd44e6d0282d1f5dc7024bc430836cfa32a51921f6ef74356bfba15f4b66627782139060dcfe5ed0e7f1373c6ffb7e75204f80cce3b7fffe290935611ad4e3550ca42d5be91f7008e7f9286acbd8a0320d443086216ff80dbf3323569c0ef44a57a810bd98d654e5856b6fc3d9c86be3948780deb744448f0102ed02570ce9abdea6cb41ea7268d8c5efaf2636afae15e973e67af3838d4ddcaf805ffdc78b1ab8c7b66ac4e21"}) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000100)={{0x2, 0x4e21, @rand_addr=0x5}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x40, {0x2, 0x4e20, @empty}, 'syzkaller1\x00'}) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 13:52:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)={0x14, 0x23, 0x829, 0x0, 0x0, {0x2805}}, 0x14}}, 0x0) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xff, 0x400080) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000100)={[{0x7, 0x1, 0x8da, 0x40df, 0x0, 0x20, 0x1, 0x5d, 0x40, 0x8, 0x5, 0x0, 0x7}, {0x5, 0x1ff, 0x1, 0x484, 0xfffffffffffffff8, 0x9fb8, 0x8, 0x5, 0x8, 0x9, 0x3ff, 0x3, 0x1}, {0x8d11, 0x6, 0x6, 0x0, 0xff, 0xfff, 0x2, 0xfff, 0x6, 0x7, 0x1, 0x7, 0xffffffffffffffbb}], 0x39b}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f00000001c0)=0x1) fcntl$lock(r0, 0x27, &(0x7f0000000080)={0x3, 0x1, 0x0, 0x3, r2}) 13:52:52 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb']) 13:52:52 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x10, 0x0) 13:52:52 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) 13:52:52 executing program 1: mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8) r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) fsetxattr(r0, &(0x7f0000000040)=@random={'security.', '#,^-\x13\x00'}, &(0x7f0000000080)='-:nodev*eth1:*\x00', 0xf, 0x1) 13:52:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000001800000000ab000000000069101400010000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1, 0x18000) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000001200)={0xe000000000000000}) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x100, 0xfffffffffffffe00, 0xffffffff, 0x6, 0x7, 0x200, 0x45, {0x0, @in6={{0xa, 0x4e20, 0x401, @rand_addr="3e3f82f20b20cfc86d39eeea9a41f326", 0xfffffffffffff001}}, 0x5, 0x5, 0x5, 0x81, 0x8}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000180)={r1, 0x1000, "e639ce6fe54eed3a50a205f525b896644cf062d8c47608e0b954756a69a7b3ef5aa47c6f83c9c3c5d39ee869f04a3352d5ff75feb07834c2a62a99b0e3356c7737ab1acfb595b8dc670e75ac8c3540230a6f5eda8f1cdf27fd7d9754db23185a0d53e7a9ae1128154a8104057d55885899fbcbe64956adc8e80f80b1a3af323cb198aa5605c9b1506917a483cef188b77fe933a95e845ee818f8c7f615898a73565520a9a8bba6a21bcc356b711974b976291fc29c2754edec78bf43f44c3accf1c39592d7ef34ad47fcff5dc4716738d32e9a12e9c0206651bb4f2fd5f77db4b4c39edd69a1e3676361aef79af21b5abd1dea6a4e37581f07894bba6c925a54464f29aac871d10077418186928bfd449eb35f2b4bf1c77faa38fac39533022b4be64003205106a9862bdb444e16388ed730eecc1e3478788cf497ca815c0b2a851455800624cee6eed13a65c042e2834031af7b06f462b5c5ca4959637c223d0b7f1d9eebf06bedbbb51f34b5d2e8166630ddcc023ed81a3cf07cf50807ff480faf7fd016c6af3d9c2b336da5d374ed7beb88c5663d8930409f6eda3219feb3db370fc260487e009bdce68ae92c20906c25fefc31e358c678fc654c3e814b2bc79c7145b0d91b2de8c1a6bd45b6b80782c3df0d268ed45a156dd4002356dcbf4d7f39957ab756883f09750364a8a6b0b41f6276a60d23594a9c1fc9a9b9f4a7363b79420ecbafbae5b0da0307299997a9a09fc164f85251242babc626c5aa5c22b515c6934aba11dc9f2ae739b47242ad3df261d3e8bf409871c61c3874fcccd1ceab8daf64b67585be82b52c6526b53f718d5c1bb8462985f20921647c5cc8bc0fa195c9f32fb258cbc06e11fae06f2d6e58e115f4d12541312088db69c243bae2a06096c504acb8255a6d403c59d54785ad30484a88566736db17a3114aac9895bb3e5b1f19f03fb64bfb10733d08233a129fde406f7c7e3230c1ae01872ee354ceac0d59f8a3487c01e2a2c6d9e5279282bb9b5da2043c69724a6d77f36aa02c1ae5d6d7de3e71b9f1a2f1ab0d5ba88128971ad8a06e8107008a8cef1cfd06d5c80a324daf3e257f0890e21e736ad055fe156963b99b32a4f4ce4f42f58a5b3f3277b198a59a4e23886f388dfd7d8bbcc7fe87b3b00bcd2bce00dfb66926064b1b5c03b64f22a14669610f53cfbaeabc38f9c50884beffd078ee4886ba6d05681c56ceecb8be6b06789bac62c0fb7b1c3aec869072d9ea538e55a214252b556d7279331b9d58501c766e9f14f89973a9aebe950f3e90a150f0dbca4c67deea9d05b45417317728a29c9b5985948bde4810c132bdd4dfba880fae7732b0498841d8fd904a2d2b319d67e6949718ed5fc021d1ebe6743593c4710ae9a10fe994a66399824a9a3e2f70d6171de2656e5529f280225f071fdde09424bcf05fe993b74389df99d83b4a6891eab7ad7f892205d1faee8b14273b8bcc46122e493a06429baeef8591a25dd96239850849774e3a4c590586f3bb082223acc6144c4bfdc45241b6dd3cef15422f33a985671e4668c2c169270f99bfc10f121a03fa06f663fe47c575c2696fd9d48017e11e630da42a814e213ddde916cd9e6056bfe3b190e2ce3640a14f79153ac70a1556d36948cf4561f25c35c91639aee39ce0c9681f375e234c84c44e23061c41f002a65078fa216c9b41b66931c30117b64e509a7fddd9b562702daa7af721a857a1deb7e122eef2616f6e5c5126434f56dad3d0ff21b897ef922c5aed32b1474377576e42d6ace30ba102750a887a29688efe0310674d9f3c5046d628dba497f9f88323a55721c94f15566e7a2a40ec3fdb63def1b2df54e72e5ca43d6d6e0cec1370cd89fe360b9189cd0bd024cfb17873eaa4681f2330e4c46474f9c41558d470f4cc255c6d1a564cbef616cdbc23c5826ef30e73f50e19663519c751f2308d6dcb5cf47968ab7e10f50e63a823c30d6c79a2401bdb19f4bb8b017186052c5dd44a9f788f6981e74c6f7a4816197e733c5c1f84a4d2fcb115fd7c32774801b357cb86a118fd66a70a8395c7114ea3fc5d070e6dcec80d2559acbde1cc7063d8b2c96dd56c6469273b5b8039d09a35ce83f74c2a5a550990b9c08ad2c0c55747f04e7d7fbdb7c7d57f337d4bc9fcfeae2161f474f72bc31582c9a511a6e2ffbef36c4713d29a0b741c0acfe5d753d7484281c4fca3e76cf67a47f4d661bed7042c3a2400c29ec6c81cc220154757101cd5a81730228081a6d0b93ee1e841b116e7c81397e842833804a145091e8105b8bd03ac10af3c06f392962688008569a34fa574c40962802341a1c0e50e64207ac8740df7a268ed3c206ecf719d2e2c0c85bab4ef9921610cafc4ad251e4c1979a8d10ef2ba4546bed662b2aa7cbf9fe59282c5e1460ef90b4bd4be8c45924bfcb94d2e85e8de7229117a5d69472930c25f6aab38ee1ce94b0342c28b802cc722bb635a4fa3a2a40b76b571bb00dbb08ba1ed401b70bc4866c682d6c481a3613811586db4dde0034c99ce5784670bec005472daee9563c704ccebfa6912be994d0f8eec24ed87fc7ca2c785c70680aa7826fa62e7ea9549db64d6981a19b015b2d7fd3945b85a8e58f577b053c78e9a877344eaeedc068c22a945c4c65b11aa4015ead97ae5887ed37fdaca20adb57afe3be1a80332788b1c4a011150c9edc445062d9626a45d49af7fe5de2e531b5133eb95fd0b2daefa770a2b3ef3404ea79ff72922d313c905267123be723a7621896d75f76a5fd59c927ccd787f679f852253859138d755275f40649c107e7620b9c71542a8ed945c831f20de058d0a369c3c02aac6130810a5d704b44990ac8a9c6d5bdce9b8248af17bf1fd87d57e4fece8c072e4ee6c6e5d6342b54e0c8356b80398f986b144880ecf2e9569d30a074a0762dfa8b7a38921b189cdc7d976974b177c63588957af38d7230055613c4e2e707324bd3df425029befa958df71f80501547cf6fc802f0e8c73c27a4fc53cbce967b8e11a9f1b0eeb4e566aa85bcf9ead5cfeac15f1fc9bde4ec0a17385febc8000de4ceb9e6f05633ed8720ea0f2f17f2a2e59c56a2566719ffa2585643726db02c6208cae54ca31480d2635f2658e680ac10b15960209c7b62ddcf3402edf8d1a85a6a766c92f29a2567904d143d4c8c74a9a9a58786801014aab759ef0e82dd40ce511dbd17df1ef917b33b917bb57f0f243e77515bf6a8429d396aa25326d7c4d972fffe360532d9c79467564e16fada2b8f2e778b93222cffbe0587f1006321de264246e99882c98dc9203cd67b4b29bcec5a1ee8d6474154df3a09852ae72cb06fb2d6226ed48de013111c7f01cb08e957a855aeb8572b32afc41a90a5e6e0959d7ffccc9dce3f72a853cc5912fc3564e45e1a4e8fae6b7692942a9de2c9981ec34116d9e626315c6221efe25b7e3e7c9e1347ad4dcfc58f1232453caeeb970e6b353c31bdd22f3c2b420ebaa6bc6f1a22618d1fe0ff50f6938e0327a794284a693946a81e392d7db926e3f6ac0361db71f328213303af21f67c91649025feeeff7e407f74ddf2f9ec6c6d2dc7e2ae03a930b53dca830e3d2c9da590ee579c3050ded9b86e328f76449b73493a865e7ac6ccb925f2eccac0319cb98b76600e67a0e1947b91ecf334d710111472549da0b77c1a78eba663225e7c9a0096a5f79afd6d546c59218bda6fa7e3c06ad8b5c842b851fdd18ead0b48080feafb18e957c01e8e3be2e3bc0c0ae53f9ada258f5bb9e5f0e9cf8714cca358d86ccf40e6b0ef1cf035672c7ad91dfc08dc05a8ff20a43e34a44c162b97702714d6e98dba024bd073715c3865537631b2a541f6ab06c67e3614f8ea09c4288f1ddd51223a80b424227bd4c6560b8c5077edfd777ee9a978f2f48d0a4344b60902bbf6a9e8209568e37e65208ad01c059ba957430b8b3591d4a79974805b502feedaede444a6de8e8d58525b65618c52e69c218a784d99b10f6633d1005eba47896c2ad2e0b8e1235fabb018445b1d45ca0607eb09b81d2878248ba697aa8ec62ea3e1b322febe7493e997d4ce166dffe85f7f95ca36024eb95b04abbeb53501fb1aa82fb228b830ee6720ab4641729e4616d5d534688647aa215e1fd36a1182d6300dfc03a5ae00cf996c8904edfce02f43b7f8fdd31afe05d67ca8715a13178123c322696ee38a50a378da063ea88ca61691f26711aaa18f3bc8877b151780d2688c328c4876c34ac3d3285ca227e4d820c986972eeede72a22a304cf89fa6ee6aa79586322ac042e91abe66a56695eb5e2a25267643dd06214e3aafad0261423a94fe4176c071d38289c8a0ab9d6eea85875d0e77186bae7e47a34208ef8f8a9e2049d4d186d0591daf515eb9759e4e256f8cbe62ac095482bf6f4a4ad7aeba5a2bf6d9f9365d97ecf27e907416ebf3e6869fc6cc3f63a25e7ca601eab41380d6b71bd61b14ec07279d94220350a85b3591069a78e57156d153fb7b87de3c19bc86e44cd55a2ab33c0e4144ba7a32a74894abacbb21b889ab4fdfbb535a86e0b5e9bf83eb306f5a6ef80872d0f1f6e7ec0c78eaac173578322225d55e36a867a12f7b5a372028dd721f749385fa472bac8e0b8e462e77bd0a5af7f4f00af051a761b047763bef13d9cea5195ae49872e413a6b63a606f649f0f4645d6dc7b7cd4ebe4277256b75e6259a38e25dec50684213ff517e50686cc6c838cd93abb3c3bb7b1edb29b3ad77334adbede59676d78059f337e5a79c4d627e29604c2885a34df57ad43cb9f87c9b34a3f6650635801ad27820f9b1af5316172d9e0a3f5b6d1dadb36a55abccbf4a9e2079e4d9aafb2612f696fdc14424b08ade2ec5aea14760871bf7bac351d06f9a85698cd983221a780ac5a0dc24f3ed2a5ebd370a8d6890bc79a5b2fb5a211800df6194342e6605ba3e59629f9ca6f0ab6cda7e2fd01900bbe91a2dcf5aca8ed787747fc7ccf4d8663e3d08eca5a3b81f2eeb508d087399891b13c46ee1119935fd5e1e02a4409a05f93526441b580723fff2c7265cc36167d0599c4c102ed791574ee6382921ec752f5d213e5e316f9d4b895b6b12d82c6bd786beb2fda69f4c935b4ce02dc05c24ed0cc910ddd01a381964e7537d2151d9bd15e3ead62ef948e980caaade67469f5ddf120d1b0c5f452f741c7929ded0fee9e52716ead7efa122e674f9e8b4e3ed9425f00f92b03a7fbeaf71dc838c00c4600e0303531f1ac5767688a991f8402c6d46b7500c7dc7643e32e3777f25e187189d2b7a5bf31bd6329f2cf648f6d28d293c9ced2041eb781f8aa2cd419ad7c21cf0a72312168033cba2e503e22a2969637771423d6f0a468f0458416394631c3493dfb3206587cd6ad58e7b0291be5454cd2f4c09950f94eb32078c0e02db9244ac3c1cea0ad98e510e1235a41c8bef1191cdf4d0325135e63bb96db33c18a218a160af168029b8d5ab2ece25dbb8e44f3a6e3983a2551f9c930a51fba4dc609b51cbba4d7aba6bcdc8ae6f82be5bbd3d641bda33c6225ea6574881772c258916834a88f341a797288d606ce26cf2cf5068359083b0a0286fb59228bca32f01c9bdd89d86c6fb156ca346e8b403e6f3fc45b6a051b59e4425c29e0d4ddeedbb01aaffb0cca8b26a5aa43819f899f85aa8124fdacd720b48753cdf886466a386f77fe868ad6adf0cf103644dc968acce5819b1ec47c2a05f619050864b43b145611d3bc213ad098faf1cdddb637d0d6de1d57004a70d90e68ba1e01be4934e37f9"}, &(0x7f00000011c0)=0x1008) 13:52:52 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioprio_set$pid(0x2, 0x0, 0x0) ioprio_get$pid(0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000080)={0x80000001, 0x29, 0x73}) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000000c0)=0x2, 0x4) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @random="d2bcb8c79178", 'sit0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000001e00)=[{{&(0x7f0000000880)=@hci={0x1f, 0x0, 0x3}, 0x80, 0x0}}, {{&(0x7f0000000a80)=@hci={0x1f, 0x0, 0x3}, 0x80, 0x0}}], 0x2, 0x0) 13:52:52 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x11, 0x0) [ 110.292491][ T8483] gfs2: not a GFS2 filesystem 13:52:52 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xa24d, 0x80) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000180)=0xfffffffffffffff9, 0x4) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="5779ac8d9071a264a154e6", 0xb, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000440)={r0, r2}, &(0x7f0000000300)=""/243, 0xffffffffffffffdc, &(0x7f0000000400)={&(0x7f0000000080)={'tgr192\x00'}, 0x0, 0xffffffffffffff28}) keyctl$search(0xa, r0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:52 executing program 5: timerfd_settime(0xffffffffffffffff, 0x8d06b221f4d67d1e, &(0x7f0000000080)={{}, {0x77359400}}, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200800, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000000c0)={0x5, &(0x7f0000000040)=[{0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000100)={r1, 0x2}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f0000000200)=0x8) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0)={r2, 0x6, 0x30}, 0xc) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000240)={r2, 0x3}, &(0x7f0000000280)=0x8) 13:52:52 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x12, 0x0) 13:52:52 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x8100, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:52:52 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb']) 13:52:53 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xa24d, 0x80) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000180)=0xfffffffffffffff9, 0x4) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="5779ac8d9071a264a154e6", 0xb, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000440)={r0, r2}, &(0x7f0000000300)=""/243, 0xffffffffffffffdc, &(0x7f0000000400)={&(0x7f0000000080)={'tgr192\x00'}, 0x0, 0xffffffffffffff28}) keyctl$search(0xa, r0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:53 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) 13:52:53 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x13, 0x0) 13:52:53 executing program 5: clock_adjtime(0xd686d3f6c48eb3f8, &(0x7f00000002c0)) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710, @hyper}, 0x10) socket$key(0xf, 0x3, 0x2) 13:52:53 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb']) [ 110.633805][ T8528] gfs2: not a GFS2 filesystem 13:52:53 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x14, 0x0) 13:52:53 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xa24d, 0x80) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000180)=0xfffffffffffffff9, 0x4) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="5779ac8d9071a264a154e6", 0xb, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000440)={r0, r2}, &(0x7f0000000300)=""/243, 0xffffffffffffffdc, &(0x7f0000000400)={&(0x7f0000000080)={'tgr192\x00'}, 0x0, 0xffffffffffffff28}) keyctl$search(0xa, r0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x9, 0x0, 0xa, 0x2}, 0x10}}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40, 0x0) fspick(r1, &(0x7f0000000080)='.\x00', 0x1) 13:52:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="275a61635e0bcfec7be070") bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x100, 0x4c003) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000080)={0x0, 0x180000}) getsockopt$packet_buf(r1, 0x107, 0x17, &(0x7f00000000c0)=""/111, &(0x7f0000000140)=0x6f) sync_file_range(r0, 0x8000, 0x7, 0x6) sendmsg$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) 13:52:53 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:52:53 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) 13:52:53 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x40) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0xfff}, 0x4) 13:52:53 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xa24d, 0x80) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000180)=0xfffffffffffffff9, 0x4) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="5779ac8d9071a264a154e6", 0xb, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000440)={r0, r2}, &(0x7f0000000300)=""/243, 0xffffffffffffffdc, &(0x7f0000000400)={&(0x7f0000000080)={'tgr192\x00'}, 0x0, 0xffffffffffffff28}) keyctl$search(0xa, r0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:53 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200000, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0xffffffffffffb0d4, 0x4) 13:52:53 executing program 1: setrlimit(0x7, &(0x7f0000000000)={0x100000000}) memfd_create(&(0x7f00000003c0)='SEG6\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@ipv6_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x5865, 0x0, 0x0, 0x0, 0x0, 0x6}}, 0x1c}}, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xfff, 0x440) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000080)={[0x0, 0x2000, 0x100000, 0xf002], 0x6, 0x20, 0x6}) 13:52:53 executing program 5: unshare(0x2000000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x0, 0x831a) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x4, @loopback, 0xffff}}, [0x81, 0x7, 0x7, 0x401, 0x4, 0x9, 0x0, 0xfffffffffffffffb, 0x5, 0x4, 0x7a5f, 0x8, 0x101, 0x5, 0x27]}, &(0x7f0000000000)=0x100) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000180)={r2, 0x100}, &(0x7f00000001c0)=0x8) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 111.047884][ T8568] gfs2: not a GFS2 filesystem [ 111.052781][ T8571] gfs2: not a GFS2 filesystem 13:52:53 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xa24d, 0x80) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000180)=0xfffffffffffffff9, 0x4) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="5779ac8d9071a264a154e6", 0xb, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) [ 111.147823][ T8580] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 111.155447][ T8580] IPv6: NLM_F_CREATE should be set when creating new route [ 111.162665][ T8580] IPv6: NLM_F_CREATE should be set when creating new route 13:52:53 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB]) 13:52:53 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x208000) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000000c0)={0x5, 0x4, 0x4, 0x2000000, {r1, r2/1000+30000}, {0x0, 0x2, 0x8, 0x8, 0xd0, 0x6, "d9af2657"}, 0x8, 0x0, @planes=&(0x7f0000000080)={0x2, 0x7, @mem_offset=0x1, 0x1}, 0x4}) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:52:53 executing program 5: unshare(0x2000000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x0, 0x831a) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x4, @loopback, 0xffff}}, [0x81, 0x7, 0x7, 0x401, 0x4, 0x9, 0x0, 0xfffffffffffffffb, 0x5, 0x4, 0x7a5f, 0x8, 0x101, 0x5, 0x27]}, &(0x7f0000000000)=0x100) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000180)={r2, 0x100}, &(0x7f00000001c0)=0x8) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:53 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 111.255480][ T8580] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 13:52:53 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xa24d, 0x80) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000180)=0xfffffffffffffff9, 0x4) keyctl$search(0xa, r0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:53 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x8003) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x0, "3206a3286468c22c", "5d5083c05eea284eca669d62bac8c3c4dcf713dc8430dcec046501fd7b8737ad"}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x404c534a, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00\xff\x04\x00\x00\x00\xae\xc2\x00\x00\x00\x00\x00\x00\x00\x00\xe2\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7fv\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x24000, 0x0) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000080)={0x3, 0xca9}) [ 111.364963][ T8595] gfs2: not a GFS2 filesystem 13:52:54 executing program 5: unshare(0x2000000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x0, 0x831a) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x4, @loopback, 0xffff}}, [0x81, 0x7, 0x7, 0x401, 0x4, 0x9, 0x0, 0xfffffffffffffffb, 0x5, 0x4, 0x7a5f, 0x8, 0x101, 0x5, 0x27]}, &(0x7f0000000000)=0x100) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000180)={r2, 0x100}, &(0x7f00000001c0)=0x8) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:54 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xa24d, 0x80) keyctl$search(0xa, r0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:54 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB]) 13:52:54 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200080, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:52:54 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000380)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f0000000000)) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000040)={0x3f, 0x0, {0xffffffffffffffff, 0x1, 0x6, 0x2, 0x658b}}) [ 111.501704][ T8612] gfs2: not a GFS2 filesystem 13:52:54 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:52:54 executing program 5: unshare(0x2000000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x0, 0x831a) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x4, @loopback, 0xffff}}, [0x81, 0x7, 0x7, 0x401, 0x4, 0x9, 0x0, 0xfffffffffffffffb, 0x5, 0x4, 0x7a5f, 0x8, 0x101, 0x5, 0x27]}, &(0x7f0000000000)=0x100) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000180)={r2, 0x100}, &(0x7f00000001c0)=0x8) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 111.691722][ T8635] gfs2: not a GFS2 filesystem 13:52:54 executing program 0: semget$private(0x0, 0x2, 0x2) semget$private(0x0, 0x3, 0x88) semget$private(0x0, 0x1, 0x600) semget$private(0x0, 0x2, 0x500) r0 = semget(0x3, 0x4, 0x20) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:52:54 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:54 executing program 1: r0 = socket(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x3, 0xfffffffffffffffa, 0x100000000}, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={r1, 0x332}, &(0x7f00000000c0)=0x8) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0xffffffffffffffbd) write(r0, &(0x7f0000000200)="1b0000001e00a1eb0000f4ff080000000700"/27, 0xd9ae1a6d2ad506b0) 13:52:54 executing program 5: unshare(0x2000000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x0, 0x831a) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x4, @loopback, 0xffff}}, [0x81, 0x7, 0x7, 0x401, 0x4, 0x9, 0x0, 0xfffffffffffffffb, 0x5, 0x4, 0x7a5f, 0x8, 0x101, 0x5, 0x27]}, &(0x7f0000000000)=0x100) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 111.848762][ T8643] gfs2: not a GFS2 filesystem 13:52:54 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB]) 13:52:54 executing program 2: keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0) 13:52:54 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) 13:52:54 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) ptrace$peek(0x3, r0, &(0x7f0000000080)) semget(0x2, 0x4, 0x100) 13:52:54 executing program 5: unshare(0x2000000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x0, 0x831a) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:54 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) openat$userio(0xffffffffffffff9c, &(0x7f0000001280)='/dev/userio\x00', 0x242000, 0x0) sendto$inet6(r3, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 13:52:54 executing program 2: keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0) 13:52:54 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000040)={0x800000000, 0x0, [], @raw_data=[0x40, 0x7fff, 0x0, 0x400, 0x0, 0x5, 0x4, 0xcd4, 0x2, 0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0xc3, 0x6, 0x3, 0x3, 0x68b, 0x8a, 0x4, 0x3, 0x80, 0xf4a7, 0x6, 0x0, 0x6, 0x81, 0xae1, 0x1ff, 0x40000000000]}) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) [ 112.114902][ T8672] gfs2: not a GFS2 filesystem [ 112.119781][ T8675] gfs2: not a GFS2 filesystem 13:52:54 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) 13:52:54 executing program 5: unshare(0x2000000) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x0, 0x831a) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 112.254697][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:52:54 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x0000000']) 13:52:54 executing program 2: keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0) [ 112.348351][ T8697] gfs2: not a GFS2 filesystem 13:52:55 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x18) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x202, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x4, 0x5, [0xffffffffffff2afd, 0x3, 0x8302, 0xc7a, 0x7]}, &(0x7f0000000100)=0x12) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000140)=r1, 0x4) bind$netrom(r0, &(0x7f0000000040)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2}, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 13:52:55 executing program 5: unshare(0x2000000) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x0, 0x831a) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:55 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[]) 13:52:55 executing program 2: r0 = add_key(0x0, &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:55 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) openat$userio(0xffffffffffffff9c, &(0x7f0000001280)='/dev/userio\x00', 0x242000, 0x0) sendto$inet6(r3, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 112.520579][ T8708] gfs2: quota_quantum mount option requires a positive numeric argument [ 112.605292][ T8708] gfs2: can't parse mount arguments 13:52:55 executing program 0: semget$private(0x0, 0x0, 0x500) semget$private(0x0, 0x3, 0x200) semget(0x1, 0x4, 0x9) r0 = semget$private(0x0, 0x1, 0x1) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x8300) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000040)) 13:52:55 executing program 5: unshare(0x2000000) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x0, 0x831a) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 112.641925][ T8722] gfs2: not a GFS2 filesystem 13:52:55 executing program 2: r0 = add_key(0x0, &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) [ 112.730020][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:52:55 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB]) 13:52:55 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x0000000']) 13:52:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r1, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xc000}, 0x20000000) connect$netlink(r0, &(0x7f0000000340)=@kern={0x10, 0x0, 0x0, 0x1004}, 0xc) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f0000000300)={0x0, 0xffffffffde8fe1f9}) sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="20002dbd7000ffdbdf250b00000008000600040002004c0005000800010069620000080001006962000024000200000000000000000308df03000800000008000200fcff60cd61b85be05cffff080001001e0000000c000200080004000100008008"], 0x68}, 0x1, 0x0, 0x0, 0x4000044}, 0x4040000) 13:52:55 executing program 5: unshare(0x2000000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:55 executing program 2: r0 = add_key(0x0, &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) [ 112.900840][ T8751] gfs2: quota_quantum mount option requires a positive numeric argument 13:52:55 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) openat$userio(0xffffffffffffff9c, &(0x7f0000001280)='/dev/userio\x00', 0x242000, 0x0) sendto$inet6(r3, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 112.986847][ T8759] gfs2: not a GFS2 filesystem 13:52:55 executing program 5: unshare(0x2000000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 113.026941][ T8751] gfs2: can't parse mount arguments 13:52:55 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x40, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000100)={0x292, 0xfffffffffffffffc}) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002500)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000002600)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002640)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000002740)=0xe8) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f0000000180)='./file0\x00', 0x5, 0x7, &(0x7f0000002440)=[{&(0x7f00000001c0)="c05bd424ec04b9d0b0ac782b37057dc2a7b1431700443d45942044695579f2fbed17c4fe47ad1bab8d81add5810e19ee53f6a4950aa8d393698a0fd0776aa9e04149bb20fdf56825ac1bc6c1188963cceb70fca4aed9109df0055c431deb90faf61492e5993db00f63962d835230033799037624b04f0f122c713508edd242d18a0e88c556b06a39339a7a87189377d3b871a204d58547955d6153e6f99a3bfd8c28adf229126edd08f90363679fcb631ff75f3a32005eae414ecc745aeac2b07d89ae04f13c7f7a5999c0f7918b053b1d709450dd51aa38fb80ef7089abf0a71a5fd7d2a4", 0xe5, 0x753b}, {&(0x7f00000002c0)="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", 0x1000, 0xfc}, {&(0x7f00000012c0)="039441de3958b42ae1a743a87a538768c8a98323d35f9f27cab316642ea3c96e10ec740ab06b497d9bbd0715", 0x2c}, {&(0x7f0000001300)="896e79246df3205562d9ead1d71ce7544517dfd20d9868b975b47625308c07db7b37d63e2bbc73085b6f8a8617fdac475b6567b51fd8cf090c87245d70fecc647bbe997368a1a988c6be5355d9567978", 0x50, 0x3}, {&(0x7f0000001380)="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", 0x1000, 0x4ee45b66}, {&(0x7f0000002380)="0e33c1d24d886699e208c854eff878f61407e0226be1319a24b90a517daba027865f54bbdb3d4d6a041addda766fcee14401adacde70828292a2170aa33a7bc3525b18e603f7ce66e43be0e2db2e54905a9a6e3bab8085d5", 0x58, 0x5}, {&(0x7f0000002400)="33f4060e22d994286b1b5939fdd3d60638b64493c524cb163ca4dfa0b4efee758a7346d0893feb2452", 0x29, 0x5}], 0x800000, &(0x7f0000002780)={[{@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@noacl='noacl'}, {@user_xattr='user_xattr'}], [{@uid_gt={'uid>', r1}}, {@uid_lt={'uid<', r2}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@obj_type={'obj_type', 0x3d, '/dev/sequencer2\x00'}}]}) 13:52:55 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) [ 113.203987][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 113.239867][ T8778] erofs: read_super, device -> /dev/loop0 [ 113.294581][ T8778] erofs: options -> user_xattr,nouser_xattr,noacl,noacl,user_xattr,uid>00000000000000000000,uid<00000000000000000000,mask=MAY_WRITE,obj_type=/dev/sequencer2 13:52:55 executing program 5: unshare(0x2000000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:55 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:55 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x0000000']) 13:52:55 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) openat$userio(0xffffffffffffff9c, &(0x7f0000001280)='/dev/userio\x00', 0x242000, 0x0) sendto$inet6(r3, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 13:52:55 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB]) 13:52:55 executing program 5: unshare(0x2000000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 113.335854][ T8778] erofs: cannot find valid erofs superblock [ 113.422555][ T8797] gfs2: not a GFS2 filesystem 13:52:56 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) [ 113.443529][ T8800] gfs2: quota_quantum mount option requires a positive numeric argument [ 113.449904][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 113.483614][ T8800] gfs2: can't parse mount arguments 13:52:56 executing program 0: rt_sigpending(&(0x7f0000000000), 0x8) semget$private(0x0, 0x2, 0x122) r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x800, 0xd73221b959b02ae0) symlinkat(&(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') 13:52:56 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB]) 13:52:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:56 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) openat$userio(0xffffffffffffff9c, &(0x7f0000001280)='/dev/userio\x00', 0x242000, 0x0) sendto$inet6(r3, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 13:52:56 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:56 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktab']) 13:52:56 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x200000) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f00000000c0)={0x0}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000140)={r1, 0x80000, r2}) r3 = semget$private(0x0, 0x2, 0x200) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f00000001c0)={0xaf, 0x9, 0x4, 0x80000, {}, {0x6, 0x0, 0x2, 0xfffffffffffffffa, 0x5, 0x9, "5eb16b56"}, 0x4, 0x3, @offset=0x3, 0x4}) semctl$IPC_STAT(r3, 0x0, 0x2, 0x0) semctl$GETVAL(r3, 0x0, 0xc, &(0x7f0000000000)=""/150) [ 113.793399][ T8824] gfs2: not a GFS2 filesystem 13:52:56 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:56 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgr']) 13:52:56 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 113.871690][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 113.910922][ T8839] gfs2: invalid mount option: locktab 13:52:56 executing program 0: semget(0x2, 0x7, 0x200) r0 = semget$private(0x0, 0x7, 0x40) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x5) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000200)=ANY=[@ANYBLOB="03000000000000000400000000000100010000000000010001000032e5ff230001000000040000000000000000000005000000000fee00800000a8070100000081000000ffffffff0900001b04000000000000000000000000000000010000c006009b42a82cdd85a8e400000100000003000000030000000700070000000000000000005cbcfdb77d580d19982275c0eadb10c4fec447b9e8e4bdaed47830ad1eb947fa2751204a689366632157f7a032731f7d910e20bf89f00a48830dac2f8b10a269e976cf6d31abbb4a3952ab9ac4"]) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:52:56 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) openat$userio(0xffffffffffffff9c, &(0x7f0000001280)='/dev/userio\x00', 0x242000, 0x0) sendto$inet6(r3, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) [ 114.050808][ T8839] gfs2: can't parse mount arguments 13:52:56 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) [ 114.071185][ T8852] gfs2: invalid mount option: norgr 13:52:56 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 114.093495][ T8852] gfs2: can't parse mount arguments 13:52:56 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgr']) 13:52:56 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) [ 114.262824][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 114.290375][ T8878] gfs2: invalid mount option: norgr [ 114.323264][ T8878] gfs2: can't parse mount arguments 13:52:56 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktab']) 13:52:56 executing program 0: socket$bt_cmtp(0x1f, 0x3, 0x5) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f00000000c0)={0x0, 0x0, 0x2080}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002140)={0x0}, &(0x7f0000002180)=0xc) ptrace$peek(0x3, r2, &(0x7f00000021c0)) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000002200)=[0x3], 0x2) socketpair(0x12, 0xf, 0x4, &(0x7f0000000000)) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000022c0)='/dev/null\x00', 0x408001, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r3, 0x541b, &(0x7f0000002280)) r4 = semget$private(0x0, 0x3, 0x8007e) semctl$IPC_STAT(r4, 0x0, 0x2, 0x0) 13:52:56 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:56 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:57 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:57 executing program 0: semget(0x3, 0x3, 0x20) semget$private(0x0, 0x5, 0x2) semget$private(0x0, 0x4, 0x4) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') r0 = semget(0x1, 0x7, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) [ 114.459669][ T8889] gfs2: invalid mount option: locktab [ 114.478777][ T8889] gfs2: can't parse mount arguments 13:52:57 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:57 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) openat$userio(0xffffffffffffff9c, &(0x7f0000001280)='/dev/userio\x00', 0x242000, 0x0) 13:52:57 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgr']) 13:52:57 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktab']) 13:52:57 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:57 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = semget$private(0x0, 0x7, 0x202) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/4096) r1 = syz_open_dev$swradio(&(0x7f0000001000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000001040)) 13:52:57 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:57 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:57 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) listen(r0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000340)={0x0, 0x0, 0x6, 0x9}) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000040)=0x82) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000100)={0x9e0000, 0xffffffffffffffa3, 0x8000, [], &(0x7f00000000c0)={0x990904, 0x0, [], @p_u8=&(0x7f0000000080)=0x8001}}) 13:52:57 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) [ 115.038912][ T8928] gfs2: invalid mount option: locktab [ 115.045724][ T8925] gfs2: invalid mount option: norgr [ 115.054448][ T8928] gfs2: can't parse mount arguments [ 115.067540][ T8925] gfs2: can't parse mount arguments 13:52:57 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) [ 115.092026][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:52:57 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:57 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,loc']) 13:52:57 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrpl']) 13:52:57 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:57 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 115.319869][ T8955] gfs2: invalid mount option: norgrpl [ 115.325445][ T8955] gfs2: can't parse mount arguments 13:52:57 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:57 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrpl']) [ 115.388459][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 115.403474][ T8960] gfs2: invalid mount option: loc 13:52:58 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2000, 0x0) syz_mount_image$minix(&(0x7f0000000200)='minix\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x4, &(0x7f00000014c0)=[{&(0x7f0000000280)="5dcdb37c3e6285562b62be8702b40c2bd173d062a811bb21712342f80b5c131f620690d8f4a9ed2006ef82cb7e6839d3b63a5e41542375bfbe8efc46ec9a21961b5c6372cb10b8c11467584fbc413ce786836fb8d334d30f8c8937dc5621a1387fe3ca8d9dbf55d5ac7c22027e9b81e099474de2268e53897a9926c0035d1178e890882e6d454edbac1ae90c96a7bfc266497ce4c9059e75bbd171262c50c4f5bd0b4ba5c74fc982bd496ec06a2eed336f7a5a71225a3961951d4128bb177a70f3764283fadf3bb53ced3ffa953f4fa67ca119b65dac0214f27a560c3f58afcea04323244622778cbb53721a194aa54ef29d946dcaeb94577ada4652f4c8e5785d76c0d426d47e96cf98a29fd8497cd6d3e1a26d09f7a6a92352b19c2ee650bc02a5ede7a1b8d0fe1ef97f2f367b82dd72e71bf36cbeaad50da5c7e8ed7b1078fddf48228d9c9c2d91692c785ec5d1b95a3bf149fa2cd0caf6b5e62913cd3bad772049c6d88a97c57f9f78638edd9fa01e7e7bc17c001bb5883af8683b6189fd026242ed183022122474f77d735046f28dca9d6093ba2b623cdcd3a1651b26b1433f3cfae1f5b061f91b89993a39b72022161f7058985a9f9e6ce1a07c788cff48d60f9fe38638fe25f60e74c2b2b0e27d19a4e059f6af428813d1277caf233597a015571433d66ef0acb35bd4fad7d9d8d85ee23d7d58fac309d51c980c380eb42c60781bdeca4eba139f0be3d1509544bc21e2db172c6db623d524541c3c31740a8cc846e0197e34559c587174fe618a560b741ea0527f4c6304e9c9a376b94a3056a6266eb95779457ff2f9ab3ed9db13cdae96c0c7cdc6acaba3fadc5d2f870eb730ab7f82fb2db43de8dd20f80d214883f1d893ac08e8c29783c0a2fc01a7ae576f6b692021a40a0577d175343f3761a397108eefe1a021bbe31895e6614ff13c68704c7c3fc9952c90e3a203ac34b3f8102fb4043ceb30f8e0bbdc713603eca4bd30ae6d061bc06f603bfd58264696b9362e360fb3984bb711d1d42b997305481226a7d15b5c721f68ce3b71897e1484de5db3a8914061d2dfab99ef95e4237e26310600154331ca404b8640a7880e9d82d35440606cfc3c5b225d41430c86401cc216cd685bf61d6a64a4c3b8d38ec0e97448f50cf98a62dcb021429ea4ae7b5296952d0dd3be7e1e346ff16957df9d2191bbc63432bf9774badf239b509be7f38214569766694b84ed76b23010297bc1285229a64edf516bcf2eddfbb30e2f25aaa892cb0168f2cdff437f6fe9c2a2c42d163f2ec66bf3f3f3e1ee321f80843134adbb814acd9919a8ea4f419c403a3795411773f5b0be405d1f4f7bcd7e79d19bc67984db639486bd5b7d90b57eae20bd4b64f5411429abc2c5fa5b898983d1675049342890c92a6217c6b9631066dccd510a0e3830138483f5ecb4c9bb0e65d30d15a1adcafb0d1963b912ac0394d7bf8ca69e8225d246b8d885887e98ae80090b5366577a70fe0ed340bf5cb16799127158567c2d1e9a1a87d95a58e8e5d51c4ab7e5b8ace637d788fa1b770390b8d0ee8ff017a9db172a6d7ea695b757b9ff5c098147d2ca7a450a746857727dc20bae810dba3b8ea0a129a8273b9df1c1a242d05efbea37c3e0cd906851bf824dc5fc28de2e0652bc7175fdca9f4068c932e76eb873465eed9e31bbc945ec2e1af2fb7b812df67094f60619d64f5471e6b6173c442832989c61562c70c3506f516447ce624773e75428ba5d243f0cee198add6c0900478bfb21f60532bc2d2193605731ea55e374e1c0497916aaa079d7284991d3a364c1f72786a22168c1cb3d1ad74900d2a6aab7ea8a99bcfe50c0c4862c93c25ff1860e4411ffcc1f37cedcb718beecb10e8c42d33a6db3c5a4c38e41e4ccb5c89b95ecd68b11586eddc64389c5dcf8478b8c91d0c71ede3ff52ac1bfd004d322e2e9269d6a1407b4333a2a0e40bd767d832dedd8874d80ef988e3fd9d917dd03d8a6f24464e17bb5fc87660a974ec9e85dc6e8e4226c3416cd1219e3f30afb9cad24872c63de54a93d61fa84f91ba0780bba18ccc2cc0b642de0b12e4892e1eb797b5d0ba9372a00ca159a38e0be8b23799e68ca3e51e07ef37519faf613d0cb3940e797a82947e7e1d01b2fc90c3374f33b7fdd0f2924b2415f55411bd97cb7effd1dcb0f8a1656e5d70e183fbc868361a51f1676026f9fe2926604945c2564672c6812671a4f3bac717d10ea22d4d7889d48d33e6c8956a309362d014ce77c7b39ee5a99f3d0c42b8091e04bf204e6db2018e2c240da147d4399509e6789c34299a5f489d9cae2d4cce94e656e86f9f429a2fe23f3939f63b4433662a614f0ee823cc11846aa315631a1b1322f930a2173c07a1ebf3a639bd2a4b0c27d0776ce959e71de3ee338a685e20873e422a477c44ff4aa09740c01f761578e7a63724386ff23412a247ee2efec60b0554d1d79191c87b3d172c8f28cb8dc083eb9755a3c7e365aa6a39f01413b1622d542d61ef6b25c9473c98750aa03039e828079d3e1dab098d86f11e15b5151bc9d06732883f323e5e6d96ac8cb8e265583e4b91cfe067642e7c5c00f33f7aed2f6a3984cbb5522708c595c29c6fc5b7cf3231c6384be3fd97129b67736698d5feba2caf05df938d3af9d713e03a9da711f9669a7d2479f84e4a89bdfbb5d719a9e392f6efa83308e46d71ba2995316e128cd7880036db3feef13cb6e406b5cf54e58237d3155762ecc0b4ef5e572857de7f72f9f0e494c8b772d182adf5b698dbac493026065658fbd7ed8626844b30c4706048e9e62ba09b1bea7462c05a11504f8e6a0305e8670c219bc0c22c8c5778d5926c36b5e80682f876f4f58964f2ad227173c4321a1a28fbc71b11a242f211e72effba522153be91d06e84b2ffc1e3efa8b33ebad9c7da43d9cf1928a9ae49e8880ee868e9d5a10e7a48062046ee4e0a75e5785c944c72366b936292eeec1a3c2ddd93353fe4cb7733b2c45f6c567b0681757e261cd69fe246a16cd788566dba391c70d2909c2e90683484c1be897f8a3f80ec6e9bea1f3848a2e46bff1cebf03a15cd60deb4ade82848d20a93d39b6ff5615c9d6ac1f8746b6d4a46d6da8dccbd45d6c8bef6afe9037cf87c5bd7782cdd350b8f00c8c658bab5bc32ff9d0167d072da855ee3e5a9f52a54cb6aa229240fb2e309d85ae9c51215b8a63684829f5e769ddf176cc1bf470eeadd3faf40b977b9984e67c3fa3932341f30958cc3248f6acdab400df85c763f69422981343c3eab34b99cd1fb0f51ffe4aa2bd7781b03d11330fefc7a2221f8bddf33bef32bb01990b0d426eccd8d930383e0dad9e56029ad5bb23ea6bc267fa723f50c3037ae0d38c90e872153ec4e630489447e72a3bf83293faa5d80f05c6681e34226d4fcb15bb300ef09c54cf4ed773716c7cb2bff6153c2ca567b493be25f592e872584f5db2f97d77a43aac4b897b26315cd262dbd308b01d483ebded3e32cc584aa7bc3157a45f9f0770cf3b786136dc0dec74a6985774f034016a66b835c9980a45eb01b0d8e435167542ebf86397d2ef0ac1fe9be49b75c167c061c7e658b7a14d7218be532042d869ea55603351e2ec3b3789e3d071f36dbbbd029d5d961391c54a56113f43bd5d5e2acc3b472fdf1a4851881506a27fdd573c4b04ecb7c27068516e6fb97fb1e05f2f4154a26ac949587f6df88c7671f53b2832c68869dfd4b69245bc765db3a7dc74821fa1616e35f37686f6a2ccd2901c260f152d67d242725e27a6ce109ee3740098510203d2abed3e52a3598b1fd741d5325346585113da0945bf59044f0c20ebbced14b735ab4f3283b0b14534ebdf67f1414ee2d799732a443ca072ae41b3548b65c498a8fcdc6eca5a606749a68ab91b5661f92f7f05fb3b8f56f96874bf30b126a903899baba2c20e9b22c2b79a026295369c4dd146208ad5470322bb773b65cf348f358275aadea3aebe1fd31039711a1eabd3b0bf8bef7aef5cd77e19168131962dad9198f3f3ac007e9e5db0037783e66ac220167682269bb43ed0ffb3c6ae6c34e1b857d22e60e6869aa5504ddd154f977660c4f2035374cb1904187d1c3c1f559c28ca626df9bc56e27b0ad309a5b7b5a4311fa6c11fc3c17cc7af1b71b1d3a4e983808491369595b3c10200dd8b8cf2358ead87495fe6c757f7b0710e7060f3f7a71575df00e3437012731a5dfc3dd7bbb08b23be1399235b72afc6973ad696ca01d56c5cd736464abd477abca999e705f8c8f12afa6950039d75d9908fc7cd75e13ffc1077bbfc611d087e55a7b89275e2eb0854bb8b13c7fd63e68bddbb67f9203321f39386654c6179647a979b8ddadc3ea60183034dc58fa24bb2d351fbb9bf25652347efe091d9e97fcfb7fb2f37f37d9aa3cb913694149f9bfcdb1bb859cde1151266c11076a691617aac0723d52e2b70918280295e048fa6ae10663284b1984ed5d4c56839d5c21b1a79d332e662732174ad3d7ab441a6d70f51d497d0ed83a8bcc7c2429fd404fa1f5d69961552d4eef34ab6467612f1445480f6553b8e0d1b7fd5d557bd931fe33896da40c7ad3a5a31565d96eb4d86f63aff5dac0dae26121a60e06cb37899bedbc4a2a9d93d5ffd122be8d529bebddfcbbfad6c92f3361a95838688274473a72dd7e719e050eb84bb697c0a088108c56b6a5eee3dc5146fb90501c0fea7645527dac092016d4a785e940534a600b604ca3e304389b64a090162ea4cf35048bea213cc807bbfbb60f47a41585551099ba678ba85cbe3953fa83fee53ed2e1602303377698aa0ed6ceb5a6ae4ccede2f730af3c3ca64ad90a133f409ffc6f3e00c1ccbc3ae2433c87c8c5319de752ec444cb1a680c37f5566cd752bdcd764441d5af5bb96b7e66406ce577c01139e87caa98b914a4e6c24024edad051ebc760ce5aa4186db6ff81116ff4a1ef5cd6113c1f58eb77689210a754edac4012f520909bf1b402de2d55e732dd225c3462930a70af698b2d59c1f034a7c09b972cbe9b6b58b1e3fa3f7b80797b4bdd80d8b681188dcbdec0f5c5ca859eadec1c7c9c66c1a941199ec9e9d38253295c32ae6dfc90fe718b94d7d9a74f95db4ff2ed7a72ae6325363b51a875046bb2eee9692ad94e6ae04262bbbbcbd8af76a2755dd05f425e0b3067b7ebeafb3452b5515115a2e0ec9b7189bec2e1ff71bfb74545525c8ecb3c1618e5f1db8d168d052e9fbbf0d412c875fa07a960cfb8a5c376d1d2bbfb48e1de734019f9315fabbff0770041f975ae156399fc766c9068f2a7a5000277b1af667979dcb684cf032f567b6d0edfc0d69c1e4e4d57e5345cdbc41ff12cb5f28ad2d9dbb3845592676081b8cd30e1708985ef62d511aff420c130385db267d9457fde0147b53bebed36ad8871131c61adec71075bfa564fd20871a0bbef17f3ce928cfb50f620e3359839a372d6651f564fc7c4db033462bfdcd5cc6c49c033a74ac8f3d5ecd2376a050db0cd46325bd0b82a726b3df88af4da335d1157b03683c0924d40763455ba7f247e223bc9a04c48f57c26a4f0fcf4515cb5a73d7da07f9cded436207504a566b7fc4a1c9bbf0fc5cc63eef33d77638056765e5d03a0934334b5689dda1010fa14806c7834b5cdacc10980c2381fb399ee077a307570de38b55105e7d0d77434df899c30b1b3ed55b15283f0f5c56eff9f947c2edb9bfab8df5bd6161c17d2442eb1633edd5b734e512e4181fa806e3fc5c6d627269c07416c5368a4692bf63360b803", 0x1000, 0x80000000}, {&(0x7f0000001280)="8f0b3cd9fe0d56cbb734ce64ebf219caeff73e2fde82dcda47036a36259ca2a4e4cd23478e5a330ec81a22347c1cac0de156bff33f68d6ddf82abfd5a38ae3099392d20231cc4b389ee33ecaf8a5f2e5b8436774b3e9de29e57b1544b65817c515e241d6fcc0e4e4e50bbaeb11de50a8f7195927ffcab1383bee2b1374b87b85b551539754326ef880c1f54b1674d9f25ef0654dea81", 0x96, 0x5}, {&(0x7f0000001340)="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", 0xfe}, {&(0x7f0000001440)="ca98aafbd800e24ba476433e66b59507d1d6057b20a94f2487dbb18951e478ecdd31b9934027fa9cadc03c2d98a809fdf646b6c44f82ea0bb3976a29966b886a032114fdb788f1d5e744a9272696b6dfbdef", 0x52}], 0x804020, 0x0) r1 = accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f0000000080)=0x1c) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000180)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r2}) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20, 0x80, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000000}, 0x1c) 13:52:58 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 115.437362][ T8960] gfs2: can't parse mount arguments 13:52:58 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:58 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:52:58 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,loc']) [ 115.603935][ T8979] gfs2: invalid mount option: norgrpl [ 115.625580][ T8979] gfs2: can't parse mount arguments 13:52:58 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:58 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:58 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) [ 115.680105][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 115.787101][ T8998] gfs2: invalid mount option: loc 13:52:58 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = socket$caif_seqpacket(0x25, 0x5, 0x5) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp6\x00') getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000000)=0x1000, 0x4) 13:52:58 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 115.820360][ T8998] gfs2: can't parse mount arguments 13:52:58 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:58 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrpl']) [ 115.938185][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:52:58 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,loc']) 13:52:58 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:52:58 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:58 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) [ 116.066670][ T9025] gfs2: invalid mount option: norgrpl 13:52:58 executing program 0: semget(0x1, 0x1, 0x0) semget(0x1, 0x3, 0x2) getpeername(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}}}, &(0x7f0000000400)=0x80) r1 = getuid() ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000440)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r1}) r2 = semget(0x3, 0x2, 0x0) semctl$IPC_STAT(r2, 0x0, 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x200bbdbb029eba0c) bind$rose(r4, &(0x7f0000000340)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5, [@bcast, @null, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x40) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x12}}}, 0x3, 0x1, 0x0, 0xa47, 0x1}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x78, &(0x7f0000000140)=[@in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e20, 0x101, @initdev={0xfe, 0x88, [], 0x400, 0x0}, 0x100000001}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e24, 0x80000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000240)={r5, 0x1, 0x5, 0x13, 0x7, 0x2, 0xca30, 0x6, {r6, @in={{0x2, 0x4e24, @multicast1}}, 0xfffffffffffff7f9, 0xafc, 0x1bf, 0x1, 0xffffffffffffffff}}, &(0x7f0000000300)=0xb0) [ 116.145206][ T9025] gfs2: can't parse mount arguments [ 116.181799][ T9036] gfs2: invalid mount option: loc 13:52:58 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:58 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:58 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) [ 116.225877][ T9036] gfs2: can't parse mount arguments 13:52:58 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplv']) 13:52:58 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:58 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localfl']) 13:52:59 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:59 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={0x0, 0xa1f3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000040)={r1, @in6={{0xa, 0x4e24, 0x7, @mcast1, 0x80000000}}, 0x7, 0x8, 0x4, 0xd59, 0x20}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0xfff, 0xc, 0x10001, 0x0, r2}, &(0x7f0000000180)=0x10) 13:52:59 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) [ 116.522369][ T9065] gfs2: invalid mount option: localfl [ 116.529613][ T9066] gfs2: invalid mount option: norgrplv [ 116.554953][ T9066] gfs2: can't parse mount arguments [ 116.560342][ T9065] gfs2: can't parse mount arguments 13:52:59 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:59 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:59 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) r1 = getpgrp(0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f00000000c0)={{0x2, 0x589}, {0x98, 0x6}, 0x0, 0x2, 0xe83a}) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000200)=0x100800) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xf4, 0x0) kcmp(r0, r1, 0x0, r3, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='%em0posix_acl_access?\x00', 0xfffffffffffffffc) r5 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="8c19ce367b79ca5bbed6b20c529878561d2906b98f9789b1e62b1b7f606108aa2a98d1921c7b63172c9aa1be56e60091d9ec70c6074ba43c30c4c5b4292a7c0ea408eb0e3ae1835c6d1a69291677d55a87d755f1fa07898501903b8b44c7d626a695bd8cee4dad605c5cd8e4c6904b3b6cfa40034ed46af0d79d5bc540e418e422dee8d96ca2e87c695b4e96d4844f64fdb58d56cca21f7085ccfe4ce8e7c1662e177afec380087f99aa9b346bf5be38f0", 0xb1, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000240)=[{&(0x7f0000000200)}], 0x1, r5) 13:52:59 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:52:59 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplv']) 13:52:59 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localfl']) 13:52:59 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:59 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:59 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200000, 0x0) r1 = getpgid(0xffffffffffffffff) syz_open_procfs(r1, &(0x7f0000000200)='io\x00') preadv(r0, 0xfffffffffffffffe, 0x0, 0x13) r2 = gettid() recvfrom$rose(r0, &(0x7f0000000080)=""/209, 0xd1, 0x1, &(0x7f0000000180)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, 0x3, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x40) sched_setscheduler(r2, 0x5, &(0x7f00000001c0)=0xe3d7) r3 = syz_open_procfs(r2, &(0x7f0000000000)='net/llc\x00') pidfd_send_signal(r3, 0x21, 0x0, 0x0) [ 116.847287][ T9097] gfs2: invalid mount option: norgrplv 13:52:59 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) [ 116.900273][ T9102] gfs2: invalid mount option: localfl [ 116.922049][ T9097] gfs2: can't parse mount arguments [ 116.937113][ T9102] gfs2: can't parse mount arguments 13:52:59 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:59 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:59 executing program 4: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplv']) 13:52:59 executing program 0: semget$private(0x0, 0x0, 0x0) r0 = semget$private(0x0, 0x2, 0x80) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:52:59 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:59 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localfl']) 13:52:59 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) [ 117.167997][ T9130] gfs2: invalid mount option: norgrplv [ 117.226105][ T9130] gfs2: can't parse mount arguments 13:52:59 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:52:59 executing program 0: r0 = semget$private(0x0, 0x0, 0x2) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2, 0x0) ioctl$RTC_AIE_OFF(r1, 0x7002) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:52:59 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:52:59 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 117.262275][ T9140] gfs2: invalid mount option: localfl [ 117.283854][ T9140] gfs2: can't parse mount arguments 13:53:00 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:00 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localfloc']) 13:53:00 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:00 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:00 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:00 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6, 0x0, r1}) [ 117.559080][ C1] net_ratelimit: 2 callbacks suppressed [ 117.559168][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:53:00 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:00 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) [ 117.610037][ T9168] gfs2: invalid mount option: localfloc [ 117.638866][ T9168] gfs2: can't parse mount arguments 13:53:00 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:00 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localfloc']) [ 117.776302][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:53:00 executing program 0: semget$private(0x0, 0x0, 0x41) semget(0x0, 0x6, 0x80) semget$private(0x0, 0x2, 0x41) r0 = semget(0x2, 0x1, 0x80) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) r1 = semget$private(0x0, 0x3, 0x522) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000200)=""/67) 13:53:00 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:00 executing program 4: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6, 0x0, r1}) 13:53:00 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:00 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 117.848614][ T9194] gfs2: invalid mount option: localfloc [ 117.880685][ T9194] gfs2: can't parse mount arguments 13:53:00 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localfloc']) 13:53:00 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:00 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) pipe2$9p(&(0x7f0000000000), 0x800) 13:53:00 executing program 4: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6, 0x0, r1}) 13:53:00 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) [ 118.098666][ T9220] gfs2: invalid mount option: localfloc 13:53:00 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 118.178661][ T9220] gfs2: can't parse mount arguments 13:53:00 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:00 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:00 executing program 0: semget$private(0x0, 0x0, 0x10) semget$private(0x0, 0x20000000002, 0x416) r0 = semget(0x3, 0x2, 0x8) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:00 executing program 4: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6, 0x0, r1}) 13:53:00 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localflock']) 13:53:00 executing program 4: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:01 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:01 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:01 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:01 executing program 0: [ 118.462082][ T9253] gfs2: invalid mount option: localflock [ 118.509894][ T9253] gfs2: can't parse mount arguments 13:53:01 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localflock']) 13:53:01 executing program 0: 13:53:01 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:01 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) [ 118.656149][ T9275] gfs2: invalid mount option: localflock 13:53:01 executing program 4: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) [ 118.697990][ T9275] gfs2: can't parse mount arguments 13:53:01 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:01 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:01 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB='norgrplvb,quota_quantum=0x000000000000006e,locktable=(,localflock']) 13:53:01 executing program 0: semget$private(0x0, 0x3, 0x4) semget$private(0x0, 0x3, 0x8) r0 = semget$private(0x0, 0x6, 0x400) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:01 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:01 executing program 4: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:01 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:01 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:01 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x840, 0x180) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) [ 119.038459][ T9312] gfs2: invalid mount option: localflock [ 119.044148][ T9312] gfs2: can't parse mount arguments 13:53:01 executing program 4: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:01 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:01 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:01 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:01 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:01 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:01 executing program 3: semget$private(0x0, 0x3, 0x4) semget$private(0x0, 0x3, 0x8) r0 = semget$private(0x0, 0x6, 0x400) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:01 executing program 0: semget$private(0x0, 0x0, 0x1) semget(0x3, 0x0, 0x110) r0 = semget$private(0x0, 0x2, 0x186) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:02 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:02 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, 0x0, 0x400, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:02 executing program 3: semget$private(0x0, 0x3, 0x4) semget$private(0x0, 0x3, 0x8) r0 = semget$private(0x0, 0x6, 0x400) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:02 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:02 executing program 0: r0 = semget$private(0x0, 0x1, 0xc) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:02 executing program 3: semget$private(0x0, 0x3, 0x4) semget$private(0x0, 0x3, 0x8) r0 = semget$private(0x0, 0x6, 0x400) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:02 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, 0x0, 0x400, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:02 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:02 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:02 executing program 3: semget$private(0x0, 0x3, 0x4) semget$private(0x0, 0x3, 0x8) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:02 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$rose(r0, 0x104, 0x6, &(0x7f0000000200)=0x46, 0x4) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x8000, 0x0) r2 = semget$private(0x0, 0x1, 0x4) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000300)={0x0, 0x1}, 0x2) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x3, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000340)=0x101, 0x4) getpeername(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) getsockopt$packet_buf(r3, 0x107, 0x16, &(0x7f0000000080)=""/175, &(0x7f0000000140)=0xaf) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) semctl$IPC_STAT(r2, 0x0, 0x2, 0x0) 13:53:02 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, 0x0, 0x400, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:02 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:02 executing program 3: semget$private(0x0, 0x3, 0x4) semget$private(0x0, 0x3, 0x8) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:02 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:02 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:02 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:02 executing program 4: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:02 executing program 0: r0 = semget$private(0x0, 0xfffffffffffffffc, 0x1ff) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) semctl$SEM_STAT(r0, 0x5, 0x12, &(0x7f0000000000)=""/4096) 13:53:02 executing program 3: semget$private(0x0, 0x3, 0x4) semget$private(0x0, 0x3, 0x8) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:02 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:02 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:02 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:02 executing program 0: semget(0x0, 0x2, 0x300) semget$private(0x0, 0x1, 0x10) r0 = semget(0x0, 0x4, 0x4d3) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:02 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:02 executing program 3: semget$private(0x0, 0x3, 0x4) r0 = semget$private(0x0, 0x6, 0x400) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:02 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:02 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:02 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:02 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:02 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x10001, 0x40000) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000040)) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:03 executing program 3: r0 = semget$private(0x0, 0x6, 0x400) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:03 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:03 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:03 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:03 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:03 executing program 3: r0 = semget$private(0x0, 0x0, 0x400) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:03 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:03 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) [ 120.664799][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:53:03 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:03 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:03 executing program 0: r0 = semget(0x0, 0x1, 0x10a) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:03 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:03 executing program 3: r0 = semget$private(0x0, 0x0, 0x400) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:03 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:03 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:03 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:03 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xfffffffffffffffc, 0x408800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r1, 0x17}}, 0x10) [ 120.912997][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:53:03 executing program 3: r0 = semget$private(0x0, 0x0, 0x400) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:03 executing program 1: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:03 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:03 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80001, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000040)={0x0, 0x3, {0x0, 0x0, 0xd0a, 0x3, 0x3}}) 13:53:03 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:03 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) [ 121.164269][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:53:03 executing program 3: r0 = semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:03 executing program 0: semget(0x0, 0x42, 0x1) semget$private(0x0, 0x4, 0x1) semget$private(0x0, 0x4, 0x460) semget$private(0x0, 0x3, 0x0) semget(0x1, 0x2, 0x1) r0 = semget$private(0x0, 0x0, 0x80) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000000)={0x9, 0x3, 0x8, 0x6}, 0x10) 13:53:03 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:03 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:03 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:03 executing program 1: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:03 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:04 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:04 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x101000) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)) [ 121.458600][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:53:04 executing program 1: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:04 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:04 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x88001, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000100)=0x20) r1 = semget(0x0, 0x2, 0x80) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1f) semctl$GETPID(r1, 0x3, 0xb, &(0x7f0000000200)=""/12) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x100) ioctl$void(r2, 0x5451) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0xffffffb9) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x8, 0x3, 0xffff, 0x7, 0x0, 0xf16, 0x20, 0x1, 0x10001, 0x40, 0x400, 0x0, 0x17b, 0x7b, 0xfff, 0x7fff, 0x401, 0x1, 0x3, 0x609ba4dd, 0x0, 0xff, 0x4, 0x51, 0x3, 0x9, 0x100000001, 0x800, 0x5, 0xd31, 0x80000001, 0x200, 0x8000, 0xd36c, 0x7, 0x200, 0x0, 0xff, 0x6, @perf_bp={&(0x7f0000000140)}, 0x4400, 0xfffffffffffffffc, 0x5, 0x3, 0x9, 0x8, 0x8}, 0x0, 0xa, r2, 0x2) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x5adb) 13:53:04 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:04 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:04 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 121.679253][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:53:04 executing program 1: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:04 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:04 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:04 executing program 0: semget(0x1, 0x4, 0x400) semget$private(0x0, 0x1, 0x80) semget$private(0x0, 0x2000000003, 0x40) semget(0x1, 0x25d3444eb90944a8, 0x50c) semget$private(0x0, 0x7, 0x0) semget$private(0x0, 0x0, 0x20) r0 = semget(0x0, 0x3, 0x120) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:04 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) [ 121.868649][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:53:04 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:04 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:04 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:04 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) socketpair(0x3, 0x4, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000140)=0x4) 13:53:04 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:04 executing program 1: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:04 executing program 0: r0 = semget(0x2, 0x7, 0x203) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 13:53:04 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:04 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 122.094261][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:53:04 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:04 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:04 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:04 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:04 executing program 0: semget(0x2, 0x4, 0x0) semget(0x1, 0x1, 0x400) semget(0x0, 0x0, 0x100) semget(0x3, 0x1, 0x602) r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) bind$unix(r0, &(0x7f0000000080)=@abs={0x1}, 0x6e) connect$unix(r0, &(0x7f0000000140)=@abs={0x1}, 0x6e) recvmmsg(r0, &(0x7f0000000640)=[{{&(0x7f00000001c0)=@in, 0x80, &(0x7f0000000400)=[{&(0x7f0000000280)=""/180, 0xb4}, {&(0x7f0000000340)=""/156, 0x9c}], 0x2, &(0x7f0000000440)=""/63, 0x3f}, 0x5}, {{&(0x7f0000000480)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/246, 0xf6}, 0x5}], 0x2, 0x10001, &(0x7f00000006c0)={0x77359400}) r1 = semget(0x0, 0x0, 0x404) semctl$IPC_STAT(r1, 0x0, 0x2, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x280400) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000100)=0x400, 0x4) ioctl$KDSETLED(r2, 0x4b32, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000080)={r3, 0x80000, r2}) 13:53:04 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:04 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) [ 122.368478][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:53:05 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:05 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:05 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:05 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x1, 0x4) 13:53:05 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:05 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:05 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:05 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:05 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:05 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:05 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x220503, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002740)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@initdev}}, &(0x7f0000002840)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000002880)=r1) 13:53:05 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:05 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:05 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:05 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:05 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:05 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000000)={0x7d, 0x0, 0x40, 0x8, 0x3, 0x3}) 13:53:05 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:05 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:05 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:05 executing program 0: semget$private(0x0, 0x1, 0x48) semget$private(0x0, 0x2, 0x40) r0 = semget(0x3, 0x0, 0x684) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) semget$private(0x0, 0x1, 0x8) 13:53:05 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:05 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:05 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:05 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:05 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:05 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:06 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:06 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:06 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:06 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:06 executing program 0: semget(0x3, 0x4, 0x100) semget(0x1, 0x2, 0x50) r0 = semget(0x3, 0x3, 0x80) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:06 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:06 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:06 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:06 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:06 executing program 0: semget$private(0x0, 0x5, 0x4) semget$private(0x0, 0x3, 0x400) semget$private(0x0, 0x1, 0x20) semget$private(0x0, 0x2, 0x200) semget(0x2, 0x4, 0x100) semget(0x1, 0x3, 0x100) r0 = semget$private(0x0, 0x7, 0xa9b97a91df2e9312) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:06 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:06 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:06 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:06 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:06 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) write$P9_RREAD(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="84002000750100790000006529055fc072b999acc6f2f3a88db32283872d9348c642044457b7bba54000bfc001f9df0eda0552084227963e276c8d083dac51c17b2edde510b8a0598f7624b44704b828c19cada1fced196b762828447f183e45a5476bd6d8a6e0cf0c79752ec0129b6a84ffb161c0decb53c98c124a491bf16512a8187abef42ec15dfdeb4b6dd903182c8a2bc39fbe6741696025295edf47a422e5"], 0xa2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000040)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 13:53:06 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:06 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:06 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:06 executing program 0: semget$private(0x0, 0x7, 0x80) semget(0x3, 0x1, 0x40) r0 = semget(0x3, 0x0, 0x0) semget(0x3, 0x2, 0x40) semget(0x2, 0x0, 0x4) semget$private(0x0, 0x7, 0x10) semget(0x2, 0x4, 0x1) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x4, 0xe00) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000140)) r2 = socket$inet6(0xa, 0xa, 0x8) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x80000000, 0x0, 0x9, 0x8001}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000200)={r3, 0x9, 0xfffffffffffffffd, 0x9}, &(0x7f0000000240)=0x10) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev_snmp6\x00') ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000040)=""/49) getsockopt$ax25_int(r4, 0x101, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 13:53:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:06 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:06 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:06 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:06 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:06 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x80100) getsockname$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) 13:53:06 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:07 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:07 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:07 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:07 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:07 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000240)) r2 = semget(0x3, 0x3, 0x20) semctl$IPC_INFO(r2, 0x1, 0x3, &(0x7f0000000180)=""/93) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r1, 0x104, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') connect$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) 13:53:07 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:07 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:07 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:07 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:07 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_netdev_private(r0, 0x89f4, &(0x7f0000000000)="8ce3acd365028983aab433c5f10e6e4314b6357ec6d6d8ad1ba1b589bb2716711c40393d75c6d9bb5306464319cde2b8acd7002f2243732d16cfc1a262d74a87bd2d38a20913a60c41c7305c1fba2cabe1c46fc4") semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:07 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:07 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:07 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:07 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:07 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)=0x1, 0x4) 13:53:07 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:07 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:07 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:07 executing program 0: semget(0x1, 0x0, 0x30) semget(0x0, 0x0, 0x1) semget$private(0x0, 0x5, 0x20) r0 = semget(0x2, 0x0, 0x101) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x404000) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0x6, 0x7, 0x7, 0x3, 0x15, 0x7, 0x10001, 0x80, 0x100000000, 0xfffffffffffffffa, 0x3, 0x1}) 13:53:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:08 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:08 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:08 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:08 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0xffffffff, 0x10000a0200) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000100)={0x0, 0x8, 0x2, [], &(0x7f00000000c0)=0x4}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x4003c, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000040)={{0x4, 0xee1, 0x2, 0x9, 0x7, 0x5}, 0x10000000000, 0x0, 0x644c}) 13:53:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:08 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:08 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:08 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:08 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:08 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:08 executing program 0: r0 = semget$private(0x0, 0x5, 0x400) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000040)={0x3, 0xcb}) 13:53:08 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:08 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:08 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:08 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:08 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101001, 0x0) timerfd_gettime(r0, &(0x7f0000000040)) 13:53:08 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:08 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:08 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:08 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:08 executing program 0: r0 = semget$private(0x0, 0x1, 0x0) semctl$SETVAL(r0, 0x4, 0x10, &(0x7f0000000000)=0xffffffffffffff80) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x202000) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000080)=0x8) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:08 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:08 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:08 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:08 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:08 executing program 0: r0 = semget$private(0x0, 0xd, 0x4a5) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x10000) accept4$x25(r1, &(0x7f0000000040), &(0x7f0000000080)=0x12, 0x80000) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0xc94f}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)={r2, 0x36}, &(0x7f0000000180)=0x8) 13:53:08 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:08 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:09 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:09 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:09 executing program 0: semget(0x2, 0x3, 0x223) semget(0x2, 0x0, 0x0) semget$private(0x0, 0x3, 0xc1) semget$private(0x0, 0x3, 0x128) semget$private(0x0, 0x3, 0x2) r0 = semget$private(0x0, 0x3, 0x100) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:09 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:09 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:09 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:09 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:09 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040)=0xfffffffffffff676, 0x4) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000000)=0x1) 13:53:09 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:09 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:09 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:09 executing program 0: semget$private(0x0, 0x3, 0x85) semget(0x1, 0x3, 0x60) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x100) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000040)={0x10, 0x6, {0x54, 0x0, 0x525dbc6a, {0x20, 0x81}, {0x180000000000, 0x40dae12e}, @cond=[{0x5, 0xa8, 0xced, 0xfffffffffffffeff, 0x5}, {0x9, 0x1dbf1760, 0x8, 0x80000001, 0x10001, 0x4}]}, {0x57, 0x4, 0x3ff, {0xfffffffffffffff8}, {0x1f}, @rumble={0x0, 0x56a}}}) semget$private(0x0, 0x0, 0x300) semget(0x0, 0x0, 0x46) r1 = semget$private(0x0, 0x3, 0x8) semctl$IPC_STAT(r1, 0x0, 0x2, 0x0) 13:53:09 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:09 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:09 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:09 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:09 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = msgget$private(0x0, 0x100) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000040)=""/8) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x80000001}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f00000001c0)={r2, 0x9, 0x8}, 0x8) clock_gettime(0x200000004, &(0x7f0000000000)) socket$alg(0x26, 0x5, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x8, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r3, 0xc034564b, &(0x7f00000000c0)={0x2, 0x7e7f5f7f, 0x1, 0x5, 0x3, @stepwise={{0x4, 0x80000001}, {0x9, 0x64ec}, {0x5, 0x3}}}) 13:53:09 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:09 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:09 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:09 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:09 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:09 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:09 executing program 0: r0 = semget(0x3, 0x3, 0x10) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:09 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:09 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:09 executing program 0: r0 = socket$inet(0x2, 0x4, 0x101) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x78) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:09 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:10 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:10 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:10 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:10 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) pipe2$9p(&(0x7f0000000080), 0x4000) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)=0x4) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:10 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:10 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:10 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:10 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xaf14, 0x640000) write$FUSE_POLL(r0, &(0x7f0000000040)={0x18, 0xffffffffffffffda, 0x2, {0x1f}}, 0x18) 13:53:10 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:10 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:10 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:10 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) 13:53:10 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:10 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:10 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:10 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:10 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:10 executing program 0: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff9c}) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0x2, 0xfffffffffffffff7, 0x1, 0x89, "7a83114c655a2e54192fddd3e4d1b8515b18573ebece0cec8aea988d93d79fe8d4cf6c9af0a4cbf03a13aba0d7ef5f77eaf55ad9445f32447fe7f503ef45521719f6e22c06b3ea87e053f321ca50f370e247defc6855ed7618a629da1418edd90d13bf4015a2bd3376e30d1b193ca77a5a0883e10bf6dfe143140f47f422dfb5f50611919864cf940b"}, 0x95) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f00000000c0)={r1}) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:10 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:10 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000ac0)='/dev/cec#\x00', 0x0, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000b00)={r1}) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:11 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:11 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:11 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:11 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:11 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:11 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:11 executing program 0: semget(0x2, 0x0, 0x8) r0 = semget$private(0x0, 0x6, 0x100) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:11 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:11 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:11 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:11 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:11 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:11 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000100)="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", 0x1000) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000080)=0x1ec) fcntl$setown(r0, 0x8, r1) 13:53:11 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:11 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:11 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:11 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:11 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x80, 0x101000) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x2) 13:53:11 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:11 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:11 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:11 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:11 executing program 0: semget(0x0, 0x0, 0x100) semget$private(0x0, 0x7, 0x8) r0 = semget(0x1, 0x3, 0x40) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:11 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:11 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:12 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:12 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:12 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:12 executing program 0: r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xfffffffffffffffe, 0x280000) socket$isdn(0x22, 0x3, 0xdb06bd6468e53c87) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000040)=""/79) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:12 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:12 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:12 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:12 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:12 executing program 0: semget$private(0x0, 0x46dc9cc94da0ad2f, 0xd3) r0 = semget(0x1, 0x0, 0x400) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) umount2(&(0x7f0000000000)='./file0\x00', 0x1) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:12 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:12 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:12 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:12 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:12 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x24082, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0xb, 0x100000003, 0x7fffffff, 0x4000, r1}) write$P9_ROPEN(r1, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x8, 0x3, 0x3}, 0x42}}, 0x18) finit_module(r1, &(0x7f0000000200)='$nodev\x00', 0x3) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x0, 0x1, 0x0, [], [{0x401, 0x8001, 0x2f3b, 0x44, 0x4, 0xfffffffffffff800}, {0x3, 0x1, 0x2, 0x0, 0x8, 0x8}], [[]]}) 13:53:12 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:12 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:12 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:12 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:12 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:12 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:12 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xffffffff, 0x101801) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000040)={{0x81, 0x46fbe1e9}, 'port0\x00', 0x0, 0x80000, 0x8001, 0x4, 0x9, 0x8d4, 0xab4e, 0x0, 0x1, 0x80000001}) 13:53:12 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:12 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:12 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:12 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:12 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000040)=""/116) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:12 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:13 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:13 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:13 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:13 executing program 0: semget$private(0x0, 0x1, 0x0) semget$private(0x0, 0x0, 0x200) r0 = semget(0x2, 0x2, 0x40) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:13 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:13 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:13 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:13 executing program 0: semget$private(0x0, 0x1, 0x600) semget$private(0x0, 0x2, 0x100) semget(0x0, 0x7, 0x40) semget(0x1, 0x1, 0x10) r0 = semget$private(0x0, 0x7, 0x56) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) 13:53:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:13 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:13 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x4, 0x40) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x342) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$BLKRAGET(r1, 0x1263, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000100)=0xe8) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x40) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000240)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, r2}) 13:53:13 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:13 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:13 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:13 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:13 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:13 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:13 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000240)={@dev, 0x0}, &(0x7f0000000280)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14, 0x800) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0}, &(0x7f00000003c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000002b80)=[{{&(0x7f0000001840)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000002ac0)=[{&(0x7f00000018c0)=""/218, 0xda}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/212, 0xd4}], 0x3, &(0x7f0000002b00)=""/103, 0x67}, 0x4}], 0x1, 0x10040, &(0x7f0000002bc0)={0x77359400}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000002f40)={&(0x7f0000000040), 0xc, &(0x7f0000002f00)={&(0x7f0000002c00)={0x2c8, r1, 0x10, 0x70bd2a, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0x74, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}]}}, {{0x8, 0x1, r3}, {0x1b0, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffff00000000}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x200}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}]}}, {{0x8, 0x1, r8}, {0x78, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8985}}}]}}]}, 0x2c8}, 0x1, 0x0, 0x0, 0x10}, 0x4) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:13 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:13 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:13 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:13 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) 13:53:13 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:13 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:14 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:14 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:14 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:14 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000001640)=0xb36, 0x4) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000100)=[{{0x0, 0xffffffffffffff53, 0x0}}], 0x40000000000018f, 0x2040, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x20, 0x8}, &(0x7f0000000180)=0x90) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xcc, 0x101a00) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000200)={r3, 0x4}, 0x8) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f0000000280)=""/185) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000000040)={0x1, 0x2, 0x4, 0x3, 0x9}) 13:53:14 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:14 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:14 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:14 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:14 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:14 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:14 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:14 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:14 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000080)=0x3) 13:53:14 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:14 executing program 0: socket$can_bcm(0x1d, 0x2, 0x2) semget(0x3, 0x3, 0x20) semget(0x3, 0x5, 0x0) semget(0x3, 0x0, 0x1c0) semget$private(0x0, 0x7, 0x10) r0 = semget$private(0x0, 0x1, 0x484) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) r1 = semget$private(0x0, 0x4, 0x518) semctl$GETZCNT(r1, 0x1, 0xf, &(0x7f00000000c0)=""/188) 13:53:14 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:14 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:14 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:14 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:14 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:14 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:14 executing program 0: r0 = dup(0xffffffffffffff9c) write$FUSE_BMAP(r0, &(0x7f0000000080)={0x18, 0x0, 0x1, {0x7}}, 0x18) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x500, 0x0) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000040)={0xff, 0x1f, [0x800, 0x20e6, 0x80000001, 0x100000001, 0xfffffffffffffff7], 0x1c40}) 13:53:14 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:14 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:14 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:14 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:15 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x6b}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x7f\x00'/248}, 0x48) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) semget(0x0, 0x3, 0x82) 13:53:15 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:15 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:15 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:15 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:15 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:15 executing program 0: semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 13:53:15 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:15 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:15 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:15 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x401, 0x0) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 13:53:15 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:15 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:15 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:15 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:15 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:15 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:15 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:15 executing program 0: 13:53:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:15 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:15 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:15 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:15 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:16 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:16 executing program 0: 13:53:16 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:16 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:16 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 13:53:16 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:16 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:16 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:16 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) chmod(&(0x7f0000000540)='./file0\x00', 0x0) 13:53:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:16 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:16 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) 13:53:16 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:16 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) 13:53:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000049c0)={&(0x7f0000004880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2}}]}}, &(0x7f0000004900)=""/147, 0x32, 0x93, 0x1}, 0x20) 13:53:16 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:16 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) [ 134.175788][T10868] kasan: CONFIG_KASAN_INLINE enabled 13:53:16 executing program 2: r0 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000040)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, r0) 13:53:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) [ 134.200159][T10868] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 134.225029][T10868] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 134.228504][ T3890] kobject: 'loop1' (000000003c46d3ef): kobject_uevent_env [ 134.232007][T10868] CPU: 1 PID: 10868 Comm: syz-executor.0 Not tainted 5.2.0+ #20 13:53:16 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) 13:53:16 executing program 3: semget$private(0x0, 0x6, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) [ 134.232015][T10868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.232034][T10868] RIP: 0010:btf_array_resolve+0x1b4/0x18f0 [ 134.232052][T10868] Code: 00 00 00 00 00 fc ff df 42 80 3c 30 00 74 08 48 89 df e8 cf 7a 25 00 48 8b 03 48 89 44 24 70 48 8d 50 04 49 89 d7 49 c1 ef 03 <43> 8a 04 37 84 c0 48 89 54 24 30 0f 85 ec 10 00 00 44 8b 32 44 89 [ 134.268032][ T3890] kobject: 'loop1' (000000003c46d3ef): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 134.282224][T10868] RSP: 0018:ffff8880608b7560 EFLAGS: 00010247 13:53:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:16 executing program 4: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)={0x0, 0x2, 0x6}) [ 134.282234][T10868] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000040000 [ 134.282239][T10868] RDX: 0000000000000004 RSI: 000000000000086c RDI: 000000000000086d [ 134.282243][T10868] RBP: ffff8880608b7690 R08: ffffffff8189ddfd R09: ffffffff81898541 [ 134.282248][T10868] R10: ffff8880605c43c0 R11: 0000000000000003 R12: 0000000000000002 [ 134.282252][T10868] R13: 1ffff11012d7d4b1 R14: dffffc0000000000 R15: 0000000000000000 [ 134.282260][T10868] FS: 00007f4fc159e700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 13:53:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) 13:53:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x307}, "32381d72e872b540", "3c95fdcc1da264ec9340449eeaa63fe58caf6873789687d5a4d0cdd2de61e6f7", "744fe6b1", "9cbc9666b7ce5292"}, 0x38) [ 134.282266][T10868] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 134.282270][T10868] CR2: 0000000000758040 CR3: 000000009469b000 CR4: 00000000001406e0 [ 134.282279][T10868] Call Trace: [ 134.282305][T10868] ? __fs_reclaim_release+0x4/0x20 [ 134.282315][T10868] ? btf_array_check_meta+0x2b0/0x2b0 [ 134.282329][T10868] btf_resolve+0x3ed/0xda0 [ 134.282341][T10868] ? btf_sec_info_cmp+0x110/0x110 [ 134.282352][T10868] ? kasan_kmalloc+0x9/0x10 [ 134.282361][T10868] ? __kmalloc_node+0x4d/0x60 [ 134.282371][T10868] btf_new_fd+0x216a/0x37b0 [ 134.282389][T10868] ? __might_fault+0xd2/0x160 [ 134.282398][T10868] ? btf_release+0xd0/0xd0 [ 134.282410][T10868] __do_sys_bpf+0x1212/0xc5d0 [ 134.282420][T10868] ? tomoyo_file_ioctl+0x23/0x30 [ 134.282432][T10868] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 134.282441][T10868] ? __bfs+0x560/0x560 [ 134.282450][T10868] ? __lock_acquire+0xc84/0x1ce0 [ 134.282462][T10868] ? __bpf_prog_put_rcu+0x320/0x320 [ 134.282472][T10868] ? __lock_acquire+0xc84/0x1ce0 [ 134.282488][T10868] ? trace_lock_acquire+0x190/0x190 [ 134.282499][T10868] ? __lock_acquire+0x1ce0/0x1ce0 [ 134.282507][T10868] ? lock_acquire+0x158/0x250 [ 134.282530][T10868] ? __might_fault+0xf9/0x160 [ 134.282541][T10868] ? __lock_acquire+0x1ce0/0x1ce0 [ 134.282548][T10868] ? lock_acquire+0x158/0x250 [ 134.282556][T10868] ? __might_fault+0xd2/0x160 [ 134.282572][T10868] ? kasan_check_read+0x11/0x20 [ 134.282583][T10868] ? _copy_to_user+0xca/0xf0 [ 134.282594][T10868] ? put_timespec64+0x106/0x150 [ 134.282606][T10868] ? ktime_get_raw+0xf0/0xf0 [ 134.282615][T10868] ? check_preemption_disabled+0xb7/0x2a0 [ 134.282631][T10868] ? prepare_exit_to_usermode+0x1dd/0x560 [ 134.282641][T10868] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 134.282651][T10868] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 134.282662][T10868] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 134.282671][T10868] ? do_syscall_64+0x1d/0x140 [ 134.282681][T10868] __x64_sys_bpf+0x7a/0x90 [ 134.282691][T10868] do_syscall_64+0xfe/0x140 [ 134.282702][T10868] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 134.282710][T10868] RIP: 0033:0x4597c9 13:53:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 134.282721][T10868] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 134.282727][T10868] RSP: 002b:00007f4fc159dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 134.282737][T10868] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004597c9 [ 134.282743][T10868] RDX: 0000000000000020 RSI: 00000000200049c0 RDI: 0000000000000012 [ 134.282748][T10868] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 134.282754][T10868] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4fc159e6d4 [ 134.282761][T10868] R13: 00000000004bfa25 R14: 00000000004d13a0 R15: 00000000ffffffff [ 134.282772][T10868] Modules linked in: [ 134.444047][T10868] ---[ end trace d669c2044294c7ca ]--- [ 134.478082][ T3890] kobject: 'loop3' (000000009234082b): kobject_uevent_env [ 134.498664][T10868] RIP: 0010:btf_array_resolve+0x1b4/0x18f0 [ 134.515777][ T3890] kobject: 'loop3' (000000009234082b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 134.536752][T10868] Code: 00 00 00 00 00 fc ff df 42 80 3c 30 00 74 08 48 89 df e8 cf 7a 25 00 48 8b 03 48 89 44 24 70 48 8d 50 04 49 89 d7 49 c1 ef 03 <43> 8a 04 37 84 c0 48 89 54 24 30 0f 85 ec 10 00 00 44 8b 32 44 89 [ 134.551224][ T3890] kobject: 'loop4' (000000004548f4ac): kobject_uevent_env [ 134.573891][T10868] RSP: 0018:ffff8880608b7560 EFLAGS: 00010247 [ 134.582166][ T3890] kobject: 'loop4' (000000004548f4ac): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 134.599685][T10868] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000040000 [ 134.608294][ T3890] kobject: 'loop4' (000000004548f4ac): kobject_uevent_env [ 134.611956][T10868] RDX: 0000000000000004 RSI: 000000000000086c RDI: 000000000000086d [ 134.619691][ T3890] kobject: 'loop4' (000000004548f4ac): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 134.625891][T10868] RBP: ffff8880608b7690 R08: ffffffff8189ddfd R09: ffffffff81898541 [ 134.632324][ T3890] kobject: 'loop4' (000000004548f4ac): kobject_uevent_env [ 134.635914][T10868] R10: ffff8880605c43c0 R11: 0000000000000003 R12: 0000000000000002 [ 134.641916][ T3890] kobject: 'loop4' (000000004548f4ac): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 134.652398][T10868] R13: 1ffff11012d7d4b1 R14: dffffc0000000000 R15: 0000000000000000 [ 134.680386][ T3890] kobject: 'loop5' (000000007ee49106): kobject_uevent_env [ 134.684843][T10868] FS: 00007f4fc159e700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 134.697784][ T3890] kobject: 'loop5' (000000007ee49106): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 134.703033][T10868] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 134.803767][T10868] CR2: 000000000070e158 CR3: 000000009469b000 CR4: 00000000001406e0 [ 134.811865][T10868] Kernel panic - not syncing: Fatal exception [ 134.818963][T10868] Kernel Offset: disabled [ 134.823281][T10868] Rebooting in 86400 seconds..