rogram 1: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x7fffffff, 0x100) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200, 0x0) connect$nfc_llcp(r0, &(0x7f0000000140)={0x27, 0x0, 0x0, 0x2, 0x8, 0x2, "25418d385a26706fce1cfcefb3658084b8b7f08a21bd71d1cd36743b9670220ff2262e11ce1f85b10cab3f23864b0d675bd9274bd3cf5dc81b41a460b9434f", 0x7}, 0x60) write$P9_RSYMLINK(r0, &(0x7f0000000040)={0x14, 0x11, 0x1, {0x21, 0x0, 0x1}}, 0x14) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000100), 0x4) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000000c0)) [ 2379.319489][T10555] gfs2: can't find protocol [ 2379.319489][T10555] ock_nolock 04:06:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0xf9) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f00000001c0)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r2}) 04:06:24 executing program 2: r0 = syz_open_dev$media(0x0, 0x6, 0x80000) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f0000000340)=""/176, 0xb0}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/241, 0xf1}, {&(0x7f0000001500)=""/163, 0xa3}, {&(0x7f00000015c0)=""/118, 0x76}], 0x6, 0x0) 04:06:24 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x2, 0x1) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040), 0x4) 04:06:24 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000800c5011, &(0x7f0000000000)) sync_file_range(r0, 0xffffffffffffffe0, 0x4, 0x4) [ 2379.660387][T10892] gfs2: can't find protocol [ 2379.660387][T10892] ock_nolock 04:06:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0xf9) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in6={0xa, 0x4e23, 0xffffffffffff7fff, @mcast1, 0x1}}}, 0x90) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x80000000004) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20000, 0x0) ioctl$int_in(r2, 0x800000800c5011, &(0x7f0000000100)=0xfffffffffffffffe) 04:06:25 executing program 2: syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}, {&(0x7f0000000340)=""/176, 0xb0}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/241, 0xf1}, {&(0x7f0000001500)=""/163, 0xa3}, {&(0x7f00000015c0)=""/118, 0x76}], 0x6, 0x0) [ 2380.483325][T11500] gfs2: can't find protocol [ 2380.483325][T11500] ock_nolock 04:06:25 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x200000001, 0x0) ioctl$int_in(r1, 0x800000800c5011, &(0x7f0000000000)) fstat(r1, &(0x7f00000000c0)) 04:06:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0xf9) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0x0, 0xcf6, 0x8fc}, &(0x7f0000001240)=0xc) sendmsg$inet_sctp(r1, &(0x7f0000001300)={&(0x7f0000000080)=@in={0x2, 0x4e21, @empty}, 0x10, &(0x7f00000011c0)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="f0ee49d46bd276a8e6e65f90e0c48471ed0f3c013fb44466e34937468743e31611743c33b372ed395f188969b6cc3ef403404735860e1db0aa4cfc3dc031ee202ed8c7d1a901b3400fdd02f655f3064273a909627e9aa2216b11a6462e6476494436e9dc95979b4e85fd1b61b94930a6ff96075ed8ed55c707d091f10822227763f1faf9b6d175061f7dd9e35ba4247a064bb56f898676861ee461e626", 0x9d}, {&(0x7f0000001180)}], 0x3, &(0x7f0000001280)=[@init={0x18, 0x84, 0x0, {0x5, 0x800, 0x60b, 0x9}}, @sndinfo={0x20, 0x84, 0x2, {0xfff, 0x4, 0x8, 0x8, r2}}, @init={0x18, 0x84, 0x0, {0x1, 0x6, 0x6, 0xfffffffffffffffb}}, @dstaddrv4={0x18, 0x84, 0x7, @broadcast}, @dstaddrv4={0x18, 0x84, 0x7, @empty}], 0x80, 0x48800}, 0x881) 04:06:26 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640), 0x0, 0x0) 04:06:26 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:26 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0xfdef}, 0x18) 04:06:26 executing program 1 (fault-call:1 fault-nth:0): r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) [ 2382.245990][T13043] gfs2: can't find protocol [ 2382.245990][T13043] ock_nolock 04:06:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0xf9) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0x0, 0x4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r1, 0x400}, &(0x7f00000001c0)=0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r2, 0xc0285629, &(0x7f0000000080)={0x0, 0x1, 0x0, [], &(0x7f0000000040)=0x4dc3}) syz_init_net_socket$bt_hci(0x1f, 0x2, 0x1) 04:06:27 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:27 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{0x0}], 0x1, 0x0) 04:06:27 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x2, 0x0) [ 2382.551427][T13184] gfs2: can't find protocol [ 2382.551427][T13184] ock_nolock 04:06:27 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{0x0}], 0x1, 0x0) 04:06:27 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x2, 0x1) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000000)={0x2, 0x1, 0x7f, 0x9508}, 0x10) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8000, 0x90) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000080)={0x5004, 0x1b003}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @broadcast}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@empty}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f00000000c0)=0x8, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0xa) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000400)) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@rand_addr="7fed5d895e1b533de34fe07c3017247c", 0x4e21, 0x7ff, 0x4e20, 0x0, 0xa, 0x80, 0x0, 0x2f, r2, r3}, {0x6468, 0x99a, 0xd6e, 0x73a, 0x100000001, 0xff, 0x8, 0x26e7}, {0x4, 0x4e7f332d, 0x401, 0x5}, 0x8, 0x6e6bc0, 0x2, 0x1, 0x0, 0x2}, {{@in6=@remote, 0x4d5}, 0xa, @in6=@empty, 0x3503, 0x2, 0x0, 0x8, 0x8, 0x5, 0x8}}, 0xe8) epoll_wait(r1, &(0x7f0000000480)=[{}, {}, {}, {}], 0x4, 0xffff) 04:06:27 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0xfffffdef}, 0x18) [ 2382.716433][T13184] gfs2: can't find protocol [ 2382.716433][T13184] ock_nolock 04:06:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0xf9) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0x0, 0xeb, "68dd9d1563b237979bd7b71f1f219cd60fad33d6c740301a6b32ba2790e785eb41d0279a9ac23ce6054bf3ac44a07363862cabd3170bcb311410c443474d994d50b17ca7fc73c53da3b6cf765c1c74baac8b5dab1be1e90b15a74d49a603460ecb504bdbb4bd1f981c5a07c68e96c620672ac1651944de0467b54f39b4c6945b0d255e9be12dfe6f847f4979f0c08e2280abeab1a9ea96d55cce43e0f22ac18463ad31813046579a94bc6fc99b1a3c52d0e07c593a84952c605a65b44dea9e31f644f2cf61adada18ca497b382bb30ff0851d089d72b3c2aad89b4120e3e2993adba3778fd77942d77a918"}, &(0x7f0000000140)=0xf3) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e22, 0x9, @empty, 0x97}}}, 0x84) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000380)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000300)={'syz_tun\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"]}) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_init_net_socket$bt_hci(0x1f, 0x2, 0x1) sendfile(r0, r2, &(0x7f0000000340), 0x3) 04:06:27 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x4, 0x0) [ 2382.896433][T13339] gfs2: can't find protocol [ 2382.896433][T13339] ock_nolock 04:06:27 executing program 2: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:27 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0xfffffffffffffdef}, 0x18) 04:06:27 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x2, 0x1) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000040)={0x6e9, 0x0, 0x6}) getsockname$netlink(r0, &(0x7f0000000100), &(0x7f00000000c0)=0x6) [ 2382.978108][T13339] gfs2: can't find protocol [ 2382.978108][T13339] ock_nolock 04:06:27 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x300, 0x0) [ 2383.089805][T13396] gfs2: can't find protocol [ 2383.089805][T13396] ock_nolock 04:06:27 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:27 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0xfa4, 0x0) 04:06:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0xf9) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0x0}) r2 = dup2(r0, r0) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f0000000080)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) sched_getparam(r1, &(0x7f00000001c0)) 04:06:28 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x2000031b}], 0x1, 0x0) [ 2383.588230][T13824] gfs2: can't find protocol [ 2383.588230][T13824] ock_nolock 04:06:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0xf9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0x0, 0x22, "cebd9da9f7cce6e130fcbf883aa051b2a683a395085a02cfc592721837226bfba9fc"}, &(0x7f0000000080)=0x2a) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={r1, 0xb12f}, 0x8) 04:06:28 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:28 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x7ffff000}], 0x1, 0x0) 04:06:28 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:28 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x3000000, 0x0) 04:06:28 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xffffffffffffffff, 0xc600) sendmmsg$nfc_llcp(r0, &(0x7f0000002480)=[{&(0x7f0000000040)={0x27, 0x1, 0x2, 0x7, 0x20000, 0x9, "5fc19a1acb9efaa74684849d20254e15e41a2e556af38c4d0e9b2eaaac3b877337718684202a3f440628ad6760efda71109a678378c3b60dc52ca93df4828b", 0x1c}, 0x60, &(0x7f0000000200)=[{&(0x7f00000000c0)="372e0003a9e56e1d81e875760ad0fc2f73c08ac9c4410928e963fb3fe6eaa76cf696bffe4edd9f07b2a50aba5bb7bfa8d91e78a00e837672ef076b15e1550841a2ccd4742de457f411939c619378e4c90e34f653ff31a28554d1837a7746082bf26c719c684b5a8d0a62bc8c696c26861b62a6657d1a94cd5ddac51e97e7dd6932bd979c3aa116b2489a4c67ec12a98e794f98c5846ca1a517998c26ca24cd150c74", 0xa2}, {&(0x7f0000000180)="c9b0b586de5a31b0f651ca75091ba2578ee6ed0be8205f1de56eb585d8b1f1d99e873b0617c5cb6ed6305d9863ba3cf3cda68a319fa0665db2c1d205578cbb5b260b61376e1f7e7b0a6a15ec731f7c8b", 0x50}], 0x2, &(0x7f0000000240)={0xf8, 0x0, 0x9, "d8542472494ea656201858a147192e90e432b355b808bfed46b8dbac6c56b6aed8a350b41f16e439f98f296512ff8f7549667be54b274891431213bcc3f4faf425fc9c981cb122c03b956ac7b323c0b05d769529db13efdc5511fd705bc2a6ac00de74d90d499f029b234bfad53814105f399e5213d0b7ce388d04ac71d1a75d0ca028f045764dd50ecabfa14f1e638f8acca909234f6d707ab750670c567edaccc08e0f1a03302244e30b3d9fbf479bd3a91d824d36abe0b2456795d102a8f84e199f24fd595dab807e01588189e118b1e16321de7e461c5be71735d092cfc419394813bf1d09"}, 0xf8, 0x20000005}, {&(0x7f0000000340)={0x27, 0x1, 0x0, 0x4, 0x2, 0xfffffffffffffff7, "8fe4e5e418206b0e0c5f92a80f4071ebb753488d9eb22d0557026a9c23ee43b0ac67fa7bf1e45985ded72757876bbe1ab969a919283ddda95556565cc1af14", 0x33}, 0x60, &(0x7f0000000580)=[{&(0x7f00000003c0)="b91a48410616defcc5f7df5e793f0f493071c4cb88074057f1196d8ba7381b17718966976331e57da40ba61e37ed2fb2d86a74434760633179807c84403673bbe93cdd7adfa1f7585f065b5f40d7ee7a437f031618e4dff1208c0fc3148d40bc8884f4c75d8384a7ea", 0x69}, {&(0x7f0000000440)="4686cea8c4b6426ed2d002f889c45af47e1d3e9127ba85459d98405ff313d6487d9ec2f5318eb7a84e034779204814b2ffcd8061c220c4628c7f267ec7f4896defaf136d", 0x44}, {&(0x7f00000004c0)="bc6e4a761486d3aba74ed6ab6a68c27859f0adca549a9ef91d00e5fe1ae3165836b6252979ea3616e8414bcf1127548de417091abc4df73be64039fe33b8bfd9de993573142e14b0fc25e1811af8acaaf09165f2f470f9f8578cc8767abfd933a0e34d300c8caa2a93b33248ce3776299f77f55ef706cabdbe3fc64fff516b188ffc763175f3ee712104831577431c7c88ff0b545e259f7d181c5de8957c24d2474293c4b708bd7cf1891beadd56999001", 0xb1}], 0x3, &(0x7f00000005c0)={0xe8, 0x118, 0x0, "e0bf24a83fc232bb98b74a72a79659578577fc43471a43a1a955956482e4c4938c67358545e7ecb7a3ee7ddf7f51a0ed3065ab46070f5a5ac554ed09a2c11ad0b0830603cf9f2b3f6e1a9b9ea7ef3de6be4d9a3c18523f4c1f0cd4ed4acb4c300915e84179b27137ab6c4b805d3fdf6344373ffd6f6c87b8f83d04705ffc0168d83bfdba43e6c9bb02d12f669a2ffe6c6f051afd735e5bf1d1b6bbc02f1aa95b38ab313e3ad576490b15dc0704b61f7086bb30c5eaf32bdbcebfbaaf81951ecf6bbc7b27d607727150db60509b95671ed66b0f86d2f9"}, 0xe8}, {&(0x7f00000006c0)={0x27, 0x1, 0x1, 0x3, 0x4, 0x4, "8aafe81bf63098651b4e1b641908c7cb989f0cac12bdb83a486925bb0b71a7b060a35e69aa94c60b30f0ec408ba77e751b2ad119a5b9587f7cc844af65e6de", 0x26}, 0x60, &(0x7f0000001c80)=[{&(0x7f0000000740)="5febef4c7a5264b11d3002d7593577ce605323d32aa722dfe42ebde5aa7590080ee95438d5e367c86b670ade57c49b2ede12f2d12abf4293fefb02d494d2eee84b73b401d84052b6702c7d622bf9ff6046c30d4883f65b9c5649426c5466b7d66bbdd47077a561620f05c513c3fb248a2ee7a0cae4aa0ef908eab439549c13677c101ca4c605d5a3f1cc652ff7c04a603fe0212ebe47174691d5949ad79645ed1f076dbabe6f62cdbda8fa75d783d14869b845bd046efbae45c4b76a867be46549", 0xc1}, {&(0x7f0000000840)="1c34d97bcf2879679c9278badc0f67bed1635ccaecd90cb88bb382b5b782a31ca34e147f6d2da93d4f4c6c74", 0x2c}, {&(0x7f0000000880)="dc9bbba7ea3602a1eefca19b8cf2f9aa964ed4263b663c411d72cb406a47d39275ea9bbde84e4007e2967ddeb790930ebc8b741ac9763d85435da7b8d823528bfe8d6a48e9ad30fb96458c4ae016cbc996bfa89fc2e59fe933394019f5f8a6ce7956c649f5778afc2de632fccfff72037b621e94028c943001b9eea2cf28ab09f47c4c92ac2e5b35cf29ac3c9e3da01e4c372f2a6b39e74df871949983d404c815e2ca7634a0f2353e6bf57a8e46089c2300eeaeb2768f4103a0f193b94c7bf93e71793091e76703322009c20b1edf0150d2e076006565343d26b741ce5975015cebd7e45a10edf7e42318b94ec14e80b79a32b3f86054f7e3249b3a", 0xfc}, {&(0x7f0000000980)="11fecf73e6dbf8c80c8065a724bfc7082a71dff374a42b26c9439ec10773ea1289344536f01c6cfea15c6b8d2f5a730f9f2b15f648d0a5077a504cbc39e92937436e5fe9dec55e3d48b53449e7437fa1c7a6295f83eda306af785f8a3caf", 0x5e}, {&(0x7f0000000a00)="e0400985bf1924ba1ae3a30178e1e7f248", 0x11}, {&(0x7f0000000a40)="67257a6155625d015d2223462d2385fe78314a79da764af7b1b97de3dfd7e414fe13383a8c93c5db1bb03072490b7ac229673bbbe2cb5f7ce5f68805a1563480e6601d5561376a55c15253501f1a5b8b04fcb8fb956958c8ff7621eb71e4d2db3f96ad7bc72d4494f0f3beaae5fae0da7eea1a9e89d9391ebddf7619c862c17ad527761deea46e78f82ee37c3ffeb27844cdf4eece796989595c1c18cf6d3140a384f23ee40436f08e770cc52ee0daa2ba68e3914fbf8227519a793fa5691eb2bf44e5653eeee4480c69dacd718f72c034a9b1c00603cf71f16ccd54e6bd74694bf2087a9802a0be26da7c7e6262d14abaf045f4ac19fa172ea8718b5fb46745ebfc5b412de6230d494c745ddde48aa2c6a82d5cf8d3401591f031dfd1a23d4e75b6b68ed7812f221a04447c714920cec22e0fcf8019dda6f1e67ac631f1ab3ca7c8506ef422e455758cc4025b67a029f8715d4a3b94343a553455cfb33eaf5e18982cbab5840c28f0aa801568bd767f0a9bcc7ca47369e2d191120ae215254c136537130f1d73bcf2c2a88bfc92d8f61bc85db488e31ffcbe01ca077c2eac64eed40ef88fc00d22d5d4565b8a499dc3270b87245eeec6420e6e795d970e56da071f9d20b706005180c69cd62b7d4d79c3ad3cca8956a8320a5aea9167a3436a2088a195e4a23d24204f7dcb245aa3506114ff88df3f2760852e04ed5d55d67575e1b988936e216e024131a6d096a584b2ea9db7adba157e8158eba072d32c5a48ce237da9b40d2a3ec934a03ebb8003adb2ff6cc2206872a2bccbeba5d0cd0d71c8de872e0a568d6de7f85b073b766b56cc826b5297245d365c7e0dce16df084f73d3b3ad9995915d787a82f2383d278f63120631007bbee16d8e5fed4cd2759342d65910694e859302035b165cd84eb34f201adf6f9a58b37bc749e13113be57381dbeebf338e04f1251ea22d8b9b160a7cfa461e8880c99f7c0c73f5d25dd5ad5864e52a382b736cc195f5877e8d4c522be26faf124be31f6e06438ecf823a039ca2a6ef8cfa161edd72990191b873815776f0e4e2b97803d684d38559a46d45452e48d1630b5d892f332cd38f790dd58720848159572087b80d70fee4864c99850dca6910222e85b265c2fe5946104fa8e29817826ff960c1e1b5db324ccf5b52d976f63de8f4c1e3b2e4d761a88feb6bd8ba028228536df72570f6f816267b20eaf5175a56ea9abba5cf259b9a6b07ccfcb87eeae27828e584c253087b2de46f2e988602296c225eaffa90d1a94a3a2115673ed0f406c0dc8354cc199801703be153dc4c40fe5787d23b1815b0c30b48258531f2d8d14a4e10429d136d2498d6185286e1079b7190c2884b6dc2f7926512ac2bc86544848d7fb757ec4fc3afc36cd446eae1780d981dcf610e313ebfded520d8df58da22cf553573d7e0a5c460d07301b70016cd798f296d619c2525b79b1d254593e2452f08b412413ffb07a792a0e48671539a451ac555d670b120562d9334ec40c7cd2ed8eff724fb5e9a58f72cbbf9c474e14d74275000386e1f53e0dd796c464be510b988423ec9069b73e50f9c19624c7688542edb5f3334c056abc6a66f426c7944b2c2f1eb40174d3fa797f9419edf0b62e9707a5333465ddb3b409f1d3c4538e118fd0771b8b5d82293f61ca7b7d276468d070c32cf04c996e10ad6121fb6c63864c399189aa7f036830f1e8b08b068f26d33c67f9c5355b949385a42df1e74579f975562b6f724f80619411411a564ca4ed584dcd774b5b17153cdec761934823630e0acf3a4b09bcd846466e44a0f417172c11efdfb12cea6fefb82809f82c9ed750bbb47397d8aacb55550b900b3db249032af8d8226ea1741b3307990b190889984d800845dd2fd0d202ef26fa53fc7ea81bfa87ca61159ec0f7561d84b76110981047d7db33dacb23074c9cf7b284d9d17cb4c9e9dbbf87668e349e9f473f9531361abccb9ce1104e6d89dc82edf17a11c380b9fc02fd7bf2a694b0f90fd18c4a2c7229e992742218e8811fe38ebd5e06ebff19421a0dc9688350b15c9abb783ff22594a25b49bf8653d0caa626bf78a5f3373a274eceef1ea01033195edb4b04c41ad70c27451df3a83bf017d14423078febcf1184a6f34fa451ad281f81f1aff1cde47b097154d901eeacda106bd5e56916ffefce620ff873d383e882f841e862e3386d13b113ddff31df230555228e2cea2e9ae9026d88dba954d9e23827c7c72633d5583ce5e3c94b87728df6ff9a7c606b0532303d5ec7909252f0a753bc262556ced76845ba31f9c3f41daaf8e6b1d2993354e5ad1f7d4670efe73dc6fee47c64446306cecfcda36d43f1f394f399422cc22d76155f137a05af707cf0ed61786a5e8b75c93b8eede3c4d051478c4db3531f289f4bb8dc4d3f71ef274282f27b68d0816a068bfea71719e2dca92e332572990c17b4267a7a975ff253ef975af5ac0d22c84e84378d00e948f5e3f137f87fb4bfdc4f0ec66d8e7e2860159b221b48513bc407beca21791191eff2b4dbe1197ee9191fb6fbfc5a10615ca5676e14950257fe54f8a9fed9120f5535a8e228199401a637b80bf118249dffca79b99c5d7e1a4b977ec9f5ffa07dd09174943e718eec6d79c3aa2bdecf96f1040a69b6ac75c20b7683cd0b31866a07d365ab06d782b94658fee23bf2ef92f5fab39b246a71de203a022b0d51aea13040f0f7bd9ed3e5d82201d666af874c7b8ce273a18709f1fe48184f397559abee240be7e943cb732936c191ac729a26e0e957d4258e86f9f3c352057944f2f5c8f9be36bc65449008d095c09d475f59780edf48f0f10f7b1d6621af57fd84506d65b31713f1ae0b9dbaf518e8860fbbd43f0f6361e21128e1f43790e6501d3c8667009a3c5d635f052c8a0e7b7e13cd092fe4d9708475c7a99f7286c6a381d0d902999ea93ce4d1461cf408dc1838ee5a5af9c2b93441d91e9adff3fb08ea69c1065a6489aee1240e9a3bd0771d1e216e7f824178b97bff41467ab25606ee3b6bd66e2068a57ad7d103ea5650f3b37fabf03649e373ea34cc245830c15ff745b583279ec9be53744ba815ab7fe634e6c8f808162a92f60fcabbec4c5ed93d7d4c150942dfa7ba392e5d0fa9e18c6501ffab4b303eb71a34b9e368ba55a08f451ec79a296e59e26ba613419975682c2fbcc7dd3a9b01c84a5ed79e392de03953ee6ba82174b21f85917c799cb5066d01415ac72c81727c24d4d849e3fbac576102608dc2b6800ab1749ad184cf573f447e095a7c030ddecd66902b32259460f07637620a4b09908d7cd01aec1e2595d4bf715c8e4bb75eac1fcb548209c6602dd14c92f2416df41d292d604d817a314a7e5c2976addbe9a52bcc645d4989ae0e14225b645bf7a3951ef842770c67674be1d24582b56afd782bc9ade830630209b453d35e627874916b84304949e6fcf7102f3dc3fb47d99e0cc9720bab1f6405783c8c4688b87f63888e65172b2e6f2e81567ebfef5469c5afb12a1bda68f66dd564565107c071618cb8c6a3ad45338440d162bf93df3703a6a93e4eea23095d70acbe9bd86ee6a16c60ae05e9b42db4e0d0de49a97ea31dcea9ccb2110fb15c254c42b06f4de6a65a956af55596d3384a5935b3513d7afe74c69f4ac9c14d083e3d4017e1479de69efb51c87a84eed8ff567f53fb5a85adf39e8071eaa376023a7388707ff9c2fc6714e33c081981346de1aff3d45396d51260bd469d9eb6b8b27ff765d3113aeed1b6dae0db5d56b83ef8fccbe8d0be4d35917f081a8e37404d7a71eebe993b43951fd2890169525d63ae158c93a352932b4b782b523350befd6a94c671dd6be738479aea29ca41d284fa7d050003b8c1aa0240bc1e196adb04ef76e665692b3bc99a087b0e8de7a15e0bad3ac5f2f43d86e4e88802a58ae90867702c7ee75482acbc55bd351f0ad15578c2e82dcf7db15c58ad0cde263279cae913bef163b7d27bde52ae3e7710b007717d80688a819f8ac250bf96e5dbf1ffe583a30c34a92112b55f14b2f5f109cf1c78dc18aa92fcbe3c357fa9b4d7dc43a777f4051ae0162a6c3a367757a4b75d019f0ae2fc1e97d4b0f7dfe9607a8495faa46673df040a70e3e58d9edde335c10cfbfb72b2dfa17ffce8ff743b4dcdf0a10248d5785e3b1e4f7e9d2db063f6b2aa08bca51c465b0fe9a1db50629624a9f5a157fa87c17bc08b98f9a5837ece1b26e142a25b8296b49da5e373d7d955f5e05ed9fca498d6b9ec794d2385644bad4a722b5162e15705768339df11969cf5316a0fb23a8360c2b62d326eff9c9a18452b6c735785604c1ec700dd9925820ee2bf4ba1ad33053fc170d83b4e55b4cf48a802125a286784a5fa2c1635e4e5155ec38540d9ec0d585066fd04c96a1bc362a5178344374fca50044a38bc5262b68db7514afe4bff5d6c421e34d669b7ac22f02072a838afc0f61f4c4529b4c9049fb10e58c8a2792c3fa54d75bc98c5decbaef5a3eede79d10f2eaf4fece621720123dc4310997d9dd0c5638463144d2370f4fea35a2651d99fc06840a4b29d693b1a88b66718ad70f226aaf4d196040559e875ab905dd3dc7ed235985b3c304e138cb553dc4a544d8e7d8041ca90174ef2ab46a9bbf2cd6839f494db5ac6b2c61f3830c58da67677d70084a3326ffa4b0bbdfeb305cdafab3ae18065bfbe9a05ad0c9d49df3fbea8e609f0cb1f6ca97d8ce8c04e596edd08807e8ef1a5295aa3452f0e6b3e96f2018d2109bafed642f1c2988878351772f241d969a28fb37283348e23fed8c7e30b1f0e3a6a428ea8db7876e420c8b0a7580a792044664f33a0c0e0e2832a7bb38e13a55ec355dabc3b821f1a99d9682c3c7dff3b3251ae97aa616eba294c0ff02f3024e1a440f6b53deadd3c87d50d57bad2506e175b3f58f49a65f918837151be14d538bfe45c0f9e0945fd84d4feed5d68d10f0b6e552cffaabf5c55b09acdb7c20b71137c91fe3d490efe67327ec951368ef2bc8f9781b8503a81bf08f7101de6d622443e51785ccfdcdd4d0ce9b56018b250e63a5619efec62b78674808e3b43348704e48ed9c1e6efaef8cb76f45c4eca7cc8a475628adb65e565e73028ca82cda11456f0d7a4167181704d959b6884c7011a519acc745cd24bc2fc95da29207347683f2accb7aea0017b84381302d320ecd48fc59c8a9ac4179253ceef69c9e2b56e991a1f7c49c2f23dac92ff59883fbb93a83bef1afe0860f385e7c07da27a04059c6c71f95078f2ff619bd940347b5c9df7a3ac43f53b283bd3d56ac4fcf084448013eb7ae5bbd7a251333248de611a6174ae60ae50189dc5264e2b2d03b647cca33433f8ad9f624a33296bdde5715a5df99e03ff6126510f00b01b9a16991255d1dcbaf1ac4edddce659d0afdd4e17c6f7dbbbb37757924566b95aa886c3a6227d3e5c72d8620d48e3485d0d0d79cde34015dcec4d9b428b4220c382d9cf0c4659bbc35435220fa057b59861bf16a8fcda09b7f7dc46370f17c30c7269096a33894be5d7315a865090ab40140ba0d90726d92f79c34be9e0bb43e1fa0bc4eb0b40394228725b13710031d770e758d45a98f3be65ac572e31d39e948c7b91fab96aeb2db2b38680950af8d901560b1d94b90eefa5877377cac644a7f94f6ee69f2b9f7e25bada5cf1eb7a2d743e1d35eb94b4b3ab5ac73f021d05c145ed3d25703b30e9e3ce6bb1772d538aa92d3ee9987a3bdf956668c9ae5a24599c01c6169b53afdceedd9dad271c", 0x1000}, {&(0x7f0000001a40)="eb85b16e9429d05556a667614d3718e584160dfc23077ac4f974db67445417c27a95cf1578aa3d063135b7bde3b1ff1f187e8c49743e5225fa4c0375090c71f911cc8b9bddda74138eb6e2179867d27e37e25ae74d536586d3ba9443f8cd232525b9efa489a23ad139e9e0fbd11ee6844992a4bd95ff9a16697144b556af9f2fc4878d8f80a3c31e8e57c0faa128fb593d896c2b4b7097d4d72dc87bc66e0719547cac4b54365f8985fe487c2ae422f9759e745cbe85c69e4589eefc03d9477a193c427565c82a19e9d16cafc0dbe4f757f38cce05b330fd6e4d04ec941d5e4a85a8d1cdac2b4ae8eb2e5e365e", 0xed}, {&(0x7f0000001b40)="2432448505eb352f0e58672b4a33658d185e630d3efff3d12a06d880fc871c68de6fca318180a3b5102e48b894", 0x2d}, {&(0x7f0000001b80)="469f7782ab84b5cbdc973902b570821a79c162724aaca2eaa69480ebe74f8fe49173dc86e7773eb44b4c5b042625a7889223215d7898cb21626b92c8716917b0cc4fa952c30807dddd6600fbfd5375a9e9ccdb6de2e61513344732c4432e2bf4fd1675e5d371ece7b2acfc87d5193279ffd1cee64b44f7f9409df817b03a89bb6fe68547340267741b0e3ddf3ed3e17022beb03696390d91e30b4fd9286bf92d994fa59a35edff8aea2f6aaa40e4d4523f054783afa7f19d74fc426ce1974bcc4f2b4d24c2c419dc549c7fd78a28a9dadb7f623bb9d9ddfe6e6cc3692f37f0283841c6fd94f591bda285222d6ff22cb4fcfefe8fadbd", 0xf6}], 0x9, 0x0, 0x0, 0x40}, {&(0x7f0000001d40)={0x27, 0x0, 0x1, 0x7, 0x7fffffff, 0x0, "67564019af59625adcae294108527043da0f41ec90aaa70f2f36c3661c51f974785c9113920d4391b68649ed22c7cacce000894e9cc7da4bcc593dcd0051b9", 0x24}, 0x60, &(0x7f0000001f00)=[{&(0x7f0000001dc0)="4748eb051576424e44738a60ea242596e733b5210693471343458b6cacc0bf5785b023b5917f83b8c19dcacdd39a9a893a2fb05235ad62f8062a12633ad8d10b477ac30621f70ff043c03e0d3a9ad00468fb2ee5c059df1499dacc94c82672c67ff534f7e494ddf08955bb5798955a99f00a1d1745469241fe5688cbb672186262fcb7e8ee4e513166c7ad9e84825b93d74691822507b76c46f03e746358d7d60e7e1736b89ee021534d12e2601216329b4c813bc4821ca14a150439bcdefd7d53b295c46d56276d3de19ee75fc8e3584f61ba9b8e0d74cf04ef0eb54d2f299590232979710078f9f102d775", 0xec}, {&(0x7f0000001ec0)="fefd5010836160807f953c3e5cf7500f09a9988bbb83b5d1308eb1a12b2bffb90a92dcc8d7ed640527df", 0x2a}], 0x2, 0x0, 0x0, 0x40804}, {&(0x7f0000001f40)={0x27, 0x1, 0x0, 0x3, 0x9, 0x2, "a02fab5088220be2d2067f4520eee53f8fac8849502303ee593624e0ac87b7b614f8b5bada8b59136aa9b3e00c1d6c061dee4ca71e1e98606fdb038b9bfccf", 0x25}, 0x60, &(0x7f0000002100)=[{&(0x7f0000001fc0)="be61f080a9456d", 0x7}, {&(0x7f0000002000)="5a487fcbb56c48d47181e57d06b03bc20a", 0x11}, {&(0x7f0000002040)="4b38c1230a49754a0ac183174feaac717f9b37a5242bf38737cb58c6ed2cf67dc97740f395bcfbecbf76fef4a54650a67fa79b7c5559a1fbd584e70b803a29cb03ed9e630a54d640171bed759cfcd37f055c355b4864297b4d807641b825edb3014cf20f8cb8934037a7f311c3ce8189f00c7ed95541c25d031fa2e72e5096d287c77f470bc8802bdba80815d93ecddce9f91e6f2d32afa884be23ecaf4933fb605c1276cea9a2c81f6e74fb", 0xac}], 0x3, 0x0, 0x0, 0x20000040}, {&(0x7f0000002140)={0x27, 0x1, 0x1, 0x6, 0x100000000, 0x58fa191b, "9f64a31c2ad37fcc2bd7df362b3dae9e262436fe65517daab8112d2d7620419733fbc82409746d88204a8b3f09c2a7e2a475eae1aceb7195a21f74e478e001", 0x6}, 0x60, &(0x7f0000002340)=[{&(0x7f00000021c0)="2dd7", 0x2}, {&(0x7f0000002200)}, {&(0x7f0000002240)="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", 0xfd}], 0x3, &(0x7f0000002380)={0xf8, 0x110, 0x3, "dd3062cfc8cf721a45a1a52ac55c93e854c3f61e33b53e8c4434b9bf95c4a162839bf29ea0bd663799c81ab5cacc99cd53cc9c5b40b02b6d16db662276012fcfbbc98de273640137415550332654d6397bf82e9e8d08f6cabbd4efba9089d78b0bc355c19f5fa966a8ffaa2eeb85c959727f9f1f0347e170be42cbb5046153352ce9ba55bac3a87d802e49d8a95ae3e0bc2ccce01b181889e247edb5f94e1f1ed06ba0359b12cea23198eab177998505e746d20d4b2d0b014b833a576851ad7d3125f6e9cdaf29a4538203a9c2985abd4d8fbe9d34e366ab44a30c07a5df108eb48e8c"}, 0xf8, 0x48814}], 0x6, 0x4000040) syz_init_net_socket$bt_hci(0x1f, 0x2, 0x1) 04:06:28 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x2, 0x0) [ 2383.914969][T13945] gfs2: can't find protocol [ 2383.914969][T13945] ock_nolock 04:06:28 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x8, 0x0) 04:06:28 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x4000000, 0x0) [ 2384.023592][T13945] gfs2: can't find protocol [ 2384.023592][T13945] ock_nolock 04:06:28 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0xf9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0xee00, 0xee01]) getresgid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f00000000c0)) r3 = getgid() r4 = getgid() stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x6, &(0x7f00000001c0)=[r0, r1, r2, r3, r4, r5]) syz_init_net_socket$bt_hci(0x1f, 0x2, 0x1) 04:06:28 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x5}, 0x18) 04:06:28 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x3f000000, 0x0) [ 2384.249787][T14164] gfs2: can't find protocol [ 2384.249787][T14164] ock_nolock 04:06:29 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2000000000000007, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000000040)="9ea57ea763f4b94697d46623e38986e37504832c3ec075e7d53b65ddc98278aeb2801a0d26d6387028f947fd7b6b473f4a30094292fcf3e0e2900e36d92fb370ce8fefbce0a8884560dc5b", 0x4b, r0}, 0x68) 04:06:29 executing program 3: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getgid() setgroups(0x2, &(0x7f00000000c0)=[r0, r1]) syz_init_net_socket$bt_hci(0x1f, 0x2, 0x1) 04:06:29 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0xa40f0000, 0x0) [ 2384.401906][T14164] gfs2: can't find protocol [ 2384.401906][T14164] ock_nolock 04:06:29 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:29 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) ioctl$LOOP_CLR_FD(r0, 0x4c01) 04:06:29 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:29 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x11) truncate(&(0x7f0000000000)='./file0\x00', 0x401) 04:06:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0xf9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0xffffffffffffffff}) getsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000040)=""/53, &(0x7f0000000080)=0x35) 04:06:29 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x100000000000000, 0x0) [ 2384.592748][T14290] gfs2: can't find protocol [ 2384.592748][T14290] ock_nolock 04:06:29 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000040)={0xf9, 0x0, [0x5, 0x400, 0x80, 0xd510]}) syz_init_net_socket$bt_hci(0x1f, 0x2, 0x1) 04:06:29 executing program 2: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, &(0x7f0000000080)=0x80) fcntl$setsig(r0, 0xa, 0x2c) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001640)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, 0x0) 04:06:29 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x200000000000000, 0x0) [ 2384.715315][T14290] gfs2: can't find protocol [ 2384.715315][T14290] ock_nolock 04:06:29 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x223}, 0x18) 04:06:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0xf9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000140)={0x3, @null, r1}) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:29 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:29 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x300}, 0x18) 04:06:29 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0xa40f000000000000, 0x0) [ 2385.230991][T14705] gfs2: can't find protocol [ 2385.230991][T14705] ock_nolock 04:06:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0xf9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x7, 0x1, 0x8, 0x0, 0x11, r0, 0x3, [], r1, r0, 0x5, 0x5}, 0x3c) 04:06:31 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x2000000) 04:06:31 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:31 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000100)='\x81\x84\xa7r\xe3\x8d\xf5\xe9') ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'vlan0\x00', {0x2, 0x4e21, @broadcast}}) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x2, 0x1) 04:06:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0xf9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(0xffffffffffffffff, r3) 04:06:31 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000200)=""/253, 0xfd}, {&(0x7f0000000100)=""/87, 0x57}, {&(0x7f0000000340)=""/144, 0x90}], 0x3, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) [ 2387.010463][T15790] gfs2: can't find protocol [ 2387.010463][T15790] ock_nolock 04:06:31 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x3000000) 04:06:31 executing program 3: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_IOCTL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r3, 0x1000000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000090}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r4, 0xa0b, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x8}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20048000}, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeefffdef) close(r2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000140)={'ip6gretap0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1e}}}) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)={0xfffffffffffffff9, 0x1ff, 0x4, 0xff, 0x3, [{0x2, 0xfffffffffffffff9, 0x100000000, 0x0, 0x0, 0x1080}, {0xfffffffffffff800, 0x10001, 0xde, 0x0, 0x0, 0x800}, {0x100000000, 0x8, 0x0, 0x0, 0x0, 0x40b}]}) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x7, 0x9}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000340)={{0x5, 0x3, 0x3, 0x90, 'syz1\x00', 0x2}, 0x1, [0x10000, 0x100, 0x0, 0x9, 0x3, 0x10000, 0x40, 0xbe, 0x6, 0x9, 0x6, 0x8, 0x7fffffff, 0xff, 0x80, 0x7, 0x8, 0xbab, 0x7fff, 0x2, 0xc8, 0x100000000, 0x3f, 0x2, 0x9, 0x0, 0x200, 0x8, 0x8001, 0x2, 0x2, 0xffffffffffffffff, 0x7fff, 0x1f, 0x800, 0x401, 0x0, 0x7dc, 0x9, 0x5b53, 0x9, 0x1, 0x1000, 0x7, 0x2, 0xfec, 0x7, 0xf29, 0x3, 0x0, 0x6, 0x9, 0x1, 0x800000000000000, 0x9, 0x7c, 0x4, 0x4, 0xe9, 0x0, 0x6, 0x8, 0x10c, 0x9, 0x10001, 0x5, 0x7, 0x5, 0x10000, 0xfd, 0x3ff, 0x100000000, 0x73, 0x9, 0x5, 0x400, 0x4, 0x9, 0x10001, 0xe1d, 0x20, 0x7fff, 0x80000001, 0x7fff, 0x80000000, 0x5, 0x5, 0x40, 0x4, 0x1666, 0x3, 0x77b, 0x401, 0x5, 0x5, 0x6, 0x20, 0x80000000, 0x100, 0x400, 0x7, 0x1e, 0x2, 0x3, 0x6, 0x3, 0x1, 0x1, 0x5001, 0x6, 0xffffffffffff8001, 0x96, 0x0, 0xfffffffffffffffe, 0x1000, 0x9, 0x0, 0x3, 0x14e1aa5a, 0x3f, 0xffff, 0x788, 0x2, 0x3, 0x9, 0xd8, 0x5, 0x9]}) 04:06:31 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200, 0x0) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f00000000c0), &(0x7f0000000180)=0x4) [ 2387.138599][T15790] gfs2: can't find protocol [ 2387.138599][T15790] ock_nolock 04:06:31 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x10000000000000, 0x40) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@v2={0x0, 0x2, 0x13}, 0xa, 0x1) 04:06:32 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x4000000) 04:06:32 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0xf9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(0xffffffffffffffff, r3) 04:06:32 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x9, 0x591, 0x101, 0x2, 0x8, 0x8, 0x9, 0x2, 0x0], 0x9, 0x10000, 0x3ff, 0x5, 0x3, 0xfffffffffffff9dd, {0x5fcd, 0x100, 0x2, 0xca, 0x2, 0x3, 0x2, 0x6, 0x9, 0xdcaf, 0x8, 0xffffffffffffff14, 0x5, 0x5, "15129959556d942b6aadd454b980aba7c9a100fd3dced1e8d65356aac313e583"}}) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:32 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f0000000440)=@x25, &(0x7f00000004c0)=0x80, 0x80000) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000500)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64655b30303030303030303030303030303030303034303030302c757365725f69643dbf42b297ba64ac8887e052f887b403b7cedc2f4054cd43ab03de3a37c02b59e8879338fbe7d5", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="e36401f00990647c6b76d8632c64656661756c745f7065726d697373696f6e732c6d61785f726561643d3078303030303030303030303030303030332c6d61785f726561643d3078303030303030303030303030303031662c64656661756c745f7065726d697373696f6e732c00"]) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000200)=@can, &(0x7f0000000280)=0x80, 0x80800) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r2, 0x28, 0x6, &(0x7f00000002c0), 0x10) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r1) 04:06:32 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x3f000000) [ 2387.408635][T15926] gfs2: can't find protocol [ 2387.408635][T15926] ock_nolock 04:06:32 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x7b51abff) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/120, 0x78}, {&(0x7f00000000c0)=""/79, 0x4f}], 0x2, 0x0) [ 2387.500025][T15926] gfs2: can't find protocol [ 2387.500025][T15926] ock_nolock 04:06:32 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0xa40f0000) 04:06:32 executing program 3: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_IOCTL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r3, 0x1000000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000090}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r4, 0xa0b, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x8}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20048000}, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeefffdef) close(r2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000140)={'ip6gretap0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1e}}}) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)={0xfffffffffffffff9, 0x1ff, 0x4, 0xff, 0x3, [{0x2, 0xfffffffffffffff9, 0x100000000, 0x0, 0x0, 0x1080}, {0xfffffffffffff800, 0x10001, 0xde, 0x0, 0x0, 0x800}, {0x100000000, 0x8, 0x0, 0x0, 0x0, 0x40b}]}) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x7, 0x9}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000340)={{0x5, 0x3, 0x3, 0x90, 'syz1\x00', 0x2}, 0x1, [0x10000, 0x100, 0x0, 0x9, 0x3, 0x10000, 0x40, 0xbe, 0x6, 0x9, 0x6, 0x8, 0x7fffffff, 0xff, 0x80, 0x7, 0x8, 0xbab, 0x7fff, 0x2, 0xc8, 0x100000000, 0x3f, 0x2, 0x9, 0x0, 0x200, 0x8, 0x8001, 0x2, 0x2, 0xffffffffffffffff, 0x7fff, 0x1f, 0x800, 0x401, 0x0, 0x7dc, 0x9, 0x5b53, 0x9, 0x1, 0x1000, 0x7, 0x2, 0xfec, 0x7, 0xf29, 0x3, 0x0, 0x6, 0x9, 0x1, 0x800000000000000, 0x9, 0x7c, 0x4, 0x4, 0xe9, 0x0, 0x6, 0x8, 0x10c, 0x9, 0x10001, 0x5, 0x7, 0x5, 0x10000, 0xfd, 0x3ff, 0x100000000, 0x73, 0x9, 0x5, 0x400, 0x4, 0x9, 0x10001, 0xe1d, 0x20, 0x7fff, 0x80000001, 0x7fff, 0x80000000, 0x5, 0x5, 0x40, 0x4, 0x1666, 0x3, 0x77b, 0x401, 0x5, 0x5, 0x6, 0x20, 0x80000000, 0x100, 0x400, 0x7, 0x1e, 0x2, 0x3, 0x6, 0x3, 0x1, 0x1, 0x5001, 0x6, 0xffffffffffff8001, 0x96, 0x0, 0xfffffffffffffffe, 0x1000, 0x9, 0x0, 0x3, 0x14e1aa5a, 0x3f, 0xffff, 0x788, 0x2, 0x3, 0x9, 0xd8, 0x5, 0x9]}) 04:06:32 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)="be88e5d3b5f3cb97eb3ed1f3bba58b3b52cd90fb21335cda2235265111d827b24808b87a8582fcfc700bd9542851bb32e5e3214ae2d5bfb7a0236a9dc1c2a8d20713ccc4b11221a40ff043d9247248e7111cc598612a45753713274e8a648b1dcaca3ac3a412d52b03204ec14142b187b26c9aa03913bef4c1b6f679099a95498e78be7dc15fc5ca20aa39f8090f09febbd0f13c9a877782b901e4b0018419bd2a1590613aea7ea860a29acc996f108bb568750da8481d36b60d2b1141b54dab10f7cfc7b9a4d02622d2b8199e51d3483671b2ca5cf6bde5a1cd38ecc2d7d789be9f3d396d6a51d973038a5f222bd589", 0xf0, 0x8800, &(0x7f0000000100)={0xa, 0x4e21, 0x80000000, @loopback, 0xf3}, 0x1c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x101000, 0x0) pwrite64(r1, &(0x7f0000000200)="5638e000a0578ab73c75f06cc426452002662f1efad8a887262ba9410ca4a80078409379320fdfce5e76096cc9f456c4744632a48b3b295b99d1ebad0009f5b8f3e5697444f3edeba1fb2134b058bb8f7faf91aadd480bd1cf60017f7e86a9b9dfa568596f4134fafd72403361c55f22c82c59e3d86a6d2081534eb45f7750259d5613a49299c0ed6d73861c0723d2dfe8b24c713544a05f27e75ce4778e5cbc1614966d15a4a7e00ff4572f58f889a808596b5255ebc0de2326a150b6c8e4fb1f67f1de68", 0xc5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:32 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:32 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x100000000000000) 04:06:32 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000180)='.\x00', &(0x7f00000001c0)) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f00000000c0)={{0x2, @name="4a33aa0fa8c35643b82b2999751cbdf5dae5d7bf396cb68df8c1f71f1653216c"}, 0x8, 0x7}) 04:06:32 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r0) 04:06:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0xf9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(0xffffffffffffffff, r3) [ 2387.813305][T16172] gfs2: can't find protocol [ 2387.813305][T16172] ock_nolock 04:06:32 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x200000000000000) 04:06:32 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0xfffffffffffffdb0) 04:06:32 executing program 3: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_IOCTL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r3, 0x1000000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000090}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r4, 0xa0b, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x8}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20048000}, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeefffdef) close(r2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000140)={'ip6gretap0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1e}}}) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)={0xfffffffffffffff9, 0x1ff, 0x4, 0xff, 0x3, [{0x2, 0xfffffffffffffff9, 0x100000000, 0x0, 0x0, 0x1080}, {0xfffffffffffff800, 0x10001, 0xde, 0x0, 0x0, 0x800}, {0x100000000, 0x8, 0x0, 0x0, 0x0, 0x40b}]}) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x7, 0x9}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000340)={{0x5, 0x3, 0x3, 0x90, 'syz1\x00', 0x2}, 0x1, [0x10000, 0x100, 0x0, 0x9, 0x3, 0x10000, 0x40, 0xbe, 0x6, 0x9, 0x6, 0x8, 0x7fffffff, 0xff, 0x80, 0x7, 0x8, 0xbab, 0x7fff, 0x2, 0xc8, 0x100000000, 0x3f, 0x2, 0x9, 0x0, 0x200, 0x8, 0x8001, 0x2, 0x2, 0xffffffffffffffff, 0x7fff, 0x1f, 0x800, 0x401, 0x0, 0x7dc, 0x9, 0x5b53, 0x9, 0x1, 0x1000, 0x7, 0x2, 0xfec, 0x7, 0xf29, 0x3, 0x0, 0x6, 0x9, 0x1, 0x800000000000000, 0x9, 0x7c, 0x4, 0x4, 0xe9, 0x0, 0x6, 0x8, 0x10c, 0x9, 0x10001, 0x5, 0x7, 0x5, 0x10000, 0xfd, 0x3ff, 0x100000000, 0x73, 0x9, 0x5, 0x400, 0x4, 0x9, 0x10001, 0xe1d, 0x20, 0x7fff, 0x80000001, 0x7fff, 0x80000000, 0x5, 0x5, 0x40, 0x4, 0x1666, 0x3, 0x77b, 0x401, 0x5, 0x5, 0x6, 0x20, 0x80000000, 0x100, 0x400, 0x7, 0x1e, 0x2, 0x3, 0x6, 0x3, 0x1, 0x1, 0x5001, 0x6, 0xffffffffffff8001, 0x96, 0x0, 0xfffffffffffffffe, 0x1000, 0x9, 0x0, 0x3, 0x14e1aa5a, 0x3f, 0xffff, 0x788, 0x2, 0x3, 0x9, 0xd8, 0x5, 0x9]}) [ 2387.911723][T16172] gfs2: can't find protocol [ 2387.911723][T16172] ock_nolock 04:06:32 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) accept4$bt_l2cap(r0, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x80000) ioctl$TIOCSIG(r0, 0x40045436, 0x17) connect$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x2, {0x1000, 0x0, 0xfffffffffffffff7, 0x7, 0x80000001, 0x6}, 0x7ff, 0x86af}, 0xe) 04:06:32 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x300000000000000) 04:06:32 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:32 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000000)='ppp1\x00', 0x5) r1 = gettid() sched_getattr(r1, &(0x7f0000000040), 0x30, 0x0) 04:06:32 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3f, 0x400000) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000180)=0x4) 04:06:32 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x400000000000000) [ 2388.168418][T16414] gfs2: can't find protocol [ 2388.168418][T16414] ock_nolock 04:06:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0xf9) r3 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r3, 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r3, r4) 04:06:33 executing program 3: r0 = socket(0x848000000015, 0x805, 0x0) ioctl$void(r0, 0x5450) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000040), 0x4) close(r0) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0xa6a, 0x4000) preadv(r1, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000000)=""/178) getsockopt$inet6_dccp_buf(r1, 0x21, 0xc, &(0x7f00000000c0)=""/116, &(0x7f0000000140)=0x74) [ 2388.234907][T16414] gfs2: can't find protocol [ 2388.234907][T16414] ock_nolock 04:06:33 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x80) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000000)={0x0, 0x1, @raw_data=[0x100000001, 0x2, 0x3, 0x2, 0x1, 0x7, 0x1, 0x2, 0x1ff, 0xffffffffffffff80, 0x2, 0x3, 0xffffffff, 0x800000, 0x7ff]}) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:33 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:33 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x3f00000000000000) 04:06:33 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r3, 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r3, r4) 04:06:33 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffaad8, 0x8, &(0x7f0000000600)=[{&(0x7f00000000c0)="4407ab8f4cfc54d20dd45b88ad0468f6c23187452146d97f7fb7bb422b7de3ad79b395f54a6cd73262ba20ea9ac3d2c45533c7888efcc7f8d07f177105c1a6cfcab875b4e5d80a3053532483737ad08e4d74af510b3ac90cc9921bc0abf52bdf8b050251be250e4b24ceff5e189c55c9b2d2cc666952a48b6bd167f49a1b2f65d0cc40dfcee4cd27ff2558e4c42119420017a74d131f9b279984ab779cb9b8134f608d647ae60c75c7c873cac50ceaeda7b1b2079ba45a3f1a868c67bf288124a02fb8ece42e77e00a66489aa4afb8d83f971feff8b8b8f6eb93dc34", 0xdc, 0x158}, {&(0x7f0000000200), 0x0, 0x8}, {&(0x7f0000000240)="70583dc79f09b2ff0dea0b211828c39721b2639b9ed7c3c3956436b92a0431102c4c8ffb0c4449589c0862ae4c99733b8388ee53b82eee57e0a4c61b19e778f395aa43df", 0x44, 0x8001}, {&(0x7f0000000340)="136b27519d4566353258ae2b1a194bc74258363f518276ea09d58f0711c7487de52511b410a5af7e15650fd7f7a36005178029a9128ae550d99c47206e4c08d4ca4f0eb29c8a500f2f83da5d7378dd879e479ac98e5d24493b287e3a11db2c8033a3965897e56a2bf738d513438643e0ef0d294936de4742a7a906fc1684b0b199dd7b0282935e734918fe260637ed1c3b3d22e006607ade027b855bd5e2a9707bd9090967c4aebd4a3d0ba2cb93e8838a2d94acb75d6bd803d3", 0xba, 0x8}, {&(0x7f00000002c0)="604959ac9dcf4de75f59dfb02071eb813da02928202e1a0f801e9c7bf89f6b1c6678b228434fc21ea01dd7fa3e82cc40ac36fd50dc3b6a51fc", 0x39, 0xa152}, {&(0x7f0000000400)="896d6e35cee4fe2f9d46b7ea433f22a8b6f3778082c248ccc3cbc1ebdc23131b9589227a55d2e3da1e9ba30692297aabd2d637c436abe957775a1b4742fe0c568b3e7a4523081f52d00628be6412e076f1be1898bd7fa25644f7f5f9a4084198581599fe2001896b642f5103a61d67e7e4", 0x71, 0x92c}, {&(0x7f0000000480)="a09a035428c1e44a9366ce14473b52af10b27ad0cb34652bdab36aa2b272085410d6595246d72cbabed1605283d408025440fb234c68db550a5e5ca7c9651794fa27e74cc007bef93c7db90b17eeed5157fe6c3446534e82548203b41fcba6", 0x5f, 0x1}, {&(0x7f0000000500)="50e607f3af967c855fe805c015318a67db6eb21758d5cee6d15e00495667d6c2d8688fdf223819fc5c7a98495cd61a3828772134dbcf0a51b56e7a8165f2864354ca3a4318267e85eed0f3fb086fa216a2ce6cd2f2da46896a35164116b268ff8a05261c1650af739042943bd8a85036e7a1c4eff97138658b1a94e6b6b025dd27f07146e99abca20c3a4e30e35ac30f431f6e8d281250b3e21476155b2d0c97636f7f8dda6b41811230dfc94415df0d11bde6db863c614f0f1dfe1e64165b1c4494aeb510de1b90f9", 0xc9, 0x1f}], 0x80, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x5, 0x4) [ 2388.430105][T16609] gfs2: can't find protocol [ 2388.430105][T16609] ock_nolock 04:06:33 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000000c0)={0x7, 0x6}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) 04:06:33 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0xa40f000000000000) 04:06:33 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r2, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r3) [ 2388.532340][T16609] gfs2: can't find protocol [ 2388.532340][T16609] ock_nolock [ 2388.570378][T16625] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 04:06:33 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000040)={0xa5000000, 0x8000, 0x1ff, 0x5, 0x5}) 04:06:33 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:33 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0g0000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:33 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:33 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x1, 0x0) 04:06:33 executing program 2: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100, 0x0) r3 = socket$isdn_base(0x22, 0x3, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000080)=[{r0, 0x8}, {r1, 0x22}, {r2, 0x1}, {r3}, {r4, 0x200}], 0x5, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000100)={0x7}, 0x8) r5 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r5, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) r6 = geteuid() ioprio_set$uid(0x3, r6, 0x1ff) ioctl$VIDIOC_S_TUNER(r5, 0x4054561e, &(0x7f0000000140)={0x1a0, "0873e98510d67a148cef7c3c37ac1aab8e13b55e634a58df931f1ef10a366cad", 0x7, 0x200, 0x7, 0x0, 0x2, 0x1, 0x9, 0x4}) 04:06:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x80880, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2388.739460][T16763] gfs2: can't find protocol [ 2388.739460][T16763] ock_nolock 04:06:33 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) lseek(r0, 0x0, 0x0) [ 2388.835845][T16763] gfs2: can't find protocol [ 2388.835845][T16763] ock_nolock 04:06:33 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:33 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:33 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f00000000c0)=""/7) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:33 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6cb9f584322b295c3d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x3, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f0000000a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40)={0x0, 0x0, 0x0}, &(0x7f0000000a80)=0xc) r5 = fcntl$getown(r0, 0x9) lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000b80)=0x0, &(0x7f0000000bc0), &(0x7f0000000c00)) r8 = timerfd_create(0x3, 0x800) r9 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001040)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001140)=0xe8) r11 = getgid() r12 = fcntl$getown(r0, 0x9) fstat(r0, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0}) r14 = getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001600)=0x0) getresuid(&(0x7f0000001640)=0x0, &(0x7f0000001680), &(0x7f00000016c0)) r17 = getegid() fcntl$getownex(r0, 0x10, &(0x7f0000001700)={0x0, 0x0}) r19 = geteuid() lstat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r21 = syz_init_net_socket$ax25(0x3, 0x7, 0x0) r22 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001e80)={{{@in6=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000001f80)=0xe8) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002080)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000020c0)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, 0xffffffffffffffff) lstat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002280)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000022c0)={{{@in6=@ipv4={[], [], @initdev}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000023c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400)={0x0, 0x0, 0x0}, &(0x7f0000002440)=0xc) r31 = getpid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002480)={{{@in6=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000000c40)=0xe8) getresgid(&(0x7f00000025c0), &(0x7f0000002600)=0x0, &(0x7f0000002640)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002680)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000026c0)={0x0, 0x0}, &(0x7f0000002700)=0xc) lstat(&(0x7f0000002740)='./file0\x00', &(0x7f0000002780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r37 = gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003180)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000003280)=0xe8) stat(&(0x7f00000032c0)='./file0\x00', &(0x7f0000003300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r40 = gettid() stat(&(0x7f0000003380)='./file0\x00', &(0x7f00000033c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000003740)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003780)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000003880)=0xe8) r45 = getgid() r46 = gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000038c0)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f00000039c0)=0xe8) lstat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000003b00)=[{&(0x7f0000000440)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000800)=[{&(0x7f00000004c0)="e796cbad2989aabf79adb003483d856dbafdaf7a2ecd62882d7a051ef78f8d3dbe604061bd5fd5140666dfeadd6d2ee1c9fd889641d05033002b385ac0f59492278023154f7e46eb82bee5fce44653f10655ec6ce08d6b32b718c09ce10928a58060fe7f6a140840958e76bebf3b67f20a0ad822dac28e42d73d6b686a459426fa338b795e29607a028097fbd392d5021db5e61afa37c5103a6c2b7b155a26edec0b043c7a311c286eb4e8df3dcb3e2d38ee648ada4a297994e9dc769b12619207b1e9407d60b18bccbf5ea5b189a0fe6d4ab83c539779ceeb4a7d5a", 0xdc}, {&(0x7f00000005c0)="f7c58c691e0ee78ec113224a0e330932cce2a049a057bb0cbc361b5bba1163486210b05c77818e69e747b6fbdc6ab34c7a14a8c12595b01de2ba60822b40c94eb015ccde1fd30bac0362126655981bf591c80994ea7066232c58bf920884528aebd7a4e35f557a3c06c0f8ec3079d748b6ff2d157b4dc44eaad10e787ef277f76f0c835d5c48111938a365555494b3a048824675d86b764863b64a04eabb88ab", 0xa0}, {&(0x7f0000000680)="2d9e3f8b1a67962a06875ec4c019645b52350c8622ad2577643c763835370bd3a825516668db11406394e0fe5b223d55a21fd9c50d657e6ddef69cf69161a241f3ba08490187f30382d03f03a6e2e1f577ddc715ac35befd0f92e76112af1fe08b38e36ed7c13095841e6c273c65199d06aa30a6f1c63e7c87b354eea2d69eb98fb4f87c1049532c", 0x88}, {&(0x7f0000000740)="eba836b93d8682a981c5824054ec1f68cc4396d46403aab5179d1b54abfc47a2e60d3eb44f5f9e1db6415af7506501dc3112684e1d8290b47a058423", 0x3c}, {&(0x7f0000000780)="70936ab3934b6ea4ec0d829f3459b79c9db8b3304dcbda3e05f883c7588111c1bc77e5b16cbbfe8b2aaa9947b3a9834de322f05fa9c2a73338418b4fca9634e158e96a74ba6a1e6e6f8fbf1b92ce84c77df357e89a8771a1b35272a56c0b744883ca2a3b8df74089b2bc9920f4", 0x6d}], 0x5, &(0x7f0000001200)=[@rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x28, 0x1, 0x1, [r8, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}], 0x150, 0x80}, {&(0x7f0000001440)=@file={0x1, './file0/file0\x00'}, 0x6e, &(0x7f0000001380)=[{&(0x7f00000014c0)="02fd43b3e58966bf7a3936bfea54889accf53c85492671f83e512621f81441837d45bdeef8e0e725ddc0cb249819a35997fd2203cbe6cab1d6ed8efb68a27b5c2ad6b5271a926f1c5af56f030d2b4becd884905291f0f199d4b5527e133db346e9b24dcc59", 0x65}, {&(0x7f0000001540)="10f4be1cb7bc4bb3ffa9e9a8b6ffe16c8b815fa5608046189090ca8e5131e2ffbbb9ea916cc683c519f0161eebf172af5ea8f770d1c99e147771b7d204f5b387ade49cad974bb6575b0a89676e525c4579f0afb8ea726b71f7d8351e424e9eed9381072cdbb9a5878c3d2fea252150389849dd49dce9f888d831a54cbf1adb4d7a4102d5ebce62929fe1914957c9104c9e96688c8742b7826c4bcad9ca1b9cb652f6f621efee08b6e9c955c5c5a646dea52ca6f1bd767f333413a8", 0xbb}], 0x2, &(0x7f0000001800)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r21, r0, r0]}], 0xb0, 0x8000}, {&(0x7f00000018c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001c80)=[{&(0x7f0000001940)="9f63eb1df08bf2362c452b1e722f856a05c48718154a53a5ebe2d6ecdf2ec87446a488a99ef10049d94d003eb809d737fbc328d85137ee55c67e881ad519e1f7a7b7446295cc32fbd46d15a401f0ae4493166b14fbb7", 0x56}, {&(0x7f00000019c0)="012eade7ac5825ea4b6e499993c51923c9da810f69b09bc94119fa584f77740d7736a1fa0fec6b86e91acf05125fdd2b9127f23073173150069fa9f1cd8f0d55e1306ec1e424ffe348a1063996e2c6a9f0f3db6bf3dc0e1ba6d16b1801b7f135c999c510f085322a675ed436182b6f58cb1283284a022291737c556cbbcd31aafdc27ec288a1cecd4c63d130a395a4eeda0a7b9f23e01b2dbb70d0f95325e0d0df62dd", 0xa3}, {&(0x7f0000001a80)="54eca22428ff6f8f92b1445d6661b2f751b094d2ef2a1bd7df0fb1d57eaf62211e3fba16062c52fd998f9e30a345fd2684853b62a5615b3db4498336a8f4b8eb44c37c22cd39d27d07e55749176c06fbe0b360a1d5cf5c50f815c583348ff2625da33b0ddbe6c5565ee714b800b1dd60e0d3cee71ce0e54a1c742e5241ef61c6f614b9f0d1e5cabbe96ce6ad55e349add9fe08f146abbfb7e66968c1121752c44fc999e3e986dbc518e686867d2ddcbf7179244a77f107f874658a813d33350328acb10f5ef25ab83a5d819472902b8c3c84205e80c32421e2582221d849", 0xde}, {&(0x7f0000001b80)="c7bd196e13e33a0065bda5a887599235b66c474b9b5cf017b3bbea5e9e7a5bb1ab7f36a61400dc58f983705365cc929c5cab293a9509c65d6180871d02c4c8319846163934c1f8df64082a38ae85f11c5ceff2a55a4cc493e71c45739c3b4e2229319b9c27e7951ff323f17ebc97cea0dbef13efe26e59ebaf249e699fa15c9a449f7e9161c1937d3d40e3f564155d68222a542325396a4241be01982e7a52a6845c78860ee12f2469746c0b4bc799c1b93d924208d41f8167f500826ec5415491426a8713ddba8c537f0dc302c596576634aedfa1d04b691a14346e2a8601a9", 0xe0}], 0x4, 0x0, 0x0, 0x4f75b80b060ff045}, {&(0x7f0000001cc0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001e40)=[{&(0x7f0000001d40)="67ad69cfc6b193228e817d9613269ff0639222014c748015514c6000e0e767670a3ba3f090e2962b678dab58767e577280e17d229a07a79756517a8976587cea4ea8cbf1112292498043ebfebc03bb7f6053c0781e287304af6805e75aa5149c83f501f2a3dd2787ecc15054bf68bfc12248eff0b36df198e5967d577bde990294ef4dc766ff55002aad9bebba42ff17135f71010a300d8b001c97f30d2f178fa9ad39a0a32e13be935885", 0xab}, {&(0x7f0000001e00)="3931807523d3f9e07161469655ffd7e1e702d9e14b9578a7a01d61c4360b5c3ddc0bcb", 0x23}], 0x2, &(0x7f0000002800)=[@cred={0x20, 0x1, 0x2, r22, r23, r24}, @rights={0x10}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r25, r26, r27}, @cred={0x20, 0x1, 0x2, r28, r29, r30}, @cred={0x20, 0x1, 0x2, r31, r32, r33}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r34, r35, r36}], 0x130, 0x4004040}, {&(0x7f0000002940)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f00000030c0)=[{&(0x7f00000029c0)="7828097d8329c0776b899c981ed9f893d6e64b51cced3a6e718b2a781aad0fe503ea9433c57afb76e2131035cd18b114cd4664e69635ce0e3a70f07e6b43619e30ea30f02a1430f97a3d09b79ccdc38b2d9423199da06551eaba31ade156cb1983e8d7869ef979ddd65cebc2f995f23b6717fe29aaf2be316ad6eb4bd73ddf45f6d9bb08adda1aa8f630c832198bae5c220dfcd4ce88467826b7e1b545865743e34e22cdc5ce6586c11852569b99ae7ed9cd167ec9be5258c0e4ee8cea5cb99fca04629e31ecdaa2d40f4c06aea1b1e869867fe563e8e286ddc85232f0ec50f6fc3a04e5", 0xe4}, {&(0x7f0000002ac0)="9544f7d690679394ac3f6ea0efca46c55c49f62c33450cbd6d0a0a4f4e38277cbded24acad0b7b7bd95f57c10c11737688dd6adf9cc3cc74e44d19e662652b5f3b79a298b679374402f2330224dc72b39c191126cfc8269de5b1f07f96660c59a2081be152c50199607612d232", 0x6d}, {&(0x7f0000002b40)="c67222de26186004cee76b712fe5b1264057c46b3e1a6abf710e391cf0bf825e4fad28339f5eb0f91675fa8b0ebe4eeaed64e7a9003123c8451a6f7dc1567730ee3d41c04b2d0cf78942a967946500f199b4d217cabc1db5aed8ff660968e8", 0x5f}, {&(0x7f0000002bc0)="764ee5833fa95f485498676bb0bf0e2fd74d01e62ea9d77264cd3101b9c7cc2afa9830d03af7541e91ee5ac20c48e8d5707f570c9dbc787ad99c402751021067854022dee58c7a5a562d239f3176c7b4aa79fc418c61437736bb5aabb86083615c7cfce46a6daadb5b6c0123a63e1c48c6d98801bb0bab2db385210f82512d9e0459c4443e1c0d8e467953e84718cca1c56a713ce1713f753e065d223346105d1e41c65146e511888090555c8a83cb500ebbfd0011f3dbb533bd3d1c202098cc813c86eb2950c35ca26ce16abbf84062be5e01b710c4c65cdae121448d5d255d5466144492c2f9304b60a7d58770aa2c47f8", 0xf2}, {&(0x7f0000002cc0)="98251d65c30534cb52db53e580f82087363997b0850403e1c6f0cadd38477a767a1176467d42592ae129e51b22243fc574a0b02d6c7a0b1c61bdfcf32cb2bb7f9719621b65bce309856fa0b626c4de64e0a0c69da7620f8dd8c329b9dcdbbb8c63654871d5f7e1f18936aba2376459fb2b2b47dad4ec46855a3593ad622b9e9653d6315b40d0ea052d1ce59bf9ca7552b208e6319952af7c1895257495c158d9ea5b7c2e364399ada361c3cef8b07efa4f7c4ac58c3e849ef0343409cc4c42cc1f45684a8ca2c9d31260352faa7ec975f641f49b9622697b5c993a6437b6bd302c43f75ec749531d571251888e272755", 0xf0}, {&(0x7f0000002dc0)="dc70482e9d2f66403fa72b16def3390c027e2ab3354de3cc0a6e11bd1dbf80908e95a8b75a0ba9a0bf249a63e0f94472b3a0458761307418fe7d97f7738def0c01543b91431746118e1c5348080b8e0f2eefc3f23b0b9effbd3e5abfb308d9c2caafcbbdd5a23942b781e2e29413b9a02ca60f4a29fbcb3a779e601b65ecabb9e0d841a7a000b90df9a41d9302d29e90140cd6a50e52842f2cde336595eb72681fb603dd32ee028d64f3056732ca2ce18272c1a4b18d7f", 0xb7}, {&(0x7f0000002e80)="73a6e45345b2a951d5751074570c3cca3a3ce03dc6b2051f37f7e5225290b105b1b7b077fba0d54cb04908f05b270eb8ac3ad42123f57abda5a4baa9fa9e94297cf4d93ebb8970b2af906ceaf8d8bcfacb0898946bb3bd3a927b75ae8c848206f872fbef7bb99c58dab536009df187076e23b1f874b34dccb1c9d7f3d72adc4510c4b4a455e7df940a0080a2933277ff34a8bc3aeac9", 0x96}, {&(0x7f0000002f40)="c8ef69759b77a361e60a013cda70d5c44a62e637e6f71a574b57d8253f85cfe3960fb0f61ec2b0a16a18cdaa692531a9f11119c6a973bf18d6957762f23723316b89c9e6d42f1de4e307a383cbfd8f18f306cc4f785bde9ab2fcae4d8dcddc9a0c62a28eb9b329d16a47d391c989e4824e7c75b639f74152ff0a4a9bb688a133c7ff4620f943a12335680b85a187f166bd511ab500f2dca347", 0x99}, {&(0x7f0000003000)="57e1a536b67624d5f620d92efeecdc07558ecd6c22bc50ce6e33558155de35bae9bfb44b5c34cdaec6d06c79c55714df3140fcbf316ca9e29651cf48c5924158c6463e21aec89735cd9c06d0e419f3ed104970362d25702d3c62920240f0f79bb4ae29e8285792f41cc09e27899e31f1c639365237f855aab442a3ba3fd9440d3f589b89fa9746b3425409d8750ad769b4d42e863ea2b951b5425d1382645c405e096bb80b228532c5", 0xa9}], 0x9, &(0x7f0000003500)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r37, r38, r39}, @cred={0x20, 0x1, 0x2, r40, r41, r42}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}], 0xc8, 0x1}, {&(0x7f0000003600)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003700)=[{&(0x7f0000003680)="711eb03c6b3405a6fc66a923e8643b952a5cd18bdaeb910ba859021ec7e45078f3a453bf3a949b0287f83d8ee22e12f6872a9e24be44854841a5053de868cdef14f1d7200ec266de87dc7eac800c66", 0x4f}], 0x1, &(0x7f0000003ac0)=[@cred={0x20, 0x1, 0x2, r43, r44, r45}, @cred={0x20, 0x1, 0x2, r46, r47, r48}], 0x40, 0x840}], 0x6, 0x800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r50 = getgid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x50480, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xd000}, 0x2c, {'user_id', 0x3d, r49}, 0x2c, {'group_id', 0x3d, r50}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x41}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xffffffffffff0856}}, {@default_permissions='default_permissions'}], [{@dont_hash='dont_hash'}, {@obj_user={'obj_user', 0x3d, '\\,'}}]}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) [ 2389.037865][T17019] gfs2: can't find protocol [ 2389.037865][T17019] ock_nolock 04:06:33 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x18, &(0x7f0000000080), &(0x7f00000000c0)=0x4) lseek(r0, 0x0, 0x0) connect$llc(r0, &(0x7f0000000040)={0x1a, 0xffff, 0x2, 0xfffffffffffffff8, 0x0, 0x100000000, @broadcast}, 0x10) 04:06:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:33 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x800, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="663da5baa5f5dc242333276a98ef198a41c410f023edf12ef2304fa83b9fc035d19dae8d843782443cc98bd29928c6529d405f4ea5c079d83fe7810abda5a7f2e40b32326563bb9088335ae3476f4a9ded946676637658", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) [ 2389.117255][T17019] gfs2: can't find protocol [ 2389.117255][T17019] ock_nolock 04:06:33 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:33 executing program 2: open(&(0x7f0000000000)='\x00', 0x400000, 0x1c) r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:33 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:34 executing program 1: r0 = socket$inet(0x2, 0x807, 0x9) flistxattr(r0, &(0x7f0000000040)=""/110, 0x6e) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) write$eventfd(r1, &(0x7f00000000c0)=0x3f, 0x8) lseek(r1, 0x0, 0x0) 04:06:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:34 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0xc28, 0x20001) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000040)={0xb0, 0x1}) 04:06:34 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) [ 2389.322343][T17241] gfs2: can't find protocol [ 2389.322343][T17241] ock_nolock 04:06:34 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xfffffffffffffffc, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=@nat={'nat\x00', 0x1b, 0x5, 0x430, 0xf0, 0x0, 0x0, 0x290, 0x1c0, 0x398, 0x398, 0x398, 0x398, 0x398, 0x5, &(0x7f0000000180), {[{{@uncond, 0x0, 0xb8, 0xf0, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x1, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @icmp_id=0x65, @gre_key=0x7fff}}}}, {{@ip={@rand_addr=0xd8, @remote, 0xffffffff, 0xffffffff, 'veth0_to_hsr\x00', 'nr0\x00', {0xff}, {}, 0x7f, 0x3, 0x40}, 0x0, 0x98, 0xd0}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x5, @loopback, @rand_addr=0xfff, @gre_key=0x8001, @icmp_id=0x65}}}}, {{@uncond, 0x0, 0x98, 0xd0}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x4, @dev={0xac, 0x14, 0x14, 0x23}, @multicast2, @icmp_id=0x65, @port=0x4e21}}}}, {{@ip={@multicast1, @rand_addr=0x3, 0xac0d8c1b1bef307f, 0xffffff00, 'teql0\x00', 'ip6tnl0\x00', {0xff}, {0xff}, 0xa, 0x52c68c6e9e9ebafc, 0xc}, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@unspec=@statistic={0x38, 'statistic\x00', 0x0, {0x1, 0x0, 0xe444, 0x239b, 0x9, 0x20}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x19, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @icmp_id=0x65, @port=0x4e21}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x490) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000800)={"2e3b70e47f3d1675881b82c0ac8365c35ec43ca88a3edc221d2548d912be40ced550023050133753e904eeac025b8a67155559a2fdb9d3b567e80c89c09ab2a403fc0fd075d86128c3a4f88af28a574716701dca904b469f565025d1861fc49379896fe1d3637ea09a71e11744e1c7253ccfeaf814af0ccb3cd0720e5b5f43a0c30d648e5587cfce95145b53ed732b4f7f6785e737463a976e48fe925435f440076d6be0bbf72667823feac541e165f161286e20dfd36f7b44a5c2fda4d4ea9a4a35ff0b6ba668aeab172af35ffe1a2c549b9b3abc84a96610c096e648692b8805a66593ec28831050ed8f1bff22636aa33f3114b17ffe19385d88d64edcdeebb841d3e2235a9dd8cef677157c241b9d8976e76e32f358f5923c62b043b916dcf998d60dea30ce1e3a055aaeeb4b54808f870bf052112b736f7956ed81ff96b012d4537814c5d5feb16be9b48047b6f78cbddd2927a5db3469de4b3e074e1b2c6fce243b98f0028d6053e33890488eb7dc54c633ad7535f7e7865433bcfdf550cd16e71ef29d5cb9c11062b7c356cb0c5ed48807b84300b09b9699661f7d091575ecc6574aa8a2389b77a76412c8bb6944af9318a6b1cc3c9626bd7d3df595559fb55d26c158f6ee83e213f5d0211178f4f450504e76136e0909debd08b897628293b23cbbacfc16637fe1a46ff0817f69a49c4cc930bdd2cb23fe22d8b4e3cba4f18256f6a88c2297fa38d1ed4ffe4d99256c1afd2d453c2b826ff525ebd30e46df2839e633a05dfaf05171f8845072a39ff1981b970a63074f543737e5e925567a9698694fbed3ba3563aa0b1de1224eb038a455c0228c2b356827ea5afde432fda25c663e1b6350eb9ef8c16c1279f0ab77af7a75131fb2a82df6f6d0176308df841746e4c81ffcd533568e47650aa626b9e4d8c553c3a2cd99225176fbcf086ea4fde0196bc35493208bf176c41f8692b757a29047f888c1482e84d75c35f2b490667c255267ad773e015e051ad12589ae72d6cd2333bff6f16f5513c1d5855982a6d81e45a882645ccc31340717c9077be983f6446b5e611136da643088edd4845844ef983f11b6e83f043da544f4121161296624d1c759f7dda6d8ea48839930d7c066dbf0545675cef33f1728aae21ae5bd8f9ab11e91d69adb230c56180833ddc19fa75a51966a535a9a4f8d65888e48186868f730420bb286ea09996421935cfff399f083a24ae44c06f7875b1a6bd44fbf33ada0b29ce1b1d7490b12c7b961df48944d250c5619414b51a7eb14cfd7297157389852c3b45625f777dffa9ecea9adc3042f8b82196a076d878de597cca3bb4ed5a1a0d128da0ca234eeabce5047a51da84c6cfad976128f3989b9e73edcb21c39ed02abfaff5455e7e80ca8a00f3287e44321adb5c5211f1fa90d603bead9cfe03f1cca7b493a4a7d"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) fstat(r1, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000c00)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x2, &(0x7f0000000e40)=ANY=[@ANYBLOB="82642d737d4fb842083e66f37fe7de85f1a48a00f16914f9028538a3bed03c9189442fc573f3976fd020153e6683535208f01d2e9ef22494650249edab0360d4f9eaac9b9c79448efe2b70a72281ad3926e745116dfbfccfd237484528189ff48ecc3aee3a97b36d7368ec9f852f42fe0abe1e", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',fsmagic=0x0000000100000000,fsmagic=0x0000000000000001,defcontext=user_u,seclabel,appraise_type=imasig,obj_role=fd,\x00']) mkdir(&(0x7f0000000040)='./file0\x00', 0x1) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) [ 2389.413206][T17241] gfs2: can't find protocol [ 2389.413206][T17241] ock_nolock 04:06:34 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x2000000) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:34 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:34 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x1000000000000000) 04:06:34 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_Id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:34 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:34 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x40001f, 0x200000000000) 04:06:34 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:34 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") unshare(0x24020400) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2389.646792][T17416] gfs2: can't find protocol [ 2389.646792][T17416] ock_nolock 04:06:34 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) mmap$binder(&(0x7f0000fef000/0xe000)=nil, 0xe000, 0x1000004, 0x30, r0, 0x0) lseek(r0, 0xfffffffffffbffff, 0x0) mount$9p_fd(0x0, &(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)='9p\x00', 0x800000, &(0x7f0000001100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_none='cache=none'}, {@msize={'msize', 0x3d, 0x5}}, {@cachetag={'cachetag', 0x3d, '/dev/vcsa#\x00'}}, {@cache_fscache='cache=fscache'}, {@aname={'aname', 0x3d, '/dev/vcsa#\x00'}}, {@cache_fscache='cache=fscache'}], [{@subj_user={'subj_user'}}, {@pcr={'pcr', 0x3d, 0x3}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@appraise_type='appraise_type=imasig'}, {@measure='measure'}]}}) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000001200)=0x8) 04:06:34 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x371, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000040)={0x0, 0xffff, 0x80000001, 0x0, 0x43, 0xfffffffffffffffe, 0x7}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) getpeername(r0, &(0x7f00000004c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000540)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000007c0)={0x0, @empty, @broadcast}, &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000a40)={0x0, @initdev, @local}, &(0x7f0000000a80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000ac0)={{{@in=@remote, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000bc0)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000c40)={@multicast2, @local, 0x0}, &(0x7f0000000c80)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000000cc0)={@multicast1, @local, 0x0}, &(0x7f0000000d00)=0xc) accept$packet(r0, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d80)=0x14) getsockname$packet(r0, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e00)=0x14) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000012c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001280)={&(0x7f0000000e40)={0x414, r1, 0x0, 0x70bd29, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0x1b8, 0x2, [{0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x2, 0xd9, 0x6, 0x8}, {0x8, 0x0, 0x7, 0x9}, {0x7, 0x8, 0x1ff, 0x7}, {0x5, 0x100, 0x0, 0x3}, {0x138c5962, 0x7fffffff, 0x1000, 0x1}, {0x1, 0x3ff, 0x80, 0x4}, {0x9, 0x7fff, 0xfffffffffffffff8, 0x9}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r3}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x6, 0x7, 0x8}, {0x7, 0x9, 0x0, 0x2}]}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x4}}, {{0x8, 0x1, r6}, {0x1e8, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x10001}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}]}}, {{0x8, 0x1, r13}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x414}, 0x1, 0x0, 0x0, 0x48000}, 0x44) 04:06:34 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="b7a12b3449fc5ccbbf29c8e66a515c78d9a6a4d0912b4f6bb7cfa9c410a1", 0x1e, 0xffffffffffffffff) keyctl$reject(0x13, r1, 0x5, 0x7, r2) acct(&(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB="670600", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) [ 2389.750802][T17416] gfs2: can't find protocol [ 2389.750802][T17416] ock_nolock 04:06:34 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:34 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:34 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080)=0x1800000000, 0x4) accept4$alg(r0, 0x0, 0x0, 0x80800) 04:06:34 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:34 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7ff, 0x2000) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x1f}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e21, 0x8, @rand_addr="a410a2f1806edd3f9a5330b9678bad07", 0x8}}, 0x0, 0xffffffff}, 0x90) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r2, 0x0, 0x0) 04:06:34 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) [ 2389.945917][T17647] gfs2: can't find protocol [ 2389.945917][T17647] ock_nolock 04:06:34 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x7, &(0x7f0000000000), 0x262) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="d2b325bd7000fcdbdf250b00000030000300080003000400000008000400ffff000014000600fee62c000000000000000000000000bb080007004e2428000100080009007800000008000b007369700008000800040000000c00070004000000020000000c000200"/114], 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x80) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') sendfile(r2, r5, 0x0, 0x88002) ppoll(&(0x7f0000000400)=[{r2}], 0x1, 0x0, 0x0, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000080)="8d", 0x1}], 0x1) r6 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x7, 0x101080) write$USERIO_CMD_SET_PORT_TYPE(r6, &(0x7f0000000200)={0x1, 0xbb}, 0x2) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x200, 0x70bd25, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:34 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000340)='/dev/dmmidi#\x00', 0x9, 0x80000) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f00000003c0)={0x0, 0xff, 0x9, &(0x7f0000000380)=0x3f}) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x400) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f00000000c0)=0xfffffffffffffbff) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000002c0)={0xc89975a6dc5720f5, 0x0, &(0x7f0000000180)=""/90, &(0x7f0000000200)=""/73, &(0x7f0000000280)=""/21, 0xd000}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:34 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) [ 2390.061002][T17647] gfs2: can't find protocol [ 2390.061002][T17647] ock_nolock 04:06:34 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x40000, 0x0) fchdir(r0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040)=0xffffffff, 0x4) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz1', "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"}, 0x1004) r2 = semget(0x2, 0x3, 0x80) openat$cuse(0xffffffffffffff9c, &(0x7f0000001280)='/dev/cuse\x00', 0x2, 0x0) semctl$GETZCNT(r2, 0x3, 0xf, &(0x7f0000001100)=""/6) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r3, 0x20000000000000, 0xfffffffffffffffc) r4 = gettid() getresuid(&(0x7f0000001140)=0x0, &(0x7f0000001180), &(0x7f00000011c0)) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000001440)=0x4, 0x4) getgroups(0x1, &(0x7f0000001200)=[0xee00]) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000001340)={0x16, 0x98, 0xfa00, {&(0x7f0000001300)={0xffffffffffffffff}, 0x4, 0xffffffffffffffff, 0x3c, 0x1, @in6={0xa, 0x4e24, 0x9a0000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000001400)={0x11, 0x10, 0xfa00, {&(0x7f00000012c0), r7}}, 0x18) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001240)={r4, r5, r6}, 0xc) 04:06:34 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) 04:06:34 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:34 executing program 1: r0 = socket(0x5, 0x7, 0x0) ioctl$void(r0, 0x5450) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r1, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0x80000000, 0x0, 0x10001, 0x7}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000080)={0x34, r2, 0x10000, 0x7fff}) 04:06:34 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:35 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) [ 2390.287889][T17809] gfs2: can't find protocol [ 2390.287889][T17809] ock_nolock 04:06:35 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x400000, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) ioctl$BLKPG(r2, 0x1269, &(0x7f00000000c0)={0x4, 0x1a0, 0xbc, &(0x7f0000000180)="759ee827bcbe91847cff736bef47baf10492be3d6bbf525d224a69def8975b99c7399159a8eadda793a43cfa3661ade8e6f9a07ade6a6bd3d5b05f39dc3ef6ad709b2e296725b534f6ae0699487d0d2519aefca32b3ec4458782c89442497cde0b2fa774816a239b04ab5c8c9555781007c31c6d9566dc519fd0e6813754c4774ad34228c298364c5a10c6fadf37e498fb659c6c74bc7313d04880fc0ba6fb00fdd7c8fab5070b256735a678301d1039ab17ac17d524515d8cc45712"}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:35 executing program 3: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) [ 2390.338146][T17809] gfs2: can't find protocol [ 2390.338146][T17809] ock_nolock 04:06:35 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) [ 2390.490762][T17971] gfs2: can't find protocol [ 2390.490762][T17971] ock_nolock [ 2390.584176][T17971] gfs2: can't find protocol [ 2390.584176][T17971] ock_nolock 04:06:35 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/27, 0x1b}], 0x2b6, 0x0) 04:06:35 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) 04:06:35 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@empty, 0x5, 0x0, 0xff, 0x4, 0x1, 0x1ff}, &(0x7f0000000080)=0x20) 04:06:35 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = fcntl$getown(r0, 0x9) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000040)=r2) 04:06:35 executing program 3: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:35 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) [ 2391.002027][T18080] gfs2: can't find protocol [ 2391.002027][T18080] ock_nolock 04:06:35 executing program 3: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:35 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) 04:06:35 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x10000) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) [ 2391.092367][T18080] gfs2: can't find protocol [ 2391.092367][T18080] ock_nolock 04:06:35 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$TIOCGPTPEER(r0, 0x5441, 0xb80) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d2c8fd0df6872b009f17f907ca34dffe218ed2fb029f44c1f89a955cb0d430d82db6b0ab177f1884db3cba39bbb6dc1243df54563213591d0ada258e35a220ce1e58c4b6668a2a8e8a77e055795a1fe676817a1bd68a16a16f338cead4f24246d1a43ec7f5d521c6f4d2821afd627d18a6c44d2e4868cad3ad224ae64493e2968ee87a587368be134457d45f7b5f7b036395174757a4b87d1b7226d84efd950bb3990e81c1bcfc356dbcd1b61e30253b1e6b25733406f6391713859e6f7a3fc73", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x3}}, 0x18) 04:06:35 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x410400, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000080)={0xfffffffffffff000, 0x81, @name="90afcd8a3abe01e5ae1d749b3a10314204b862489ed7dfd8be037adae9cf471d"}) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r1, 0x0, 0x0) 04:06:35 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\xff', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:35 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) 04:06:35 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x0, 0x410c80) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x1, 0x100000000) preadv(r1, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:36 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:36 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) 04:06:36 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:36 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40, 0x0) write$P9_RWRITE(r1, &(0x7f0000000040)={0xb, 0x77, 0x2, 0x6}, 0xb) 04:06:36 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0x2000}) lseek(r0, 0x0, 0x0) 04:06:36 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x8000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000340)="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", 0x1000, 0x5}], 0x480, &(0x7f0000001440)={[{@quota='quota'}, {@errors_remount='errors=remount-ro'}, {@iocharset={'iocharset', 0x3d, 'cp860'}}, {@resize_size={'resize'}}, {@resize_size={'resize', 0x3d, 0x701}}, {@usrquota='usrquota'}], [{@dont_appraise='dont_appraise'}, {@uid_eq={'uid', 0x3d, r1}}, {@context={'context', 0x3d, 'user_u'}}]}) r2 = getpgid(0xffffffffffffffff) waitid(0x1, r2, &(0x7f0000001340), 0x80000000, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:36 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) 04:06:36 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40000, 0x8) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x1, 0x4) ioctl$RTC_AIE_OFF(r0, 0x7002) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001640), 0x0, 0x0) 04:06:36 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:36 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000080)={0x0, 0xffff, 0xff, &(0x7f0000000040)=0x3f}) lseek(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x0) 04:06:36 executing program 5: syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x80000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) [ 2391.610667][T18632] gfs2: can't find protocol [ 2391.610667][T18632] ock_nolock 04:06:36 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x990000, 0x7, 0xbb2, [], &(0x7f0000000040)={0x9d0907, 0x9, [], @ptr=0x400}}) 04:06:36 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:36 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) [ 2391.699869][T18632] gfs2: can't find protocol [ 2391.699869][T18632] ock_nolock 04:06:36 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:36 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x10000, 0x1) ioctl$TCXONC(r0, 0x540a, 0x6) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x21, 0x0) lseek(r1, 0x0, 0x0) mq_timedsend(r1, &(0x7f00000000c0)="9afccd058dd8c4942319a3a52273d8fd05bd4aa0e49b6adf6ae322da99db12350bd547597c08ee9043611f1146e4c33ebaab88b85de8a3ce6dd91f", 0x3b, 0x4f, &(0x7f0000000100)) fstat(r0, &(0x7f0000000200)) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f00000001c0)=0xc1e9, &(0x7f0000000180)=0xffffffffffffff8b) 04:06:36 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000000)={0x8, 0x3}) 04:06:36 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:36 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f00000000c0)={'bond_slave_0\x00'}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000340)={0x0, 0x1, 0x4, [0x200000000000, 0xff, 0x9, 0x9]}, &(0x7f0000000380)=0x10) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f00000004c0)={0x7, 0x9, 0xffffffff7fffffff, 0x0, 0x200, 0x9}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000500)={@reserved}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000440)={r2, 0x4c, &(0x7f00000003c0)=[@in6={0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, [], 0x1f}, 0x7}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e24, @broadcast}]}, &(0x7f0000000480)=0x10) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) 04:06:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2391.904413][T18850] gfs2: can't find protocol [ 2391.904413][T18850] ock_nolock 04:06:36 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x54a3effb, 0x2) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="ddd37f2d306e60c2e8faa76250d1766a37d2f663bfcdfe27d66f801fa5e057926b345a4340852fb0166c5300b0f43261697341cb939043917730c68a7ba1ebc486a0cbbdeb72e949441bf324799b80e2250d95743f082fddee776b1dc6a18aa85dac584fa2f356e63d812da0d36a9ee093e93482302b", @ANYRES16=r1, @ANYBLOB="20002bbd7000fcdbdf2509000000"], 0x14}, 0x1, 0x0, 0x0, 0x48800}, 0x80) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r2, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000340)={0xa, [0x9, 0x7ff, 0x5, 0x1, 0x5, 0x7, 0x7, 0x6, 0x1, 0x3]}) 04:06:36 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x200000, 0x0) write$FUSE_OPEN(r0, &(0x7f00000000c0)={0x20, 0xffffffffffffffda, 0x3, {0x0, 0x1}}, 0x20) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) [ 2392.009151][T18850] gfs2: can't find protocol [ 2392.009151][T18850] ock_nolock 04:06:36 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:36 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000040)) lseek(r0, 0x0, 0x0) 04:06:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:36 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:36 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:37 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:37 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) lseek(r0, 0xffffffffffffffff, 0x3) 04:06:37 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1ff, 0xa2001) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000340)) shmget$private(0x0, 0x3000, 0x78001100, &(0x7f0000ffa000/0x3000)=nil) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000180)={@multicast2, @remote}, &(0x7f00000001c0)=0x8) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000080)={0x14, 0x11, 0x2, {0x84, 0x2, 0x7}}, 0x14) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) [ 2392.233234][T19050] gfs2: can't find protocol [ 2392.233234][T19050] ock_nolock 04:06:37 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x40000, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) [ 2392.326701][T19050] gfs2: can't find protocol [ 2392.326701][T19050] ock_nolock 04:06:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:37 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:37 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:37 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{}]}) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:37 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000000c0)={0x4, 0x5}) 04:06:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2392.515329][T19388] gfs2: can't find protocol [ 2392.515329][T19388] ock_nolock 04:06:37 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:37 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x23, 0x3, 0x77, "0ea0cd5f058cca5b28862d1052afad84", "21d27523c8d3b9f4553b6fdaea15"}, 0x23, 0x1) 04:06:37 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000040)={{0x3, 0x3, 0x0, 0x1, 0x7}, 0xc535, 0x8}) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x434, 0x80400) [ 2392.629130][T19388] gfs2: can't find protocol [ 2392.629130][T19388] ock_nolock 04:06:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:37 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:37 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:37 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x400, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000100)=""/121) ioctl$TIOCNOTTY(r0, 0x5422) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) 04:06:37 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2867726f75705f69643d0321e15761daa9b88000000000000000fc155c1027305dfc61027c08646f6e4eeb0f2cee9045e38490cc99acad842a67e48d7e5b23fa04af2d69476eea9f68f5ead054b7271eaec4815abf54fd2fad7aa76c2b4d395a9892320a81932797b893123ac450fcbaae6e91bebd81598180b3f9f30e0e5833613cb2ee", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2392.864122][T19560] gfs2: can't find protocol [ 2392.864122][T19560] ock_nolock 04:06:37 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:37 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) accept(r0, 0x0, &(0x7f0000000100)) ioctl$RTC_PIE_ON(r0, 0x7005) lseek(r0, 0x0, 0x4) getpeername$unix(r0, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) getsockopt$inet6_tcp_int(r0, 0x6, 0xe, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$P9_RRENAMEAT(r0, &(0x7f00000000c0)={0x7, 0x4b, 0x1}, 0x7) 04:06:37 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) [ 2392.949054][T19560] gfs2: can't find protocol [ 2392.949054][T19560] ock_nolock 04:06:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:37 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:37 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',`']) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x8003, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) openat$userio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/userio\x00', 0x0, 0x0) 04:06:37 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:37 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000000)={0x1, "9349fe888393356d941c55649993296d50fb4a70f313a2610153574501527908", 0x3, 0x1}) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:37 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e20, @empty}, 0x40, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)='eql\x00', 0xc76, 0x1ff}) syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) [ 2393.174751][T19781] gfs2: can't find protocol [ 2393.174751][T19781] ock_nolock 04:06:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:38 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040), 0x1, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0905664, &(0x7f0000000080)={0x0, 0x7fff}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="950000000910ab0ad61bc7dca91f495a65bac261e79c7611634394569a41ffc161aed41c34b9e796a6c763ad7d9242a477b8af0915df5f7ab07835f1f80c025c682f522de21c01f270354097590559f1aa1d80c9327bcc4ceb1e1c9d5c85715c4737f34614b9b33a3d298ebf29feb3396a81ef87f17dec79dfb000afde3d2cc92ab1142bba91103d272bed5b396e3b59faa7939c2a00fc21b8"], &(0x7f00000000c0)=0x9d) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e24, 0x5bf2, @local, 0x7}}}, &(0x7f0000000200)=0x84) 04:06:38 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) [ 2393.265243][T19781] gfs2: can't find protocol [ 2393.265243][T19781] ock_nolock 04:06:38 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000180)={0x8, [0x3, 0x3, 0x0, 0x7, 0x23, 0x1, 0x7, 0x346, 0x2, 0x14c5, 0x80000001, 0x1, 0x4d, 0x3bc5, 0x4, 0x2, 0x3f, 0x8, 0x1, 0xffffffffffff0154, 0x0, 0xad5, 0x8, 0x0, 0x4, 0x800000010, 0x5, 0x4, 0x10001, 0x2, 0x4, 0x0, 0x7c, 0x3, 0x400, 0x29e9, 0x4, 0x80, 0x100000001, 0x800, 0x2, 0x10000, 0x7, 0xaa, 0x0, 0x1, 0x5, 0x16], 0x7}) 04:06:38 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:38 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640), 0x1, 0x0) 04:06:38 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:38 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x401, 0x800) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000180)={0x2, &(0x7f00000000c0)=[{0x7, 0x1, 0x3b0, 0x8}, {0x6, 0x1, 0x5, 0x8}]}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',r00000000000000040000,user_id=\x00'/42, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) 04:06:38 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x4, 0x7) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000000c0)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) [ 2393.499606][T20060] gfs2: can't find protocol [ 2393.499606][T20060] ock_nolock 04:06:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:38 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x20000) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f00000000c0)) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000100)=0x10000000008, 0x4) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000040)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}) preadv(r1, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) [ 2393.548033][T20060] gfs2: can't find protocol [ 2393.548033][T20060] ock_nolock 04:06:38 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:38 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:38 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) r1 = mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xef9979332a4c3bfa, 0x180010, r0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000180)={0x35, 0x7fff, 0x6, 0xc, 0xffff, 0x81}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000000)=[@enter_looper, @increfs_done={0x40106308, r1, 0x4}, @request_death={0x400c630e, 0x1, 0x2}, @dead_binder_done={0x40086310, 0x2}], 0x1000, 0x0, &(0x7f0000000340)="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"}) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1000000000000111, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f0000000080)) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000040)) timerfd_settime(r0, 0x1, &(0x7f0000000100)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) 04:06:38 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) syz_init_net_socket$ax25(0x3, 0x3, 0xce) 04:06:38 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x20000) lseek(r0, 0x0, 0x3) 04:06:38 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) [ 2393.765136][T20281] gfs2: can't find protocol [ 2393.765136][T20281] ock_nolock 04:06:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2393.858268][T20281] gfs2: can't find protocol [ 2393.858268][T20281] ock_nolock 04:06:38 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) write$P9_RWALK(r0, &(0x7f0000000000)={0x7e, 0x6f, 0x1, {0x9, [{0x0, 0x0, 0x7}, {0x0, 0x2, 0x1}, {0x40, 0x4, 0x7}, {0x40, 0x3}, {0x41, 0x0, 0x6}, {0x80, 0x1, 0x8}, {0x40, 0x4, 0x2}, {0x4, 0x1, 0x3}, {0x9c}]}}, 0x7e) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:38 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x40120, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000000)) lseek(r0, 0x0, 0x2) 04:06:38 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:38 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000002, 0x110, r0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0xa, 0x1, 0x0, {0x4}}, 0x18) 04:06:38 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2394.041232][T20403] gfs2: can't find protocol [ 2394.041232][T20403] ock_nolock 04:06:38 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:38 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0xc0, 0x0) 04:06:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2394.158731][T20403] gfs2: can't find protocol [ 2394.158731][T20403] ock_nolock 04:06:38 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3c8b, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:38 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e23, @local}}, 0x3ff, 0x4, 0x53e4, 0x4, 0x13}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000240)={r2, 0x4000000080, 0x202000000, 0x62f8}, 0xfffffffffffffee1) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:39 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:39 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x10000, 0x0) sendto$rose(r0, &(0x7f0000000080)="a508492bec6e871ea25f935acf2e7dfb5fc9b0d0f061ba457bb8905f937c7aacb05670f60ff23eeeaa287f7f97777a3740f8060adff6691d66f0a9327ac19dbb0d3d23a13455a2872d26d64012858309c235bd4ef0315bb9918cd724c2b41f708f69c486a06ececf0d5a0fb4e3411862b068b65f5e8d219863c3980f9bc0605513ac16d6b839a7796e3c73923f3a692b0067c598a3ab5de1611ffbb94304db48604ec238d15823eaf9af952b08ebec88523abadc9b516cd4cfb077198b00b680d18971366dfca8513c8445e2749d251568f5a430f4cbb8ca3c78b808d0a9b430115e30fdf9c456f9ffd09706fe18baa4c9f058", 0xf3, 0x20040001, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1, @default}, 0x1c) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r1, 0x0, 0x0) 04:06:39 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:39 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8002, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{}, {r1, r2+30000000}}, &(0x7f00000000c0)) r3 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000100)={r3}) preadv(r3, &(0x7f00000002c0), 0x1, 0x0) 04:06:39 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c677290c0fcf4041fd4ee6f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:39 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x20}, [@ldst={0x3, 0x3, 0x7, 0xa, 0xe, 0xfffffffffffffffe, 0xfffffffffffffff0}]}, &(0x7f0000000040)='syzkaller\x00', 0xe42, 0x1f, &(0x7f0000000080)=""/31, 0x0, 0x1, [], 0x0, 0xb, 0xffffffffffffff9c, 0x8, &(0x7f0000000100)={0xfffffffffffffffa, 0x6}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x4, 0x1, 0x9}, 0x10}, 0x70) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x109100, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x9, 0x165, 0x1, 0x7, 0x7fff}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000400)={r2, @in6={{0xa, 0x4e24, 0x401, @loopback, 0xd39}}, 0x1ff, 0x80, 0x1, 0x0, 0x1}, 0x98) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000200)=0xffff) r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0xa1, 0x0) preadv(r3, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) [ 2394.454250][T20667] gfs2: can't find protocol [ 2394.454250][T20667] ock_nolock 04:06:39 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:39 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x1, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x240000, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0xf31f, 0x40000006, 0x6, 0x138}, {0x10000, 0x1, 0x800, 0x8006}]}, 0x10) 04:06:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2394.558424][T20667] gfs2: can't find protocol [ 2394.558424][T20667] ock_nolock 04:06:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:39 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) 04:06:39 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000340)={"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"}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x11, 0x4) 04:06:39 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x40) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, 0x8}, 0x10) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) 04:06:39 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) write$ppp(r0, &(0x7f0000000040)="bd372f37dae1aad5a6fbec153dd08ce3392abfe94fc481cfbd05b067f8871b5fe6815a8f04040074cabb2b905fae2dbe97af71421adc537beb5d4af21ff69cd5192f6ab9b863d79cb80793d261431c71f3333ebebe9365ade7ffc6d42ab68709493f8237", 0x64) 04:06:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(0x0, 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:39 executing program 2: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10000, 0x0) r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) r1 = gettid() tkill(r1, 0x2e) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) [ 2394.834229][T20993] gfs2: can't find protocol [ 2394.834229][T20993] ock_nolock 04:06:39 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) 04:06:39 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x20200) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f00000000c0)=0x4) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:39 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xffffffffffffff1f) lseek(r0, 0x0, 0x0) 04:06:39 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)=""/124, 0x7c}], 0x10000000000001a1, 0x0) 04:06:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(0x0, 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2394.996977][T20993] gfs2: can't find protocol [ 2394.996977][T20993] ock_nolock 04:06:39 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x40000, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x800, 0x70bd2a, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) preadv(r1, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000240)={0x8, 0x8009, 0xffff, 0x1, 0x0}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000002c0)={r3, 0x80000001}, 0x8) 04:06:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(0x0, 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:39 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xd, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:39 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) 04:06:39 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x1) 04:06:39 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x400, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000100)={@my=0x0}) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001640)=[{&(0x7f0000000000)=""/27, 0x1b}], 0x7f, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40600, 0x0) 04:06:40 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @broadcast, @loopback}, &(0x7f0000000080)=0xc) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) lseek(r0, 0x0, 0x0) 04:06:40 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x408280, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f00000000c0)=0xe8) connect$packet(r0, &(0x7f0000000280)={0x11, 0x19, r1, 0x1, 0x6, 0x6, @random="55b73159a04a"}, 0xfffffffffffffd59) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18}, 0x18) 04:06:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x0, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2395.250364][T21388] gfs2: can't find protocol [ 2395.250364][T21388] ock_nolock 04:06:40 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:40 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000000c0)={0x0, @aes256, 0x2, "8c3852df7bf3a401"}) sendmsg$nl_route(r0, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="001f685671283ffa738ee7ded16ec6349c27b17275a24dcd8f4b4b2e2df55c668bc3076dec51d2c449030fa98a8dff7f000000000000b31f082e3993561e4bd3c3136c84ae10238d1eaf5a243c90247937b87c801e8cce0cbcbb11d5f59fb3ad6e1f5929ea49d81400743a957651a03d0902443f78bcd2ac50b5e8fbbc561685137087a0d293bd74947f4f04e79ab3cce646e63f000000000000000000000000010000", @ANYRES32=r1, @ANYBLOB="0800080044010000080008000000000014000600050000000900000000010000800000000800080088040000140001007860d1648ade91bb416584191c2b1d8714000600a204000003000000b927000000000100"], 0x6c}, 0x1, 0x0, 0x0, 0x4000010}, 0x8000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000200)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f00000002c0)={r0, r0, 0xff}) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="0400"/15, @ANYRES16=r2, @ANYBLOB="01002dbd7000fddbdf2501000000000000000c410000000c001473797a3100000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000000)=0x84) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) [ 2395.336005][T21388] gfs2: can't find protocol [ 2395.336005][T21388] ock_nolock 04:06:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x0, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:40 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:40 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xe, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:40 executing program 2: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r0, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffffffffffff}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xbc4e}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:40 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffff7ee, 0x10000}) 04:06:40 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x0, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2395.563518][T21510] gfs2: can't find protocol [ 2395.563518][T21510] ock_nolock 04:06:40 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) syncfs(r0) [ 2395.625435][T21510] gfs2: can't find protocol [ 2395.625435][T21510] ock_nolock 04:06:40 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000040)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) 04:06:40 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:40 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xf, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:40 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0x8001, 0x4) 04:06:40 executing program 1: lseek(0xffffffffffffffff, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x200201, 0x0) 04:06:40 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2395.880935][T21788] gfs2: can't find protocol [ 2395.880935][T21788] ock_nolock 04:06:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:40 executing program 2: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f00000000c0)=0x1) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x100, 0x0) 04:06:40 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x20, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) lseek(r0, 0xffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x0, 0x6, 0xf0, 0x6}, {0x7, 0x0, 0x7, 0x8b0c}]}) 04:06:40 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x40) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) chroot(&(0x7f00000000c0)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000180)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:40 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2396.038152][T21788] gfs2: can't find protocol [ 2396.038152][T21788] ock_nolock 04:06:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:40 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000100)=0x100) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0xffffffffffffff00}], 0x100000000000013f, 0x0) write$P9_RLINK(r0, &(0x7f0000000140)={0x7, 0x47, 0x1}, 0x7) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f0000000000)="cb404d582fdffeaf124aa41b11ebac6b4013f8cf5d8a823a5a34b859f3d507b3e299c1b475d9f72aab1427ce5f522faea927d985ca3e3076513599f01e85861db51e46f28e4e9d7fa8e6e1158d058fd6302d13192160deb5b8b6d2a72c65215a63f6abab1872dd7964470ed2cc286d1c26706fbf4df0cdc56e291f68894b2883b50818360d8903061bd6bab7ee185b79cb7508e67775682f70f041cbd680fa0d95b4435c18916d40b694fceebf8a4f7e0695e47829949076f88c4d9bf888a94b3c6cdaa5f630a3f0426e3ecbd355102e16d6516b671719c21b768efd8f8c2700a4"}, 0x100b2) 04:06:40 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(r1, r2) 04:06:40 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x100, 0x0) 04:06:41 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:41 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8, 0xfffffffffffffffd) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:41 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x5, 0x8, 0x1ff, 0x1ff, 0x4, 0x7f, 0x8001, {0x0, @in6={{0xa, 0x4e21, 0x4b4d, @rand_addr="ba423fe4287f83dd399c82f886e4e8fc", 0x5}}, 0x200, 0x7, 0x2c271f6a, 0x81, 0x9}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r1, 0x4}, &(0x7f0000000280)=0x8) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000340)=""/171, &(0x7f00000002c0)=0xab) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18}, 0x18) [ 2396.297695][T22068] gfs2: can't find protocol [ 2396.297695][T22068] ock_nolock 04:06:41 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) getsockname$netlink(r0, &(0x7f0000000280), &(0x7f00000006c0)=0xc) sendmmsg$alg(r0, &(0x7f0000000600)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="ffc27ef5e7cae6cfccc28661408879bd8678fda45914f79eb46481ee08d8e8534f0a5dc9eaf2804df69b4a84c3fc958d8c2c1830bd70c46a50a290d7c047119e4a110dea616d085f5153b6459f410059a1287d40a09bd8610dd706aaef1878451941b71bd6af7ae5596a1ae02cd94d0f4f413a1c2763a7d50d4cc11700680653f78bb7c892241039e5caca823a545a470f41a2590a41facf26b691f32b808f54bf14c44db438062bfcfa93edb6667bca2cce29df9b9fecd11b3a", 0xba}, {0x0}, {&(0x7f0000000100)="bce20042fa7141fd9937", 0xa}], 0x3, &(0x7f0000000180)=[@assoc={0x18, 0x117, 0x4, 0x3}], 0x18, 0x8004}, {0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="2176d2c4a54c37c8e819e725ee5fe635e41b1b97edf6b56d5015427af77c6cc5148ff29be77e6a83d5fdca3c83403b569fcac165a252ae34c010c31d62bb2a0d788036244fd6b5e2b75dbdeb9457bcf8544f4cf45a4783491c877d582e34f5611faf7a849ed7ccae5063ea90a0b782e46f97914c248614f0ece4a8e7902bd5f8ed5188f8c7e02df69180be7eb371c472e2ebf12cff5cffb70c750e3c208cae394bbdf029016f", 0xa6}, {&(0x7f0000000280)}], 0x2, &(0x7f0000000300)=[@assoc={0x18, 0x117, 0x4, 0x4}], 0x18, 0x804}, {0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000340)="ac73971f1584fbe3c80345c075daf7453ba8eaa55db0f87f37b87aaf3b186879bbbae7a567ff7f58ca2d13933d18dd4968c9981902cb9e1de7f7dc14b42cb4b71168646a0958747ccfff5435b4", 0x4d}, {&(0x7f00000003c0)="b6afb86133489798196ff9b4a172e19184dd0129825750fc7351f706203fbfe810befdf7bf66ade33347d23c10a018213ecc61cf7c239ef8409fbbf8128944440221465de7b6f8c1c523e887f4e8317776d7dd269a435f59088008af4ac615af3cbf43e28ccb9f37116dc71cc4748c725f11cbc6edf7a77b4c4ce605", 0x7c}, {&(0x7f0000000440)="cb78b453b1373875cb457e40ded24fa5785d3318f3b37abad4457c09bac8a1fff55c32bbd632fd47527eb52d88a8ea72f1caf18ec5bed48ce243fd59d6c7507a1facfdc64e64b4c6fc3c6a2cc3001575cfa64880f0504cc970c551f931ca12c8e35f1524018694d9cd671a6e4eb0647b851e751659300234a571df8394dd4651c4f1f6322eec43accfc3df40f68ebf958a4bdd654a555ec827ecd983be0156abe8bd81d7941639becbc7a01f21e6bbdfacb92cf96d531b", 0xb7}, {&(0x7f0000000500)="1547143781e116bb759e7458bc7ac725d957265744f3bdbe50b8ec7f5e89bd66125ab16f0dcf5765d6be130bb55ff746ff3676ff5f0990a6b92b08f61cbe3a1e90d84af2c23fc9f69f4c2266b7b90c1d9efa1ac51b9bd42d33de6029b76f9a1a1b3422952f0c910db5ef104703c6af2e8d0052d6501e582390281cf6e277ccf15681dcd80cd40392827472345665d906ca1149c3abf962afd7d3be3cb63cbec3", 0xa0}], 0x4, 0x0, 0x0, 0x10}], 0x3, 0x40040) lseek(r0, 0x0, 0x0) userfaultfd(0x80000) 04:06:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(r1, r2) 04:06:41 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000040)={0x0, 0x3bb65e54, 0x3, &(0x7f0000000000)=0x7}) 04:06:41 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:41 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) [ 2396.448129][T22068] gfs2: can't find protocol [ 2396.448129][T22068] ock_nolock 04:06:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(r1, r2) 04:06:41 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x11, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:41 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:41 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6c, @default, @netrom={'nr', 0x0}, 0x6, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 04:06:41 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = gettid() ptrace$setsig(0x4203, r0, 0x3, &(0x7f0000000180)={0x39, 0x100, 0x9}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000540)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000000640)=0xe8) getresuid(&(0x7f0000000680), &(0x7f00000006c0)=0x0, &(0x7f0000000700)) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() r8 = getegid() setxattr$system_posix_acl(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000940)=ANY=[@ANYBLOB="02000000010001000000000002000100", @ANYRES32=r1, @ANYBLOB="02000600", @ANYRES32=r2, @ANYBLOB="02000000", @ANYRES32=r3, @ANYBLOB="0200a39f", @ANYRES32=r4, @ANYBLOB="02000100", @ANYRES32=r5, @ANYBLOB="02000700", @ANYRES32=r6, @ANYBLOB="040042fa329f60440c000500a112b9fd67667fb825412cce415bafb44de443746799bbc5df385926896f5c994620f421978c317b9a535a2217dff93b57f6459312e430b9d821de73f27ed8229325c885548a377b0c71e11db622b46bed0d4ada2a0798cc82efde117cbf33a2445a7f418dec7042cd1826d9693051676ed296c297c4aa892ab01c5b098d4df7c1657939c6f1b550202c40aadfa08b8c6edfee23abde2960dae93fa09c3bd5", @ANYRES32=r7, @ANYBLOB="08000200", @ANYRES32=r8, @ANYBLOB="10000100000000002000070000000000"], 0x64, 0x2) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c670600000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_NO_ENOBUFS(r10, 0x10e, 0x5, &(0x7f0000000800)=0x2, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) write$FUSE_NOTIFY_POLL(r9, &(0x7f0000000040)={0x22e}, 0x14) 04:06:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) dup2(r1, r2) 04:06:41 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x20, 0x0) r1 = epoll_create1(0x80000) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="1000000017020007002e2f66696c6530df6788bfd669d066a2a5273e94969188f9db345c39c40447755245fb39f2396faf7c29fc41eb39f37f1fe0a7cdcd3949c67a0f0b7ae7c0aa6c77b2ec3516f6a22c60c6fc23519f543467ff416a5bb2d3483e0656b5bf48194fa3b0eb6ea300f181f1cce8eb0ae37d96586fc94504aff9acd9960ca4095f9ef67391c617227935be03a2280ac7a78368eadc8a54a75ccf2f373c4a19ecff5b186772b5e895198939b9734650657f34145d48616adcd2b225ed"], 0x10) lseek(r0, 0x0, 0x0) signalfd(r1, &(0x7f0000000000)={0x9}, 0x8) [ 2396.671104][T22257] gfs2: can't find protocol [ 2396.671104][T22257] ock_nolock 04:06:41 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) process_vm_writev(r0, &(0x7f0000000400)=[{&(0x7f0000000040)=""/67, 0x43}, {&(0x7f00000000c0)=""/183, 0xb7}, {&(0x7f0000000180)=""/49, 0x31}, {&(0x7f0000000200)=""/20, 0x14}, {&(0x7f0000000240)=""/100, 0x64}, {&(0x7f0000000340)=""/182, 0xb6}], 0x6, &(0x7f0000000500)=[{&(0x7f0000000480)=""/96, 0x60}, {&(0x7f00000002c0)=""/55, 0x37}], 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:41 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:41 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x82000, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000180)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="bcd6ff98a3894657d52c532d604396daf334937f3bd3f2709211afc05f44ce733c6564bb16304b0aaba104460878f41bc763a99a616409fe16f35305a0dd7828701c64e13139173edf6aae5d27a948e397af5622e07cff41a533b8e340365c0b111abc68766c7ff3f30c03a98fa59d37b4cd0f52af8588ee011ea16f360ccb49a00b2f3a6a10684195c11c94cb59eb0b69be54d32fce55a3a2df0f42eb24ae66723db2d150d411a3b3bf812abfe2263dce90e5f38be71df0feed15a68de9c9562569390cb6bf3896306a04090f9279ec9d03e70fa045", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d4f20bd6da15ab4368526d0753e67b465417b4a3b6665a0d80b67ae4009c2e9065c42782cece5cef47d95878159c9ae8b80ea93d2d5c424", @ANYRESDEC=0x0, @ANYBLOB=',smackfsdef=fuse\x00,uid<', @ANYRESDEC=r2, @ANYBLOB=',audit,fowner<', @ANYRESDEC=r2, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000002c0)={'raw\x00', 0xa, "5329455adbb71e8186d2"}, &(0x7f0000000300)=0x2e) [ 2396.770444][T22257] gfs2: can't find protocol [ 2396.770444][T22257] ock_nolock 04:06:41 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x12, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:41 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) dup2(r1, r2) 04:06:41 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x1, 0x40) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000300)=""/27, 0x43}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x6, 0x5, [0x200, 0x4, 0x2dae, 0x10000000000000, 0x1]}, &(0x7f0000000200)=0x12) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000240)={r2, 0x3}, 0x8) ioctl(r0, 0x20, &(0x7f0000000280)="97dbdfe76fa0c16cad2639a752aaa0bb350abcb919") ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000000)={0x200, 0x50}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0x3, &(0x7f0000000100)=0x5, 0x4) 04:06:41 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x80, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@security={'security\x00', 0xe, 0x4, 0x5d8, 0x0, 0x0, 0x0, 0xf0, 0xf0, 0x508, 0x508, 0x508, 0x508, 0x508, 0x4, &(0x7f0000000180), {[{{@uncond, 0x0, 0xc8, 0xf0}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@ipv6={@mcast2, @ipv4={[], [], @local}, [0xffffffff, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xff000000, 0xff, 0xffffffff], 'lo\x00', 'batadv0\x00', {0xff}, {}, 0x89, 0x1, 0x1, 0x1}, 0x0, 0x140, 0x1b0, 0x0, {}, [@common=@inet=@set4={0x50, 'set\x00', 0x4, {{0xeba2, 0x2, 0x2}, {0x3a1, 0x8000}, {0x9, 0x100000001}, 0x10000}}, @common=@eui64={0x28, 'eui64\x00'}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x8000, 0xfffffffffffffffd, 0x0, 0x1, 0x0, "dce450200454e8e8926e5a6b3309538f2f835266e74df7507f6634f7e91edf6195644f10d2655a2102000a937b509ca84d19a67cb761353c6e1e59d8640d2715"}}}, {{@ipv6={@remote, @mcast2, [0x0, 0xffffffff, 0xff], [0xffffff00, 0xffffffff, 0xff, 0xffffffff], 'erspan0\x00', 'yam0\x00', {}, {}, 0x7f, 0x100000001, 0x2, 0x2}, 0x0, 0x228, 0x268, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x8, 0x8, 0x3}}, @common=@rt={0x138, 'rt\x00', 0x0, {0x3, 0x2, 0x7, 0x1000, 0x2, 0x7, [@ipv4={[], [], @local}, @ipv4, @mcast1, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x15}}, @remote, @dev={0xfe, 0x80, [], 0x21}, @remote, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @loopback, @empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @loopback, @empty, @ipv4={[], [], @broadcast}, @mcast1], 0x8}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "c0073922e5d32531762a391cffe6d871a9ba6fb37338170e92fd253c483f"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x638) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1200}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/fuse\x00'}}]}}) fchdir(r1) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000002c0), &(0x7f0000000300)=0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r0, &(0x7f00000001c0)="27b534e37d4ade062fbf238766225af04ad9ab1bcd93186ed01241201cc6c2f59baee6d6cfbac4acc2afe4d60a0f3357b48b1da99558a926a4435690d9b611d2b51abbb872ca19852afb45ebc01ae3c8ecd88ac700f17b334d3ec24970c7085b271169f068b464938934d2d4b6d6d3cbb8b7f87e0cd1b39a625e2811073ef4988916bf9ab60fd6b80ee893700c61ac8b8c416ebf043c52a43ae524fe92e997f3327bdb1587", &(0x7f0000000ac0)=""/210}, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000bc0)={0x0, 0x0}, &(0x7f0000000c00)=0xc) r3 = getegid() write$FUSE_ENTRY(r0, &(0x7f0000000c40)={0x90, 0x0, 0x8, {0x4, 0x2, 0x2, 0x101, 0x2, 0x93bb, {0x4, 0x5, 0x8001, 0x4635, 0xbdd, 0x80, 0x2, 0x80000001, 0x3ff, 0x3, 0x3f, r2, r3, 0x1, 0x3}}}, 0x90) mknod(&(0x7f0000000d00)='./file0\x00', 0x0, 0x6) 04:06:41 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r1, 0x0, 0x0) 04:06:41 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2396.993206][T22417] gfs2: can't find protocol [ 2396.993206][T22417] ock_nolock 04:06:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) dup2(r1, r2) 04:06:41 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:41 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000200)="3d1b1829a85d8497888a87089acd6884d82afe282268ed3c002f1bdcebec52d625c5b35c30110674c220b72ddee82783e27e8daedd3331e58ec2d10e69841adc25e349add74a417cdd7d4eecdfc7b2188d871c9b49", 0x55, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000280)='keyring\x00', &(0x7f0000000380)=@keyring={'key_or_keyring:', r2}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="6af0a87b01c7791a930000000000dc58ae7100", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:41 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) [ 2397.106623][T22417] gfs2: can't find protocol [ 2397.106623][T22417] ock_nolock 04:06:41 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:41 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x13, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(0xffffffffffffffff, r2) 04:06:42 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={r1, 0xbb, 0x20}, &(0x7f00000000c0)=0xc) 04:06:42 executing program 3: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:42 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) mq_open(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0, &(0x7f0000000180)={0x7fffffff, 0xffffffff, 0x0, 0x8, 0x8000, 0x7, 0xad81, 0x5}) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000003c0)=""/223) 04:06:42 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726ffb63e7109d6f746d6f64653d30303030300200303030303030303030303034323030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="91a7"]) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)={0x40000008}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x2) accept(r2, 0x0, &(0x7f00000000c0)) [ 2397.316414][T22601] gfs2: can't find protocol [ 2397.316414][T22601] ock_nolock 04:06:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(0xffffffffffffffff, r2) 04:06:42 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @aes128, 0x2, "880dae7e6b9f1415"}) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:42 executing program 3: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2397.425487][T22601] gfs2: can't find protocol [ 2397.425487][T22601] ock_nolock 04:06:42 executing program 3: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:42 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x8000000000, 0x0) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000040)={0x7, "86bfcbd5d303ffee5198c61eeeaf601024a0dfdf4819b41236da1e0d5926fee7", 0x400, 0x9, 0x1ba0000000000, 0x1, 0x4}) 04:06:42 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x14, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(0xffffffffffffffff, r2) 04:06:42 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB="0200ed", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x400, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8040000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x1ec, r2, 0xf2b, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfc8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffffff01}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1000}]}, @TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcaa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x430b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1934c00000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0xc0, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'batadv0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x73}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x298}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'team_slave_0\x00'}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20000000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffc00}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9d4f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e21, @loopback}}}}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}]}, 0x1ec}, 0x1, 0x0, 0x0, 0x400c801}, 0x40) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:42 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x45) 04:06:42 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2397.617862][T22870] gfs2: can't find protocol [ 2397.617862][T22870] ock_nolock 04:06:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, 0xffffffffffffffff) [ 2397.693208][T22870] gfs2: can't find protocol [ 2397.693208][T22870] ock_nolock 04:06:42 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000300), &(0x7f0000000340)=0x8) fchmod(r0, 0x2) ioctl$sock_ifreq(r0, 0x8918, &(0x7f0000000040)={'veth0_to_team\x00', @ifru_addrs=@vsock={0x28, 0x0, 0x2711, @hyper}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000110007041dfffd946fa2830020200a000a000000001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) lseek(r0, 0x0, 0x100000000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x16c, r3, 0x0, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfff}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xdf3}]}, @TIPC_NLA_BEARER={0x110, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x70}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @local}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x3, @mcast1, 0x8001}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xffffffff, @empty, 0x2}}}}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2ee}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) 04:06:42 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="000000fd2032e73a358ac33addfc260829325b4cb14941638a606e68264643e6a4d663a8e6b973df5ce3b45617d03046cdacafbbb2770e7a8b36c182a9ebefb40a1bf82c328c7f680b9f8e30a135de94bc38890803", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x1) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) 04:06:42 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) fcntl$setsig(r0, 0xa, 0x80022) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r1, 0x5}}, 0x10) write$input_event(r0, &(0x7f00000000c0)={{}, 0x15, 0x20, 0x9}, 0x18) 04:06:42 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x15, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:42 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, 0xffffffffffffffff) [ 2397.853438][T23090] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 04:06:42 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) [ 2397.907122][T23094] gfs2: can't find protocol [ 2397.907122][T23094] ock_nolock 04:06:42 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2397.988389][T23094] gfs2: can't find protocol [ 2397.988389][T23094] ock_nolock 04:06:42 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001a40)={0x0, 0x0}, &(0x7f0000001a80)=0xc) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0xa, &(0x7f0000001940)=[{&(0x7f0000000240), 0x0, 0x7ff}, {&(0x7f0000000340)="6baace773c9efa224b030f877a404a11fed8373b63dbc3363e9f09db181c9ee45e296074dda5f4a81471954cee3c876180984b424261e79ad0bea4f679c83b735d632fe7d642408a1e01461a8a81d2ecd7b3571b8282fe086da068444d52b5c232145b01cb24bd9c65908ed846b6b9b94840dbf613e4068a9c90271ac1dd4429d7c5b27eceb5db60d0a4630ca76cacfd4351376111474ceafc95301502f3471011a371b3d1e5746b1aa3bbee2aac790bab33bc65183abca8c5084b3a2d7f88c090aede2dbf987ed2a89dfaf6c4efda834baf6b78d3dffef67f13a10dba444f458ae1b6027f9858182572e540743ad32de5984b8d32b6585638", 0xf9, 0xab21}, {&(0x7f0000000440)="fd1f3ec84ecf2689c54b53df4d2d0a0867b34ff13e94757386341ed44530f58509e8be4b211b419a5c505266507f82aa83b09f5349008eaefed07167f0fad41f6dd2d6b8f17d735c302690a001593be6f349b9d5afbc3e3baf72a6f13f363acb59945e15157bc06b8195dc567a0f5fb43b6521decf4dcbc3620af196b66f4805286e31b8d4def4b17b2f466b6f", 0x8d, 0x4}, {&(0x7f0000000500)="1a4383c0ef5cc3c4ce7398040dc102ff620b10bc4bc375f1fc00587bcec911a7f8990bc78db8dc1b4089c7799da142c090c1d89dd55fff4795ea3178a983918d51353c51b8b8e9e550ae30c2dc387102caea21463c3af1d4fff1a273051a509cffb15a0f4bf15b53b1e84aacb09c53ae507cd8cfc432e5f9bb66ba4afb666cfa29c74f27799584f3588a8cce1bd26c8a144dba0cab89b568e09f880a5836e52e15f48dc4828564517b61bc625bb787f33c52cb85b256955f471a3fea21cc5bccfcf02d8683c120fb4bcfd17785ee6c04d9bf44b87bf983a5c976729ea61cca9cb51f56d8871f7a3a80da833c5a2f0e36506499b900ea6b712e01b18b661009017678d46d7ab6a3a3cf9e02829a95bc7cc2605e0d41c2489a77268f1a870cca6fa0cb505e0e0186a706570223a08b6577388771527e4772245c1c80db5da32cdf50b8db9a7b1a89d70d4868ff2e85e46131b542e4bd65b62d368810420a29236e98fb002339834a037870a5735879866a3fbb9f84bcc5fc06866e4e62e66d4519b69cb7064e4df376a799947ae37a39149723bd14165318cfa2c30360ad19c9eb9db55a7450fbce404a96a207a3b04e0aa0fa3501fe56b34aeac7efef19b30dbffbe0b627e58c0c26cdb3a73c0a6095aa9b227af3d1d7a06d2955d8382bd5dfaa994e32caed99cec8d6bffc7b866568ebb7f6b9b229da86caba028407edf9835736de13988971525c6c03211e5d3cc8fa7fead505940a56a5fd0a85f5cc546b6b38019b0d80e8b487d0b2f1e8aee522dfeb6036d1f4eb5700b7650c3d89c26a34c4034ad45d6fde2894a421a84a8f5c00bd446a56cac186f8f1baa0bd318c46fea5b4753140802985a1cf8c1e030d288679a9b74ce7af754604d0eb733d69217e034b822d3d98e03d904ee8ec04292dd6da8e398c664e958960d9123efd74078b4ad37575cc0038697ed286df991e1c93d6bffc96ae42d0cd32ed09a722f34d4dbcfb0a80f35aa9653235739f8c6d615e3cd4af7b5acb86c78d88fda3a3765abe71eb49f38856caf9f7b523f30b975ff4f7535bde53a302ae685eca54b26c947de045ba3b388d2b022b7664dfbe75edbfaa0264c5ee1fd09976abed43ebb909c4ebac7158c7b406a275ce820be43958442a7cb91607038d7efe435098057982d7ff4138bef16e25d7db3ba2676d97f8ba995ebc4bbec8e10d2a453088b85391d37892b2e50d6e655697f43d3a53ed08095e03c2b7f4881ba0ab30e9142bce7cc852ca07c64e6d577b9e07f48cffa2e05906759e0174afbd3c5a1029469030087e8fb629b5a7ef25a2d1c9d841c3e2d639408cb832db832d6ff18f149009bc8db48ed7e2351af946483ed7616120a85d8d085b80c646f0612fd381975a0dd18617faf3dafec84d412e612102e11edc8bf2e22fff6047a1266dbcfa16d10dd483fda952c8abd922e34c440a666d05007735781547b991ecd716c91a657e92cc34e9a060294952fb469e4d1ee8f7a38063a5e7669f433068212ff74d06ade0c4e3f2935d47a7b0d5cc643dfbbed7fd6d643aceb8f462987739dfd95f429060f0ef2f98acf746bc10254d104b648ec5814d10bd4e9846f0641362611de9098ebf59400af910429fa910ec529c1998f94dae6829889cfcb1a56d0fe0ab447d4e69d7a55d5049fb7153d851e17bb973d5ec31c6c2f90df3762de7175c71870acd09e07bedb6bef8b30408ce3e7ead189d3143065d4523c9e58f3f4a192a4a9ecb422761d88b89be5f272ef17ebb6d9c833aa861a63480404d5dd6a107735f00552667d5c657a5cc60800aa43f43daafef29685abca6e976eeaaf015394eb18861524d333083963a143b510a4b3dbaf2ebf42b71bd4fdb8314d8c2d3264bc28b6dfd3fd59131592899fa6118e51b41114540b8db46ef3b9a4bb38434c2074f704492eb457f88f42cf0c47965563e3f01054eb09931fd72e6668daa9cf9fd8f5047ce4639bd2ea65ffaf6068930e329ce42e70484bdc41018462d270f2fa3351f117c24ada962478d6bd77d484a8312b21547247103199c08c452600297120372c766bfaa5975df1a61dc837f0c99acdaf7d5133e7eb06eb380cfa5b4ff2892d9e61afa95d1650b71363c0ade510db64a40ab9c2dd7778dfe6d1d648802a702fdcd8cb83717d0e9272f7300a86ae0b523e22b5fa8627e8a80508eeffc3354d3e36c7cddf6319edc036f34f32eed9bafd230bfdf568fb149dc2b756b258ce397c8c3720c2665974ea4d1550723f5282ce068f9ef22049091a1cabf671e13fcec4ee6c93d622d0e9a15bd2effc93e29755571bbc7645ac7428618c7da4380bbbdd2ce3a3750fa5b46c5e1ac2cf7bae2f432d0ab732d9f5d72d7c81b26fdd63691099226d998e1046cc1ee1291640aee7b338c76b6f3659dc4df05a4b657a88d1373a20476bc1dfa605918e9a0704efca0c8f414767cf8f1bccf7f753ee49df6a33a9a51161e388ff20d5c91bcf85118c08b269582231e6d61bd17a44beb89968a04b41850f97e2072fe51466f4504bc1bd7e9fe537b3125c36055178b5c1af1ea822cc3a64d5f21763e85595c2e7ae16d7115b0833b3c5468c193af7f0c5838397b145820b8e1186fa9035967e9e1f97f1b026cd3b35be5d89b01a8f70e9755298107d0cfb679a95df221d564a761eeabdc774e23f908168589bfad443917efb1d6a8bfeff7e7f00156c26ad226813aaea8c6f9abf4a0d6de5b9ea37f52427d6e62301080045ff9860cd129340c191748d64a4a011f871c9fb7747247546c5a5fbfc578bb367b5acab4a47f090d95e88e19c1539da8ba90e0c6e7c2859a6ede4ce8973a4d34ab9f51b6c685fe6ec8c6c4e6219ed5d3e349a7393a83a0ec9c8637d2084b422c8666facc9494ed966e9b489f4bd88954131a293751b1490758072ee23da9a8acf11040243cd99797f6c7cce258400225fdcdd4f70e2a0d5c560cba548c0f4655a148c69ffd9e8dd1190f827a26b085f82f6e16ddc767e26a91e3f74da8bba3eb83450d080e015162ee4c780bad667831340429ae8011d198fc34d1185955445498e41af4beb2dc31d4c7c2e29688157ea931cd2ccc2d8f5f091902711bd320108cee7ab0b1a5c6757a6f5ed65c20328495f19a50cb3947480805662e9f87ac2f2d22315ce6743c867de2afd07a8cdc15fdbee1e27c7ec389c952ba5d53f9a497030055c27213ba407d63101c930a68ec921e7619d2ec83d4a559cf560cfb36b7d7500b954ccce7aada17b9c448bf3ea8c94a4600714aeb9623820feba3c295a74f74734120f2229803f8d022f7b426a09daddfbf997bbd348d9a0166336e5f3bb4f0db3088ca225e751798e1e90f3364c20305dd4449891768a413379277aa0419a26d682336ade626adbae14bfb37d41046a6621f9a5e6b53d8cea5cf53b3d852aa43ae07dd3f4b7969a6e7c8dc9181a900a5ada43ebe356a0e43d63ab640f79718dad08633167059893405ddee867bf6648a7c58a9b35ecaa4f165a62bd6ac2ef2e3bb2530e0a836b3e1de7cc381b546b2abf10a2bae54762eb9578f6984c306ff15a34c4fa544c477fb8156ffee446ee25cf365f265fcbdebc6412d130fc7e6182a474207f99cecee301aa00e1bbed376078008932054053ad67e3d04f5ba0294feea7f7b58817eb29bd13f416a4f38303a5a03a68d91764fe0675d45e8d13fee64a64498ea86fa51802305094143845c2916b329b7bfe5ade9a02c2b3bbacbbdd0997231dff8b3b1445f101cccbd1e42d9be1a6d3e05ee5590f78af4a728e4506be23bb731553220bb26e6d179b1a627a251d91539965734be33f70e3132ca6fa0a34b320fd844ec886987c0ae7065adf6a138689da85350d7ddc181d909c0036c987ea90ba2aa43b09ecb1f5d0ab158a164ccf6c8dcdd08cb3a33c118199a61a76aa3e65d831c38104fe0a5e82df4d32ce1d0dcaeaf5dc7e9165477107a33e8920d992c67e06c1cc222625f98a4b88068f6808a4f01a2531dcfa14d3e49e005d3eef444199d36b50a510a191af378e3767b69420421d4380fefcae3d96d508ef2ad6dbde70af4876c7472c5327befb5083693c86c8fdfcaa78d1f3cc0199390f275e29bd492d69e71325f6bd3050411bd41e45ec7027ac29de821a6c31c319283fab13d0541febe7887acb09545d6c410055ef9ebbeef3487ee95450c2da181572a1cfc74afadf016a7422a73f436cf4de4ecd549787c58241ae132c4c812d3161ad8e64ec4550d3222d8f855ea5066668c33dd155f7b79e87ff27ff7b0b5f407a8420c42424684ef9417c543c11a400e4ca8621bc7915f0f4b06209c7f46cfa4b214e74c073892cdc605dbf207dfbd65ebb64c8a32845d81684d380cc7979b3c8e26613386b583319a93220384fc8cf6dd19a2998fccef0d9aba8edd20f28d87c3ca0e87c998d0ba65efb9284750ac8158a0d3baa5f6bbc89987818c189319fd4b3e8c64597e0fe4489b3afa94909a10fa0902f0d9ccac1daf365525d69903fb3cbc3cdf46b41693dc298cf6fc4c6ced87a03ece7c91df26d5cd9582d4343a6a559d487fe6106f588cf7d6889189cb980b54d3bb595c969042d37de43eb10669bf15cccefc29c1b73437aeefe20aeb91308717eb3c19e505bd1780213a3bbc49a1436432487f36a0ce506b319dd75746e0bd7ca29a7704b7e6a249f70d31bae35a7eb83a5fb419c9960bb591022d3c71dc1bb28f9f580f6f8e48dfe4b30a4c56e395c2ef357534fb4d88aa43bd1f38000985ef3e108e81be645cab3c9de5a3f69ac37626b5c7dd3eed40a3bcd2f41f6f579f78bde49181e70fdcff345b30e2ba1a8408b327c1b8dd2af920254498fc107ed58d8e06ac9bdf8596d983da996388043f229f268ed7fd28c851489eba107e647fc15eb47fc3065ebf03fa468a3f1a5a458749c303fe53989aff10728a3d70fd1d0ad75fb0b8fc77c8b7f01b217b417aa7286591f8cdc9f0ada683e94f6e484e1dddce49bfc6a9d9dafbca21758de6436d8c59eafb916db26eacc6f7ff4bc1a79b2f23227d062535145d99d31f2e8263dc322b4f8a8dacf911153e2edd7f9ed030c830b7b7d834aac8cf7da3d543564ac36977e5ad8a3248879ec9351a71d889c1ab216bae5eb4eecd7f5bf9b126e14215c73184947d15d6299f6d56ddf4f09efcdf3db714d628440ddc2202a298d2843feb80f6775e48eceacf06131995ce71670f3a388442202b6305e7bde0d58a36e00814438add3573a8995e7f679040a1a7d8b26b169b72b8b7a6713b2c41d44973068bf6843929f517e84a4af30c97bb2e002c3f7ecb97da1a2617a38c8888ae8a8264566e940098b2c24b80b631764a7d9702323e157cff45d37d1ced4bab048bfd23835f52a3d265d1f7178d621586813b09eac921673a47f081fb316aa15fef1b153391d5931c0c9cee239eb73ad636988b87e61bd07f77f653ef34473eb49dfec55a786f0d6b58b8b2878f6773dd61afa691cbb24749c9a8d905f163131cedf3f3a0a14e2c0559fe1d3250f7079ebeb762a8884b64b82021ad9f11c14f6f56363ef1d1dd6d34f99ede503e1375ed37cf8bd806e7ed90cbcf8211606f7963335744b06d808fa8d6a6c207f5e1de10251e19a2c54942911ee53744235d2a0418ce8d7a485588b25b7379665b9b9973c231eb1c776c4806f54c437b2cae261cc3e127eef75bf691fb406bb09f9c075d3c188910f14e1a9772359de5e33e36b66d1dbe91093b3e45508e71372d6bb02bc6e9b1a34666b163d5601781", 0x1000, 0x7}, {&(0x7f0000001500)="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", 0xfe}, {&(0x7f0000001600)="4b20aa0b8dee63eb5b3b0a7dd880f7d42851fbef94c050f241cd1de95aec27ff1e207c6e41152aaf7901cf6799d1af5151a317ccee09812159b6efa7d7c4f4aeb95e3a678a29fc2c1c73a562c38a73aca6778bd142f111fbc96044a7463be390dd511670f59ba9917c5c70ed0706b4bc6b204d84d15d642f7ffde16665d771e1efb6fed21b0773bfe7fd3f7febaa82f91d079af6009655e72e01f664423b26c85b4663f06b3475e2ab39002bfa8493408ede2b4dd78982525d2247567fbfa594356dcfb52f731a56", 0xc8, 0x5}, {&(0x7f0000000280)="2402580ec0cd8a5e54e671ae872cc0c15d0158eaf32d633af8057ff3225c31b8e0a86815d962a129f9ac1c9ad12ab52d506965282539127577541d6d57a2257650158f9bd6bab40b26cc822901d9ce11", 0x50, 0x4}, {&(0x7f0000001700)="1e8d0acade0f3875839935bc0660ad78cc98cd3792d8a3d81700dfc3db44389e34470b0b59360d8827ca0fd1e0910f47840bf71b808e7f7e8cad040983c373aab07bc344262f369497b88c9661b550287da92ea5e0c69d1384dab74bc3ab0067baf69bc7820288aebfd704c8de1247c6e8dd7a809e63b850607888bde0eba80b44a0f844739e2bc67c89bb2d83c4c3c61846ccb22636603ff9609e", 0x9b, 0x1}, {&(0x7f00000017c0)="d94b18115c07f5a90a7722624a8dab71055c247d6579db7fb907f590f8c6c56ca9a864bda89b1de98ea0cc18ca51571250a82d14fd7c9de96ce47d4fec5ec70c4f31beec43c44cbccedf81275259ebd4ba7c80e817fb584c4c75ecacd1da433825e62e5a196028a8d612e087c65f8284de67ddcd36f939b46aeac17c858e565ab8550cbf5497cd04c3aa615446edc26699eb4235a6695173ebb9dd6d7f7232df460198580f7752b5fffff91783c49cf149e02d811b5e93b5d809", 0xba, 0x2}, {&(0x7f0000001880)="fe0d7a974c64d57ecf17b2b4818813ac8a6e5ac77c5d78363e2f683c44f2045120e362ed2cfd06f0148e22ddba070e013cecb9d90f565adad29d79606d5894a33da02e3c14fc6581ec613aa8619988b8bab17de9cde9e56009493d6abd4d936e45db0f28e873f98654fdf6274dadf36e9f0da6f8cf647930f191384c3f33034c50d4289891bc2bc7983154d86fb0252e97883eabe858812a9e94b09a6daf92c0d5a9ca50671f5ba55a35", 0xaa, 0x57}], 0x8040, &(0x7f0000001ac0)=ANY=[@ANYBLOB='flushoncommit,smackfsdef=/dev/fuse\x00,func=PATH_CHECK,mask=^MAY_READ,subj_role=fuse\x00,context=system_u,uid=', @ANYRESDEC=r1, @ANYBLOB=',smackfstransmute=/lev/fuse\x00,appraise_type=imasig,\x00']) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="014a0b5a57efcf399f793d5fcc9d060e146e5c77"]) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:42 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x200, 0x0) lseek(r0, 0x1000000000000, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 04:06:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, 0xffffffffffffffff) 04:06:42 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x80, 0x2, 0x8, 0x3, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r1, 0x1, 0x22a}, &(0x7f0000000140)=0xc) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, {0xa, 0x4e21, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x3, [0xca, 0x20, 0x5, 0x42a43a6c, 0x5, 0x1ff, 0x7f, 0x932]}, 0x5c) 04:06:42 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:42 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x16, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:42 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fdl', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x12800, 0x0) epoll_pwait(r1, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x2, &(0x7f00000000c0)={0x3}, 0x8) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x1a}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:42 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2398.220917][T23396] gfs2: can't find protocol [ 2398.220917][T23396] ock_nolock 04:06:43 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) bind$ax25(r0, &(0x7f0000000040)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x7}, [@bcast, @bcast, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) getresuid(&(0x7f0000000a00), &(0x7f0000000a40)=0x0, &(0x7f0000000a80)) r2 = getpgrp(0x0) fstat(r0, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000ec0)=0x0, &(0x7f0000000f00), &(0x7f0000000f40)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000f80)={0x0}, &(0x7f0000000fc0)=0xc) fstat(r0, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000001680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000016c0)={0x0, 0x0}, &(0x7f0000001700)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002dc0)={0x0}, &(0x7f0000002e00)=0xc) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)=0x0) r11 = getegid() sendmsg$netlink(r0, &(0x7f0000002f80)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbff, 0x80}, 0xc, &(0x7f0000002d00)=[{&(0x7f0000000100)={0xb8, 0x3b, 0x308, 0x70bd2d, 0x25dfdbff, "", [@generic="e69365febfbb5ed768a59d32055e6f6fe2926a6bfa4e40c1d0f866f481145bca37d468739e1a30e963bd928b01f99b0ab0847f9ef198c8d57e4464b548f57a47de1bb41be5235452cf0b774d5a19efabe1b598c3d1d3238866081b10dff130e9e76b1d2a75ac46328ab9cc3c643d3e09fd0113356649e0194a6c9d4bd2872a529a1c124f57e7d20e7a11a523ba782424ac44c35be2a07355264ca8237b3ceb960f53ea11b4630668"]}, 0xb8}, {&(0x7f00000001c0)={0x52c, 0x14, 0x1, 0x70bd26, 0x25dfdbff, "", [@nested={0x300, 0x11, [@typed={0x4, 0x19}, @generic="c99e9e746d42d48a8ef74d0c20b6b2b522497aea0e15cfbfe1de32e06b8680aa4b0f57d802a2c2fc5802a3a868ed61d39915fd11928349c32a540a8ada793503a9ff1cee438bbfa212d972e7d547490c58a6c177397290cfe078d8067d324ad5d435a0708e11eed3a741ab9087984be990106ff95ebf5bf4392bb6a53acac2b38158edd33c7fa3a69087835944e75aa5210ef6ba036d545ba636a376c6910aa76704bdc61fa8fe4d758db7e0c6e3650942a526d5b91cef97800367bb1398157e19261ecc4730d12f5d59f5901855e4fb51b0e402b0855382e42f067d78dfaf84490d0aef2ea121cc440b16644fdc98ce3158", @typed={0x14, 0x8f, @binary="080ee907c26ae837af5ccbb4a014e04b"}, @typed={0x8, 0x42, @ipv4=@multicast2}, @typed={0x8, 0x7d, @fd=r0}, @generic="48aa40f7f66d0b24418bf24dd0129566e28a1d246245caaf3d9810dfe27a2b1b6be98add8c1ddfafc6fd2df399143d2e98276c2270b3490e9b5f5262edb0bd06e95377d3278557779a49d32cc1", @generic="80caf4af509da39177a4d5f81d7bbacba1d153d84029322264ea583f36cde3686080e94dc5fbb56f58e35f2ea28884450af33502c88aa5b218883c641041c622f4d21c960fd8df5120c0daf09e4043e9500fde", @generic="0529fadcb78f1803f5b8c46110a0f84715e5391b012c253299b56ee8d2b9dd1cee8e470e1e2594ea02e58e77b4b02164c220cc7475ad3e10c281a036b2cbb79bee34b553ad63a50b5c8dd5a974d71c50cbe2399e123884fa776db10237cd4d66a12497ee361fc47a3b8c0a6af311254f10a9cf6e3f354316a488f20c4c706483422d992fd55174d5fbe4069e215a4a7fe77e4d3b6b6fc723a3347ba54823d426d69288866d6732ad929b38c9befe53d1d166", @generic="76efbd04b1f72933e1112436b98e88365841e1a50ed52caccd0d43d2313f522ee4fed8e0bdda48563096d2535c31d01cd2bf7168fd1e1070684c9e5fdb5289174e52e4e808ce8459b4e1f869", @typed={0x44, 0x7b, @str='proc,system*vboxnet1$[wlan1cpusetselfppp0[posix_acl_access%/\x00'}]}, @generic="d591c6e85b4a4be035b41453819ade34d468b58265c2cabb17a27bc63b4e988c07dfa6732f7b177cd1b0ae2f871cd74190bf46a36eb9cfa9f380680d2d566924b73cc9959b086f3a748b5017a1f24039ac8558b0bb3e363a96a832a6740b02e0cc1ebd6858c949951913ac515f02b747f6fada4678c0b46b5ef612f2c0c01d888424e73c144d9526dbd374519e6819d36dfd11f75f0939ebedf3982f", @generic="f83c0779e5476ac7e4e0e0efbb83330a827c78515096e398eda315f92526b5d8fa013869d3c234aa51848ae19396133c15065e1b41f4cd8ad2fd4398486f0d4f041727f4fe256b6bf3b00cc1073b22c1f705c6e3c38de777ee69379d7b88723e08ea055362b9054d70f47bc7292292ccd3dfbfe1d5c764b7fde55eaff00a11b2e12a8d2c169306ba11d0fddc97c86874ca26bc4e8f46e859336b5ff8bd4dacb1c143764dbe571edb346c144ddd83da947ae738dc004866bf0b28a941a3c504974b95395a012492", @nested={0xb8, 0x20, [@generic="2516b0363daa9a877fc63183820545398ae6037c08c58131f504332d0c17f38884b11868096da327efdceece5204af19ba54b8d36b40d49adb0deb9c71821e2d6a3fedba73687629ea65b71418b01a0f94376abe0ae36c729ca596ffb32f9206a345ce883e196ac9ef541ebb143447edc2dbcea52e82ea77530b28e5d4013c5556023d470c3d91230de2335f03e4f433f634164d458a2692d6c522f1f2d3d8bc", @typed={0x14, 0x1e, @ipv6=@dev={0xfe, 0x80, [], 0xb}}]}]}, 0x52c}, {&(0x7f0000000700)={0x2ec, 0x3c, 0x901, 0x70bd26, 0x25dfdbff, "", [@generic="ab06eb14cf9321d314bcfcef3405dad45bee0a16766a0bad20384a9347f5c03cfcc23ea3396cb34abcc0c3ee4e722982401e20513a97dbfeadff3cb7a2e861e56c31b75ec057f0c92674fe0934da84e515f3d79a1abb6ff6a2b2fcf8bf", @generic="200e95672988742602bfee4ff5eb610511b5df9cbcd90959d9dae877ff580167c4c878e0325bb2ee5e29dbc4009560d0fca42c8f2529bbe6ef43e09cca21a2fc8fb8d2e3c2c11bcd0c945027aec8c13d5eef2f3f4c482f5eb948a71c3be21d37c7c0c52e8f5fabb0537ad8cce3d72b476bb0dc6ad1c65b5ac5960d67bf6bd1bc77d3f485d2e4bc688f54a5aa432c1cc98ce58a59465b996aa6eeb5277fb0643bfb14f3782fefbb86b9a31bb699161555d933782a1db9997536", @nested={0x1c4, 0xb, [@generic="2aed83e89c02912d536f2d07d4f08463f9e0614fc67e001f7005190886941b60532a8df3e895eb0d4859a3b9de691f04ce3e877d93d93da0eed1c299ce6c1401f34cf7eb19bc03e7d0e55de5122db3bfc2ce28275249", @typed={0x8, 0x60, @fd=r0}, @typed={0x8, 0x67, @u32=0x9c1}, @generic="b3c2c87d9d26512d9a31c35236d2d977c892b5332b0fa0b6a7afd29013207c254ea5e081340212f8cb3c2be8b9b27de6b2e60af65586adf0ab2ae6a3775ccb630f0f36a2e20fb4dd4c8101d0798aeccb3a523647a9ea2640c249a38ef9f1af7d178179e85b9fb3043996812b309aa7fb45b764c7bda1cd1f21d5ab8ef2a07bec9950cce75c9f7c6b093e4d0eab6c4df23ba8913b0cbe8346", @generic="36a48ac5a359ccdbc371c9ec36491863fa0cc22a1ddbc7d67a1449d6d0407089be56685ecc9d9573a36af35f8eceadfd40d7e2fa83", @typed={0xc, 0x76, @u64}, @generic="61b1c324cda89b894b9967097e8fec16a1bcff7da462f71c9c067413c0d95631a2e6881b02ddb9a90897027e042c32a1e89c4c62b31929c8b4ec3249d985d67088b959ec4b1d361ed13746b716df6b744490418745b7f19587163542938c655eb23f0b5d194e26d1dd869892d686a62710a59672dfb3e16d71abbcb669cecd"]}]}, 0x2ec}, {&(0x7f0000000ac0)={0x1c, 0x24, 0x202, 0x70bd26, 0x25dfdbff, "", [@nested={0xc, 0x10, [@typed={0x8, 0x4b, @uid=r1}]}]}, 0x1c}, {&(0x7f0000000b00)={0x30c, 0x3e, 0x20, 0x70bd28, 0x25dfdbff, "", [@nested={0xc, 0x8e, [@typed={0x8, 0x35, @pid=r2}]}, @nested={0x25c, 0x3e, [@generic="42a3989a010d33fd2144108e053251d47c8c0eaf92476bce566a16c02c0497ade88b38fd5a9fa1b4c1eb1caf2fe2bebcbb22c90c66410682c00cdf888b1e244ce895ddb6e07f40c49f92736f893f49312f63d190fa14df3d32b44a3ff5855e1019602e9c2a0e5c0d8d6386e8d4b65f649566e3936451c66f3a68ef8d43bdc40d4e1230c4e28f90e1975f1d389fe8e5ef4aa8f6161edfd82ad4a684477e3c38b259206f6f976306d096352277ee08ac750ebd3455acb30aa92963ef1f0a07e3a59cdad7ab7e33553d", @typed={0x14, 0xf, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @generic="0c11baa4970caef796a92235dc8430809ff4fe52e5c0fda5ca4f1e082876af301607fa12030401ec655f09fc1f3cb803a2d9ce3f8cd2d657ed1fd400cf1f871e95ef08bb547189aa1d4091d576da67ee5815f754c3fd6d52565ec01a22414d8a691f09e4493b89ef87ebf6fed6dff1fb2c6cfd66f50382440044379356e8e5bb7bfc389a78a4cb54d37149bd99e7562db666a3afebe8b23e2f4a0e03d794180e9dfee612697df81022053ceff6d7eed502ff630dbb1466511f187724eb051b0d1be03ccd35bf439e1836c6cfc4f32947e136a4b12af06b2e48742dd50856d346ec43cde78339b1d03a", @generic="e9bbc4120e869361e80122a542226987f7f016e8d9cc2ef643694f56bc3602ac0e2624476febc3448e7a5bc678302b21ba3f167e31d44b3d980014b622f2474dd078cf860b1baf6384065f5be779c2007fb0b48410e8cb6d736b3d24f4e61860fe7f9617ad0aeb6e6e0550ce05957b48e5d4a4b05db85b3c64cf77f08902e6ba5e491a0777d0b6c0f2faf858bd774caf71"]}, @nested={0x94, 0x15, [@generic="496ae42b6571c92a8e800547fa366b949d4d5547d0e165b4c142519fa99d5bdf79f1c293503bd7aa642718eb3d05f0ab905b1443bf83b2b9dfe24d80b4f9c58ea1b66e1d357edfacda51ad73f1f8e8582c4c2ed40d8a767d60b30e387ecfb53049e4346deb392a7fa81eadf27319c0c74c4356f609d642d26823f2c99882c27ac2516ce73bbedeefeb0dcf6e3df5db"]}]}, 0x30c}, {&(0x7f0000001000)={0x230, 0x17, 0x0, 0x5, 0x25dfdbff, "", [@nested={0xf8, 0x5e, [@typed={0x8, 0x8c, @uid=r3}, @generic="7a3ab0a10268a22868af827a1cfce77828cb57cc155543a45c0a40fd61744140a80b0e300e7a300e71e3b9c4f3e65db7c6736bec29a2c56e6207fade704911e6298f19896c49fa60d2e6e3f28ff11876fc691428bd3529f75c09843fbef100fc1cfa9c320f1db95ae08fae62a2dbc5f0e7a9673a063eebf0b020d5e5cfc5b43dfd22f89f54d8b17b184652f578c7c4693216c5348402c4f1192d4c9bc177ad1ac43420794c7b89371092119ba603951ffcb7421a45cc0bd6a5df2437581ab79a399fad5788f5579f1abc21cd120d562ca2d378320f08627a5b91ad18b78e590516c5278aa07739187f6e0538"]}, @nested={0xd8, 0x8d, [@typed={0x10, 0x30, @str='/dev/vcsa#\x00'}, @generic, @typed={0x8, 0x82, @uid=r4}, @typed={0x8, 0x64, @fd=r0}, @typed={0x8, 0x70, @fd=r0}, @generic="a3411218963388f5db86ff95854bbed567bf234fced77ac6f21ca0aeb3ad39d07a661b953ef8fe8a8e981f83f6054c4054e9425df7aef1454fe8cc6d93e152996d53b6af7a03e3d659e64c16958a10a181a85afa983c3d961a055c9cd2b35ebbb9c70a961a448667072304c5a1dc0a984c99f0af3258077f6b0d05666779b25b7eeb455ed28d94b5f6b3c98752349c37aafdd9abf440b057cc", @typed={0x8, 0x5b, @pid=r5}, @typed={0x8, 0x14, @ipv4=@multicast2}]}, @generic="409a7ee0db0f9fe59687438a4efbf99476daa1b9c09e1cf8ac12d32bcc6e2add13cccaf598150b4b7c5e2901f2a71e183bf309cc2e2f72d956015722142d0d09570900b71013f89d0e67cc6536"]}, 0x230}, {&(0x7f00000012c0)={0x1c4, 0x27, 0x304, 0x70bd2d, 0x25dfdbfb, "", [@nested={0x18, 0x50, [@typed={0x14, 0x41, @ipv6=@mcast2}]}, @generic="d61f794912653d1012efec9397cfc7f7f0230ef20667607d25066dca65758fb8b25fafa98244a7210a35", @generic="2a111b7d44d3a0f1736cfe2673c2ee8adb8b09252fc21ba729422e5dc482369a3ddc455bef8730e706d183e233c34a9a4dd89e9cdbea1792d2c4c4b92fe68b6dfd6aa08fdd68348f62a33e82ed49cb60e25b837428c51e23854f058b970d27aa605d43a107bf6f74450f0011b14bd23ac2fc4232d0e30f886faa1fa270d5bd4c646634f963a1a0ffa70d929224894ffc85e6ac2df9f68c5f1d", @typed={0x8, 0x1a, @uid=r6}, @generic="c67b9e27daf9cf0ae9ab17e01bd8bed9e55567856b908a6091aa408a1961fe58c2023e01971be8a570e07b86f0dad950980cf2cd91555b417a68ffe0f5f9c42803898fd4a9e85e2b7818ea7906fce6c8e3dcd58988c45d8f2c26a2c523f25acf440535beb5bf4f147cce623811f7630473b317d7cd3982b7177511047397d60faf5ef08951ed57493ec5e016341d660df3d445f2f54771dbd971041cee6f967817eba053779385e416456f579328451a8c85956551918edc7ba7312b29ebb77e3df38c13efbf30d136bcb5233dcd6134"]}, 0x1c4}, {&(0x7f00000014c0)={0xa0, 0x40, 0x220, 0x70bd26, 0x25dfdbfd, "", [@generic="f2e3bb90dc5c86e8f7d9a0b78f99606be9a4c1366ff2bbde24f2d892ced691659796d4edccfbd657d5f4f3e7a2b472fa60b201c9b98c5238c958c50d6bca87f175185798730ab99ded84ddfada9161ab0490dbf821c1785280b6c4ad40d1c1f26a754033a5365b4f3f3b14afef23ae846bfe8db900559fb70bd8e63993baa32d91d587fb4108462bf9f338d3a4c2b8"]}, 0xa0}, {&(0x7f0000001740)={0x1550, 0x2d, 0x300, 0x2, 0x25dfdbff, "", [@nested={0x164, 0x12, [@generic="327085ca659310c9b8b636e3c4924fb8dd7b1071f05ab7be9e974f5a6e57497c01748dcaef351b1f5867a4bcf4c1af94f7f78343a9b20bcb6df9b9825926f159cae465ffcdd94524e369e2120ecb31cfdfd7f0d53f3e040522a50c7c29a54227a787154a0105d877b22b526901d8a48022649f5a92161f9ddfe5e0449e128a128a3046c41936c21c2df2377065589f8f54d6eefaff04c66c0146fd0a96977e36da1fd6b4bc446405ecd5b438e3e17e074c601a456f103d8ee1722f5a13d389d4781509d68e18199100df4124", @generic="55bde22e29f16fa1b1e8c2b1eacd12243ccfab10ffde1a39890a31417c7006acac4e8b189fa8af74559342a9d1445d7a254a5047c27fde3d27f72d49173a1fdfbed1672f3a89b4a78d981bee47da2796c26cf452deab7312cf33b09bc3f14467f9daf1fddfb7477e59e4387dd9da5bcea2693cea788a1a8de43d7116a8f1f09f09446b37dd9352be5b6952c1763b54e6be55"]}, @nested={0x1128, 0x8a, [@typed={0x8, 0x2, @uid=r7}, @generic="c4", @generic="7cc8f7e30b8c937f7a5fb0f770dd5dc41f48edab1f46baa98adb604d55f81f9dc12631dea2c3c498eb2c3720e310c78ccab2b80f6ce4f6ee323c0b14e6b6672342b6", @generic="d9c80aa048a56bcac9380731a5b0194732fa85c1647a5a4ed6468fe5a8a385e8d43cecf800dbb1db8ae7052ab0d86d9fb90158d24ee5d0a4d27dbe81348028a9b54ed57b8034dcde02063051cdda83eb633db636cbbdeeb8910e271b7eea4f05db7d10d6ba144330ba26dd479b0a633cd0b14f2895c2d689b080f58a1dc94960a2f76b2585eb196832badbb96bbcd279c9359c71a41c7711a03586088a0dc33966e62e9c1d8cb917fcae3f8cb15d25f4a8fe8b3b25502e75d8244251e7f8044aec5bdd65d34e06fb7e11d4696d21", @generic="8c6059c084936152f06c8f5018cc830f1cfae88fe182f261754943044dd966b80dc59dc4a3e94b367ac9656f32da730b3e890451d9eaf9c7fa0636ccc9122b159de1406265d35e013a9e5fd13504ef352cf98a88d07ba04be1dc2763df7ea5bf88f8305c05c8878fc2cbe6a8b825ceb9fe71680fdcc643d42d91910a09f93eb38cdcee941134bc1f264015e32397651a8c2e26d77ca6b06a7cdc393fbbb9fa16db5b2b0f441f75713797e4f34859ef546f59fe9dea56193382c55205421399a764774a62ace247b149f4fa992a8e3aa804bf511931b49300e710ad9e4d79b88c4491a1aeedc06ab2bf9f84f4aa3717f287b6d2b97e3567f3b1ff9e208a61413464e6f8f3b88b78122603c40876652dff4e20b3171beee623c82bc0750f6d42c05182c8030f8ed6c396dd2a6784680e01bd17f773d2d65199c6b12d71c19bf2a8be070c9d539d79750a76ce2eafd49fbf951841f15ad5b0bbc659e64d7d544baadfb7d5ead52573c0e9a3035942814169577424677de9d84f1c8d7d9fb72409c5a730ad7423c37daaf870481a06d8d206bd2d259300dbfef42758e6c5fd6ac960a04e92a032ca7cf7f96184ddc4a48d3602d35b07c11fa95d766147bc61e712f1ad42a7e46d8f2897f103f9d32decc9e87ce0f77e3f8be44de19bc2d51c15f2775f3a8a0e08e946a127028f98ee5355369d1a4cb6f21d7a9090073b8f57e708c841b04b959008e5e8e83b1c6769ea04389f8a6be30c20bd32eddf6e81daf02e639cc0c4d08f2d8e1ca9d1b6cd3948d328eeeea055bd268a8403238f878d78100c8cf93c48a248ae76dc189826760b884d8523db5aa44f1b8b4973e4eff177452c1feed8c585bc28a12855aafe19006467a4c746b66dc887e9092ca85032a9394f2ff538c751c820521981fcb0792b30484eab82865f1d8b77b02f3d112c32ee70e7fe8f8a665edd389286291ccaeda0f6592ad7631cd3165ed420c5635b6963162f323061cf48af6b285d09ffe22fa01062165284abb0635628830e03cc6b9f55c56a7508b3fbaa0b8ef67fe66c81307fa5851206b4b953c37e61424b51e9693092c82990d5688eb12874fa83e8473c7822404d36eba93b67ad3b405f7a039269afe9ed18c653d10727e878981015983322edd9f684222e762c576f0447f2d417ba909c8d1527d94a24881739bfa46b98c35fb2bb7e0a3c60757b382287b740ec337e1793e51c61428e0e7c5b551e76944cd306f4b36be0f0cde9cbb96c5cc0b6ea6ccb5544438b1dc633942cb840abf76726690b9ea262e70446f3be4c6cd3ee4f5a49d624d99295ee7f5dede6cbf1838828f0ea5f171aa39278d3a67115977fae2f14ad889093ff02d77908e49dd2bb8a549aad4ba798ccf9a6fdc124ebf447410f8b7548285b5cc6719d14db9f725d83eafe75e4b1f0d26374bc7c5036e1d0ce372644d131b04d25023e06efde1f6b03eecfebb07ec505136f315c6bfa38e9baca25bbc614402d6ba70f6e4b43eb0e49a6682ca3aaa0b3a2eabd95ae028cf86dacfce2e0cbc45579bcef5e589d28713107468fab90b869525f176f21c76dad490ff543c363f2259c91e2a10d8cefdf769f6123b4a34e4e22fd90574b8481125410a39622428789c184b704023f84afa48bc2887ccfc78f4155bb22a5c94d38f0a46f0b544d183fff9c6c69c9d4ba59122ab5ed254064dc08d26f4e642bf7117261ee75a787b843f93d77eda7d57c3b47f4e6827510799d2caa28acb21ded01b0c31beb766bfab14df55777ed543443f3c495eb93d4a00b8b0483ca47c90f595c137464d4c2ea82588c908669f12d3bfaa59b4317e890856eeb65997053f54f9e334f9e3360eaed631d6f138b0b0b9a000d4fd16c2a6a69b079aadcdaeb99b079beaf1b284eb52ea921d02916de82317d7fb3b19b348e42b7bb074047c1cdba395b971bf73941e0de4ce2ffb65d4090ed9746e0edffcb9f60ddf05ca59ff69fc964b7277786aa76369b95a06ce4b7a4002e0628b850b8b4e13188fef6d6573f3f4118d7b0551aeb17598f7ac611621098a360ed1690ad8dba37bff42009c1edd729be9b098683f2ea852dc46ddbbf44e47956a2e18778862cc4f7e349688b67a8134a2bc5012d40d1c0d7e1ec5e1454281acfba8ed952fef841b3a3e3c043839e3c9abac426698e8be8f16995384d98824dfdd47cef667dfb2b33019b0071db6b0f5223d3abe7925de7f34a37420f80a339e19b45cc2de39460df94ff80534ca98b8298f9c78631da4e8e867b4c491c9b773494cd182019a3659e2060f8ae5069a4c485e24c81b345f5c2f71f672dd1a909464899bc3f555010a94efaee46fb5b13520cf42d2d3747704b3ca091ae404532905ad218394d60f43044a3f8dc2450fd10e6f37da63170d08fe09c1f48894685d0c36768bf6c4b2fc8b04234beab208de6235108b5491e9cd9cc8110e9388c394c723e58d5a5f07adc7948eeee1454870f79e468113a0ae3c9f923ce1730f26a9cc6fa8d916f968ce37caa3a9605f998252308a718519a65aa7d789d1a55ae532ac0fa29027261fa3756958d49bffa71c2a55c34325fbb7319dad7183cb9d05191c8334d48143c8594a6682444c043bf255806407d7bd9ebd7cce934c347113f76166c9ad311355e18d5508aa6a62f0fdc0956b79b78a534ec07128d34a9f504e7db6d73d2ef9eab8f324a15b6cc05f9a77aa984aaa372c024345905884708abe4be365e97deb0f14c26273a4127fef54db9a98847e36f301e4723252a59a404aeac1a81c05eed7711d7a269da82e5dea1c8fda9499eb92e2f7e0d82c4ac42666dd3231ca816260ef97e6c77afb39c4461c4f9e8cf0b40851b485d0092ef425bb0c8ca9d1cf26c93e2c0d07b0d57710a414c1c1579a9c82506a98d0c4b2fa859853bb3b534d3885a59cb873a8bf27e6cee33467d1cedf78fbfa43154d12e395013a42cd5bb5f24b2576242637fe4cc1a7c56ca618d1ad4146681047d786dda137ab331583e75bc8d8fbb8d2cb76183abf93b3cd6295efa26c7ae0e9d2229f32de458f8bc3597a4d936870883689fb84828bb8655052fd792f5c6745a955a05e694ed46d6673e04515424b5ad5232d28b43de85bc90722c3f78c7727157dc9f33891ad1c9a1ea490d517e40d27594fe688a91f89c350553af6e313ed03b838b2c273b853dfe99ae627c296d547e20bf957262015053ef86724b9a0f1ab7f4e52d9f34dc32362f0071cabe413925e3ec5342a34571cf8cc3fc747ee0180554dd42cea9b5dc81c4d890d649de4cb86bbc8e7dd64469ff536f6227dbdb7172182ccbdf2d8c1b230c68d40808931f6926b648caf70c3e0fc543eeab7a315a93714e69e177e45bd023a6b89011bb9b8272050036825b4aa9d9da660b0858a78265b5ad6cf4653f488a58327c5c3c575d1c9ab6d2418d2b1cf00abeb40da0443c39f149115c08cf6942b56b395eeab91ad91a2a3f9a2dc451402adb1d3d5878f4637149a1b07858cec5d04415c851191886ec7c3ce0d26d42471f3514630b757b6b98e544f704ca8cd4b0e3e1b946f59c407c32a7d0bf30e07059d297d62ff69c86cba353a9c1982e04e0d29872d45142b6ea33e648bc2316a55f1eb9ede36c93c9e89a005d2405cfbc04d4d316e8ba9aea337e0bcc52ff7a3bf2080fe4cba3f8fad22a62a1f3ec7f266269e193538a250f5c8e8fd8165b276492831d6608260eab816611949529307b5926ae7cf63fb2057c90b6fe8c5d049849ad611e1d06ca2acb8a3cea378f1d323334329242e39a00d2a4e1b272812c401a18d6aeb10d86966dad5bff16498b40a26121f7701f2809536da0dbbe95e93e561bec3edb6326f4ec94de70f26b3a0dceb996aa6a10da780f6b85de86a1b7c9ec97f3236574420cb4d1d5349d0804e72055bd1de7741534b4c1a0ca4c09fa6367a6aa5613dc4fa2271020eea7266fe4c2aef64c8382286f120e82d966510b5b44599a0be42c2ee1ea734eb8115d0e5fb2b19cf9c059009232722cf8f95a0b236c720611e7233d26175ab9910a5098289d6e317c394ac3b78f448c63f146db0599ad04f1ad0a7f0a3cfbc26c0b4c8b27d55c415ea02d0afbffc409560664b6f477cda58e94fb938f484b396bda0e22dd291ff6406ad57287b94961805337e38d955a100d04b4fbc6ccb1d16ece958e9414222069ce1a343cdf37a5673e250ece2f4edb52520491767235e585378fb98ff6e72ca8d95ed52bf5231639ba9c441574d9c1ef52ec7590267b60eb1ece2c10fb69f42f7bc291dcc387126360b9f80ea5d5625d6123ad067dc51da999b54cafcfa004940f2eb569cd66ab4db2f86799c0dfec4fc578e69ab9b4bffa323417dba05921ec24fdb31a5e2654202554a52d95c714a76f3bc49877766a30c3862ebb064d2c4c068364ba59be2b79c1ebc1f2fa34456173d5d08e5be3ee4efc204bbcd83120d842efc1693e23447f9022f1eb468f4a25ca34f7f295ff212e5cd520bac84be48e492fe5c70e54188b6b544914e53804c2e362d044b11bea546cd25e46f676ee639729c358545c8ae7caf6f9201831892890ddc6b6a2f0cc3a916fa168f5ddcbd191040a0e06283372e23b28023d58054aaea488a1b6310d4ec9d8cf7849a66c04d3eced4834082ed26c4b0e4628d117a63d0159fe8a1e8728acebfa9b6fc6cdd37d892d01741ea1dc3e82f3a3cbbcdee0f83623a2fdabd69eb9ed063553578a565f9ff1f6063e93459ce9fe0373937c8660660967ec335bf1282a3bc68252e4fb1c846f785a1841b63abee99561b0a3402856258bcb79acd29f30d083a1f181c9e39b44e39dddbd549f087c8f15733d050571d1abdc8cdb55dc9e81a49ce2880a7ecac62965c2f81b8867f88c2dcf5ccbb18755fc21c8e522dc047ce78317b53e0da61a60893e7fdc9b48d8f7f4fa679c6e1634005316c99634551ecf7d599029559ad8c67aac47d39f476319359b6c60cd2494535940940d800518512234987020202b42ea18b26085ad6565d359b470b8ceb2b9fa0677fd68fbe02369483be6c0713d38363086c54ebaba29ea4b181fd80f00a03659a3d86bf812e98af864b83ece6218c513e5913bfe027a0f1547dd42d52f18726729b114c8faf96c68c2f749f243cceefe96bbaa2138e19be5b0451fc98aed3e78c1db6c876db9366545b36fdebff2f176c75fcb07ca90638d414641c936fd975cd8ef89b6e31ce8365f6102b88c2fd230ad01aa82cc176bb08af74643633ea0cff2bca1b723ffda591b634e1541afbb4d41a60d9ef6771cc8782813de357643778c7cfce704b12914d3aa8b2f7f7223979559b82540645ec87f5a5d4c8c6ec59cdaa3a8c0012c651929b68fb2eba3a771cb0061ca19fd8a27f77bd3f164dc5dd56c1f33e3f35cdbc1bd4b997c26071684ed41f4621bf854f270ccc38727e029036b1734f023b007b51da924e21d07c869cb861493fb50419043135cc76f184ad261af690b764b217b191ac92f1d6421a03996fc230e22cb840efff8a3f0cdeb752742a7a4bda8a768b92ecf4ccbff0ce054005e5f2a397615453ee99280bd9ec815814cd13d1de8eee4a0e533bf3c3c2aa174d987ba57af65bdc0c70b1f78632d22d62be6484f6a4faca67cb6bcbe57e1852d7a8b4d84b07e9a44b974a10d28671fe1d7dd2198699d915bc458c1d25400cb2c8478761a24661ad81b5ddb5cffffed72f73ac9dc47e7d3fe252476f230beb8630ba14c2efbc1e4da3de5af0d6c8c93a804deb19d1540650422ee51ed", @typed={0x8, 0x1b, @u32=0x2}]}, @nested={0x144, 0x4a, [@typed={0x8, 0x8d, @fd=r0}, @generic="0a5e9709584b7415eaceb93576475d774c8b2ce51d84d901633387095a30fc33e75cce704aa5d5ebd2e87ce9176a989ea291dc46776b076ace7136dc27fd713b75fd62cea7f4c088913dd0ec0158b0b8c0f97049b431dacd840c4bab46d0845a507f4e4c4c332fcb2675154c32a366dbb63dd38026bf725c07b20ad80e76fae9ccf764c7e3341a95cb7006a4fb3619bcf2b4e84583eaf631092379679384f0c7ebe9a16e8525aae3d325fa56582e2cf054e368955f5184c71c91a88cae8dac0098f4c451348dd1df1a41896216c1227a591a2fa12788", @generic="f07e946a5bad32a146fb55ce658d6978e257649565a859aeef6cbd04fc2beee95be240a012b338d347d8779061d13f7a13f30a", @typed={0x10, 0x3e, @str='/dev/vcsa#\x00'}, @typed={0x1c, 0x41, @binary="a52a70457c55d454986467309d1b67cb502b4c0c632185"}]}, @generic="ff9c58da9304add59b6adcd32d559817052b68886f652012d55d126aac745ad8b56b2437cc53f4c18a4474ee294b7c64f5183233c35bf69a6ec74c499456937a6dd3ddfcd8d94cf64babcd7255aba3d8c3849e3c9171b40d6f4ced4964183c06b0db8b1a1a51de21bb9830341b9ba436055b997113bc26bf5673094ac907e5379282d0", @typed={0x8, 0x5d, @fd=r0}, @generic="af822c7e3c13bb843a785bd0fe47b9f7474ff5e567b351a5225bdfa8928cbdd27b8f097f6893be6bf7e92dd1a32ab89530d4de276686e16a16040a46373f3f9fff26300d11b5be7835d0659e89e53ad1f6ca2021178ebe30574f678b4cc8c8697cbc62b7c8423fb0aa8078c3a5868044e1a68272a638828f698e8453cb8aa1dfb77a72a63647278086a239c9a33aa3760272e7066f795d4972fd3965aad11f13e371c2f93912466445d721b055d795f24c1a9092cc404044b31e321140abe40671808eb520c46252159ce38c87cbd535bf133af33f5c012fd47f8634", @typed={0x8, 0x14, @uid=r8}]}, 0x1550}, {&(0x7f0000002cc0)={0x24, 0x21, 0x8, 0x70bd26, 0x25dfdbfc, "", [@typed={0x8, 0x3b, @u32=0x6}, @typed={0xc, 0x1, @u64=0x8}]}, 0x24}], 0xa, &(0x7f0000002f00)=[@cred={0x20, 0x1, 0x2, r9, r10, r11}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}], 0x58, 0x4040000}, 0x0) lseek(r0, 0x0, 0x0) 04:06:43 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:43 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000000)=""/27, 0xffffffffffffffe3}], 0x1, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) 04:06:43 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2398.352062][T23396] gfs2: can't find protocol [ 2398.352062][T23396] ock_nolock 04:06:43 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x181a81) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r1, 0x0, 0x0) signalfd(r1, &(0x7f0000000040)={0x4}, 0x8) 04:06:43 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fE5', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705fd9010a8b69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000340)={0x18, 0x1, 0x0, {0xf}}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000000c0)=0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000380)={{0xffffffffffffffff, 0x3, 0x34c, 0x2, 0x2}, 0x101, 0x63ac, 'id1\x00', 'timer1\x00', 0x0, 0xfffffffffffffff8, 0x81, 0x1000, 0xee}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f00000001c0)={{0x5, 0x3, 0x1, 0x1000, '\x00', 0x9}, 0x3, 0x10000000, 0x3b3, r2, 0x2, 0x99, 'syz0\x00', &(0x7f0000000180)=['/dev/fuse\x00', '[\'userselinux\x00'], 0x18, [], [0x0, 0x2, 0x9, 0x5]}) socket$bt_hidp(0x1f, 0x3, 0x6) 04:06:43 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x17, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:43 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:43 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x400003) fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@ng={0x4, 0x11, "7d594c5069341372dfc6f8b686"}, 0xf, 0x2) socket$nl_generic(0x10, 0x3, 0x10) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000000)={0x3, @pix_mp={0x3, 0x8001, 0x42323151, 0x9, 0x0, [{0x0, 0xa8c4}, {0x0, 0x2}, {0xffff, 0x8ac}, {0x2, 0xff}, {0x4, 0x8000}, {0x1, 0x7f}, {0x2}, {0x3ff, 0x1}], 0x5, 0x1ff, 0x7, 0x0, 0x7}}) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0xe}], 0x1, 0x0) [ 2398.541806][T23581] gfs2: can't find protocol [ 2398.541806][T23581] ock_nolock 04:06:43 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x2, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="040bf3c287b9330000000000000009ba2b94a86f4c2a76c19b73c543352757ee2e9eb4"], 0x10, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e20, @local}}, 0x0, 0x20, 0x8001, 0x9, 0x4}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r1, 0xb43, 0xd2c, 0x8}, 0x10) 04:06:43 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:43 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000340)) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x44000) ioctl$RTC_UIE_ON(r2, 0x7003) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f00000000c0)=0x3, 0x4) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000240)={'erspan0\x00'}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$security_smack_transmute(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:43 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xf8, 0x8000000000000002) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000001c0)={0x7, &(0x7f0000000180)=[{0x4, 0x1, 0x3f, 0x8}, {0xffffffffffffffe0, 0x3f, 0x1f, 0x6}, {0x101, 0xffffffff, 0x1, 0x4}, {0x3, 0x2, 0x1, 0x9}, {0x0, 0x9c7e, 0x2, 0x100000000}, {0x2, 0x9, 0x5, 0x3f9}, {0x3, 0x34be0cf6, 0x8000, 0x7}]}) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000000)=0x100000001, 0x8) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x3, 0x0, 0x10001, 0x709a7220}) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000140)={'irlan0\x00', 0xffffffff}) ioctl$sock_netdev_private(r0, 0x89f6, &(0x7f0000002340)="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") ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000100)={0x19fc, r2}) 04:06:43 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2398.651853][T23581] gfs2: can't find protocol [ 2398.651853][T23581] ock_nolock 04:06:43 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x18, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:43 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), 0x42, 0x0, &(0x7f00000000c0)="9486ad00abcc9bafef4709897ce447e7583a08bae1765bdc32f19fe396ceeeb5aa5af25e354b41db259f6a7ea1a7eac07b2f8f83966d0848d8e76b036861ea3afbf3"}) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000080)={0x30, ""/48}) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:43 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:43 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2398.874541][T23655] gfs2: can't find protocol [ 2398.874541][T23655] ock_nolock 04:06:43 executing program 1: socketpair(0x2, 0xe, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_PROG_GET_NEXT_ID(0x13, 0x0, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000080)={@default, @default, 0x2, 0x56}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r2, 0x0, 0x0) ioctl$KDMKTONE(r2, 0x4b30, 0x40) 04:06:43 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2399.005939][T23655] gfs2: can't find protocol [ 2399.005939][T23655] ock_nolock 04:06:43 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x0, 0x7, [{r0, 0x0, 0x2000, 0xfffffffff0008000}, {r0, 0x0, 0x100000000, 0x3000}, {r0, 0x0, 0xfffffffffffff000, 0x8000}, {r0, 0x0, 0x18000, 0xfffffffffffff000}, {r0, 0x0, 0xfffffffff0000000, 0xfffffffffffff000}, {r0, 0x0, 0x100000000, 0xfffffffff0000000}, {r0, 0x0, 0x1000, 0x100000000}]}) 04:06:43 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:43 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x19, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:43 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18}, 0x18) 04:06:43 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:43 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2399.179728][T23774] gfs2: can't find protocol [ 2399.179728][T23774] ock_nolock 04:06:43 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:44 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x4) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8e83db7c40dd54e9355a4b60a74a5ac0b5a4e15a9c62e54631bf1088763c7eb40fad359f8652ebe37450162c4f1ba7bc10f7e3e7110cd28ed7e1009acf591fb8db5ea4c094913e48f223460ad6d55ee48c92494a6924ae3f1c3259bd6ba9a402d53080b9af1fca73a53a99f4a368b1a3309cc3e823be4bce38449398e71445b4cc4b3d66243f0d1ea54f3dd306ced50ee9587f2b9d3616c473f021e11fc5254f2d20c010b1539ec573f22d61b2d6bf11d04a7bc73df8651f12bbd6ec", 0xbc) [ 2399.252696][T23774] gfs2: can't find protocol [ 2399.252696][T23774] ock_nolock 04:06:44 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1a, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:44 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:44 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7, 0x10001) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r1, 0x0, 0x0) 04:06:44 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8, 0x4a00) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x5, 0x3, 0x388a, 'queue1\x00', 0x5}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:44 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:44 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x2) r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640), 0x0, 0x0) [ 2399.459986][T23995] gfs2: can't find protocol [ 2399.459986][T23995] ock_nolock 04:06:44 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:44 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/tcp6\x00') ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000040)={0x4, "6a88a51db79a7a0cd87b7847825f115f222a460fdcbe996e0c4b0b956d0897d6", 0x3, 0x0, 0x2, 0x5, 0x10, 0x3, 0x7f, 0x2}) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:44 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:44 executing program 1: fallocate(0xffffffffffffffff, 0x4, 0x4, 0x7f) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@md5={0x1, "b23bb5e15f0d95b64703f8b1a535e9d4"}, 0x11, 0x1) lseek(r0, 0x0, 0x2) [ 2399.613310][T23995] gfs2: can't find protocol [ 2399.613310][T23995] ock_nolock 04:06:44 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:44 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:44 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1b, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:44 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x2d, 0x3, 0x0, {0x2, 0xc, 0x0, '/dev/media#\x00'}}, 0x2d) 04:06:44 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f00000001c0)=0x2, 0x8) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x20400, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000000c0)=0x20000001d) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18}, 0x18) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000340)=""/219) 04:06:44 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:44 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x56a, 0x0) ioctl$void(r0, 0x5451) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x4c35}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={r1}, &(0x7f0000000100)=0x8) lseek(r0, 0x0, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000140)={0x0, @bt={0x1b, 0x1000, 0x1, 0x0, 0xffff, 0x3ff, 0x9, 0xffff, 0x0, 0x5, 0x5, 0xffff, 0x0, 0x0, 0x10, 0x17}}) [ 2399.822228][T24314] gfs2: can't find protocol [ 2399.822228][T24314] ock_nolock 04:06:44 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:44 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0xcd) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) r2 = fcntl$getown(r1, 0x9) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) setpgid(r2, r3) 04:06:44 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2399.921269][T24314] gfs2: can't find protocol [ 2399.921269][T24314] ock_nolock 04:06:44 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) r2 = getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = geteuid() r6 = getgid() fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000400)={{{@in=@broadcast, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000680)=0x0, &(0x7f00000006c0), &(0x7f0000000700)) r13 = geteuid() getgroups(0x6, &(0x7f0000000740)=[0xffffffffffffffff, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0040000daffffff0100000000000000030000000000000002000000000000008200000000000000090000000000000000000000000000000300000000000000fe000000000000000104000000000000010001000000000002000000000000000300000000000000e40000000500000000000000b271000005000000", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="050000000300000000000000030000000000000096ff00000000000012000000000000002e766d6e6574316367726f7570776c616e31000000000000010000000000000002000000000000000000008000000000ff0000000000000005000000ff07000006000000000000000002000000000000ff07000000000000060000000000000008000000000000007f0000000000000003000000ffffffff050000000300000006000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="050000000800000000000000040000000000000081000000000000000c000000000200002f6465762f6d6564696123000000000004000000000000000000000000000000c46b00000000000050070000000000000400000000ffffff0600000000000000ffffff7f000000000000000000000000c3050000000000004d000000000000000800000000000000010100000800000000080000fcffffff00000100", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="c70000000700000000000000060000000000000001800000000000000c000000000000002f6465762f6d6564696123000000000006000000000000000000000000000000060000000000000005000000000000000000008001ffffff0600000000000000ad0000000000000020000000000000000000010000000000010000000000000006000000000000000400000001010000070000000700000003000000", @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="010000000100000000000000010000000000000005000000000000000c000000c60400002f6465762f6d6564696123000000000006000000000000000000000000000000ff0f000000000000ff7f00000000000001feffff3f0000000600000000000000062000000000000001fffffffffeffffff070000000000009c000000000000001b4a000000000000030000003f00000500000008000000", @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="1f0000000300000000000000040000000000000000402d00000000000c000000000000002f6465762f6d65646961230000000000040000000000000000000000000000000600000000000000ff010000000000000400000000000000030000000000000004000000000000000200000000000000060000000000000003000000000000000500000000000000ff0f0000000000001f0000000500000045070000", @ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="0500000052000000000000000600000000000000ea0a0000000000000c000000440700002f6465762f6d65646961230000000000000000000000000000000000000000003f000000000000000200000000000000130000000100010005000000000000000000000000000000a308000000000000000000000000000005000000000000008700000000000000020000000080000025faffff06000000ff0f0000", @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB="000800000500000000000000050000000000000000000080000000000a000000080000002b6c6f74727573746564000000000000"], 0x4b0) preadv(r0, &(0x7f0000000040), 0x0, 0x0) 04:06:44 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1c, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:44 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x6, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r1, 0x0, 0x0) 04:06:44 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:44 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x8000000, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:44 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x840, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000240)={0x0, 0x1, 0x1f, 0x3, 0x5}) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f00000000c0)="89747e2a17d6db9c7a8183ec26ad0414d32a8e6cdc078f175275d3c2a69e7aebc639b216e161cb8a24d1ce252c6646b608acf59f73ad4aec529b1517b75178a703e280e98e00d9370fa5cb3b746148210d4fc5036bd17aa7a10dda10804d13276c64a9cf6475edeb9aa4ce841a991ba39968a5062a392e702e4d4634083eefa033fdb4ea1b1564689e4c4e4ba271fcae27606afe81d568d70a909fa7f3db0603490866780b") r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x44000, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000180)={0xab8d, 0x1}) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, "5a99e9652469a0e04e2390818e5371b3ebf3fd"}) r3 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r3, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000200)) 04:06:44 executing program 0: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2400.175413][T24446] gfs2: can't find protocol [ 2400.175413][T24446] ock_nolock 04:06:45 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:45 executing program 0: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2400.264414][T24446] gfs2: can't find protocol [ 2400.264414][T24446] ock_nolock 04:06:45 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={0x0, 0x6}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={r1, 0x2}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x2}, 0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x4}, 0x8) 04:06:45 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1d, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:45 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000180)=0xc) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r0, r1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18}, 0x18) 04:06:45 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f0000000000)=0x5, 0x4) 04:06:45 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:45 executing program 0: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2400.438340][T24666] gfs2: can't find protocol [ 2400.438340][T24666] ock_nolock 04:06:45 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) ftruncate(r0, 0x0) lseek(r0, 0x0, 0x0) 04:06:45 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726e3030303030303030308430303030303034303030302cf0ffffff843917a7b9dfcd0cede88dbb1e015cf13a561c343088d58ebd3853ee5aa25f540359b3dbd46d05937e6ad427ebb71921fe3d7a58a8f4b1078a9592fcd27f3ac2110acfd0d1c127ae8a4bbc7b3217a1bb8ce5b83cb55689d8f46e58d434474b146ca7d971a94d3f29652d7a617a246ae220bcda4599da4e97b775e6ee5de81f8b8fed80d90bb328d85d5aa0a9a0608d6d34ece86d070ee28866a4c3bcd85b1b27", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:45 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x40040) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000040)=""/225, 0xe1}, {&(0x7f0000000200)=""/159, 0x9f}, {&(0x7f0000000340)=""/134, 0x86}, {&(0x7f0000000400)=""/226, 0xe2}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000140)=""/115, 0x73}, {&(0x7f0000001500)=""/156, 0x9c}], 0x7, 0x0) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000001680)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, @link_local}]}) preadv(r1, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:45 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:45 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2400.539464][T24666] gfs2: can't find protocol [ 2400.539464][T24666] ock_nolock 04:06:45 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1e, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:45 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.posix_acl_access\x00', &(0x7f00000000c0)=""/126, 0x7e) lseek(r0, 0x0, 0x0) 04:06:45 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:45 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0xfff, 0x0, 0x0, 0x5aa}) bind$x25(r0, &(0x7f0000000080)={0x9, @remote={[], 0x3}}, 0x12) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000040)={0x200, r1}) 04:06:45 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="000000193bfc874370fee6da2974f0565b85123ef747e821add4301b91764bcf39babccd2ee95636833f7561a950420fc129167f4dc1d7c8caadb092b44ccc9c47c798657cabdb1e891ba79a6fb12bb13763ed4d7ab386137b5b324911d7e0ab8514253be6ca3820b292aac3205e89659cf85ab74b86ce62", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030eb13d7258044c12663cf303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="b2b86737ff56154b"]) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x13, 0x1, 0x0, {0x81}}, 0x1f9) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x3) 04:06:45 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2400.772276][T24899] gfs2: can't find protocol [ 2400.772276][T24899] ock_nolock [ 2400.837075][T24899] gfs2: can't find protocol [ 2400.837075][T24899] ock_nolock 04:06:45 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:45 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40100, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000040)={0x7, "0aeb765b18dc6c651dd83bc003d21c94d003e8778530d2b832800324df7d63b5", 0x3, 0x1}) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x4, 0x0) preadv(r1, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000200)) r3 = getgid() fchownat(r1, &(0x7f0000000080)='./file0\x00', r2, r3, 0x800) 04:06:45 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x21, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:45 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x1000004) 04:06:45 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:45 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:45 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) fcntl$getflags(r0, 0x408) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r3, 0x3305, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'bridge0\x00', 0x7c00}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) [ 2401.010817][T25118] gfs2: can't find protocol [ 2401.010817][T25118] ock_nolock 04:06:45 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/27, 0x1b}], 0x10000000000001e4, 0x0) 04:06:45 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x4001f, 0x400000) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000000)=0x2) lseek(r0, 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 04:06:45 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2401.088126][T25118] gfs2: can't find protocol [ 2401.088126][T25118] ock_nolock 04:06:45 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) 04:06:45 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x22, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:45 executing program 2: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000100)=[r0, r0, r0, r0, r0, r0, r0], 0x7) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000140)={0x5, 0x200, 0x0, 0x10001, 0x800000, 0x3}) munlockall() ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f00000000c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r1}) 04:06:45 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:46 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="357b1eb950fe3a8f402c00"]) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:46 executing program 2: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) fcntl$notify(r0, 0x402, 0x12) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x84000) preadv(r1, &(0x7f0000001640), 0x0, 0x2) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000040)) [ 2401.328491][T25303] gfs2: can't find protocol [ 2401.328491][T25303] ock_nolock 04:06:46 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000040)={r0, 0x10001, 0x0, "c6a4f496083be1b5f6afc1b9de543218985d605d6361c70a895d2bb395c2224e31f62ec765389177df50e917d6a6669403c842675ee2f402e9c2d1ca36563da0d4348c412b432ab62d4a83868279b9ca813d5dae2b35ae4fac35ea6fdfa72b41e19318e5e911446cb45b3b9dbb1866e01359"}) lseek(r0, 0x0, 0x0) 04:06:46 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) 04:06:46 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2401.444624][T25303] gfs2: can't find protocol [ 2401.444624][T25303] ock_nolock 04:06:46 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) fcntl$getflags(r0, 0x408) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r3, 0x3305, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'bridge0\x00', 0x7c00}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) 04:06:46 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x23, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:46 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) 04:06:46 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:46 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x10000, &(0x7f0000000040)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) [ 2401.658615][T25514] gfs2: can't find protocol [ 2401.658615][T25514] ock_nolock 04:06:46 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) dup2(r0, r1) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r2, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000040)={0x1, 0x7, 0x40, 0x9, 0x6}) 04:06:46 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x40040) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000040)=""/225, 0xe1}, {&(0x7f0000000200)=""/159, 0x9f}, {&(0x7f0000000340)=""/134, 0x86}, {&(0x7f0000000400)=""/226, 0xe2}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000140)=""/115, 0x73}, {&(0x7f0000001500)=""/156, 0x9c}], 0x7, 0x0) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000001680)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, @link_local}]}) preadv(r1, &(0x7f0000001640)=[{&(0x7f0000000300)=""/27, 0x1b}], 0x1, 0x0) 04:06:46 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) fcntl$getflags(r0, 0x408) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r3, 0x3305, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'bridge0\x00', 0x7c00}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) 04:06:46 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2401.764633][T25514] gfs2: can't find protocol [ 2401.764633][T25514] ock_nolock 04:06:46 executing program 3 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:46 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:46 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:46 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f00000001c0)=0x7fffffff, 0x4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='f1=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000200)=0x6, 0x4) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:46 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) write$UHID_CREATE(r0, &(0x7f0000000180)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000080)=""/235, 0xeb, 0x3, 0x8000, 0x40, 0x8, 0x8}, 0x120) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f00000003c0)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x0, 0x3, 0x694, 0x100000000, 0x1f, 0x4, 0x2, {0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x3f, 0x80000000, 0xc2b, 0x0, 0x7}}, &(0x7f0000000400)=0xb0) setsockopt$packet_int(r0, 0x107, 0x1b, &(0x7f0000000480)=0x3, 0x4) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000440)={r1, 0x3, 0x30}, 0xc) 04:06:46 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) fcntl$getflags(r0, 0x408) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r3, 0x3305, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'bridge0\x00', 0x7c00}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) 04:06:46 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:46 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2402.026162][T25780] gfs2: can't find protocol [ 2402.026162][T25780] ock_nolock 04:06:46 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000040)="d779dbd3eba14e59e13dd3e5a4658aa3b5fd0ab0e97701891664d2354743e94b2f96a9d96c55c85a8242dcf2f7357bbf7c4995dc83aea78f0c67a1ef6b0df24c5642219c059c8a80489d00a18eac86", 0x4f) lseek(r0, 0x0, 0x0) [ 2402.125146][T25780] gfs2: can't find protocol [ 2402.125146][T25780] ock_nolock 04:06:46 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0xf, 0x4}, 0x18) 04:06:46 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:47 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x82002, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000180)=0x14, 0x800) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x0, r1, 0x1, 0x3, 0x6, @dev={[], 0x1d}}, 0x14) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rcotMode=000000000000000_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18}, 0x18) 04:06:47 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2402.288265][T25901] gfs2: can't find protocol [ 2402.288265][T25901] ock_nolock 04:06:47 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) fcntl$getflags(r0, 0x408) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r3, 0x3305, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'bridge0\x00', 0x7c00}) 04:06:47 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x20000018, 0x4}, 0x18) 04:06:47 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2402.371972][T25901] gfs2: can't find protocol [ 2402.371972][T25901] ock_nolock 04:06:47 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1000000000000003, 0x80800) lseek(r0, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7f, 0x181400) 04:06:47 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c00006f746d6f64657930303030303030303030fdaf032935f490657f0493395adc7a32791ed2303030343034f040b7d8d9ce418d589a90fe68b48e34b9ce29779d8830", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:47 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x60, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:47 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2402.560711][T26119] gfs2: can't find protocol [ 2402.560711][T26119] ock_nolock 04:06:47 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) fcntl$getflags(r0, 0x408) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r2, 0x3305, 0x0) 04:06:47 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='}\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000080)={0xfffffffffffffeb8}, 0x311) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4401, 0x0) inotify_init1(0x0) setsockopt(r1, 0xfffffffffffffffb, 0x200000000000, &(0x7f0000000040)="a1b3a081c0e5629b6db1b0ddc2c8826ed05bbdec9d9f344c55c8", 0x1a) 04:06:47 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) ioctl$TIOCMSET(r0, 0x5418, &(0x7f00000000c0)=0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x20, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) lseek(r1, 0x0, 0x7) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) lseek(r1, 0xffffffffffffffff, 0x2) [ 2402.640239][T26119] gfs2: can't find protocol [ 2402.640239][T26119] ock_nolock 04:06:47 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x2}, 0x18) 04:06:47 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:47 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:47 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) fcntl$getflags(r0, 0x408) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:47 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:47 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x8, 0xfffffffffffffff7, 0x8, 0x6, 0x7, 0x9}) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r1, 0x0, 0x1) 04:06:47 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2402.883328][T26645] gfs2: can't find protocol [ 2402.883328][T26645] ock_nolock 04:06:47 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2402.996264][T26645] gfs2: can't find protocol [ 2402.996264][T26645] ock_nolock 04:06:47 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) fcntl$getflags(r0, 0x408) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:47 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:47 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:47 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5, 0x4000) getpeername$netlink(r1, &(0x7f00000000c0), &(0x7f0000000180)=0xc) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:47 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x5}, 0x18) 04:06:48 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2403.214027][T27020] gfs2: can't find protocol [ 2403.214027][T27020] ock_nolock 04:06:48 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) fcntl$getflags(r0, 0x408) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:48 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x24, 0x2) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000000)) lseek(r0, 0x0, 0x0) [ 2403.291959][T27020] gfs2: can't find protocol [ 2403.291959][T27020] ock_nolock 04:06:48 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x70, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:48 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:48 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) tee(r0, r0, 0x9, 0x9) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x70, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1800}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions='default_permissions'}], [{@smackfsroot={'smackfsroot', 0x3d, 'user_id'}}, {@measure='measure'}, {@obj_user={'obj_user', 0x3d, 'rootmode'}}]}}) 04:06:48 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:06:48 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) fcntl$getflags(r0, 0x408) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:48 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8000000000020, 0xffffffffffffffff) lseek(r0, 0x0, 0x0) write(r0, &(0x7f0000000080)="90d33788de86d88c17287de33ead423dc66ddc0602459ecb5b9c4a451de47e661ed151b2ba3b52bd106a94a7d4667589ad1432f1c692a79bf04c5bfce8f9d07c3cee8a2fbe1f6089436a9734a8b517bb39d54e21620b77f4b831097091955567fbe6319791e0fef52285aa69ea2498834b4c88d15991098d70af17f773e71f8dccd83eb5", 0x84) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x0, @dev={[], 0x28}, 'bpq0\x00'}}) ioctl$SIOCGETLINKNAME(r0, 0x89e0, 0x0) [ 2403.512782][T27339] gfs2: can't find protocol [ 2403.512782][T27339] ock_nolock 04:06:48 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2403.580350][T27339] gfs2: can't find protocol [ 2403.580350][T27339] ock_nolock 04:06:48 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="070038d99cf4ea5b18cf31c106dd0c95d496", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) r1 = fcntl$dupfd(r0, 0x406, r0) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x3, @loopback}}, 0x1e) 04:06:48 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:48 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:48 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) fcntl$getflags(r0, 0x408) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:48 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0xf) 04:06:48 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x10602, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x8, 0x2, 0x800a, 0x10001, 0x0, 0x1, 0x5, 0x1000, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, 0x2}, &(0x7f0000000180)=0x8) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000080)) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xffffffffffffffff, 0x0) lseek(r2, 0x0, 0x0) 04:06:48 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2403.845923][T27591] gfs2: can't find protocol [ 2403.845923][T27591] ock_nolock 04:06:48 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) fcntl$getflags(r0, 0x408) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:48 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x103040, 0x0) bind$netrom(r0, &(0x7f0000000080)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x6}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x6) openat$cgroup_subtree(r0, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x40) [ 2403.922613][T27591] gfs2: can't find protocol [ 2403.922613][T27591] ock_nolock 04:06:48 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:48 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x20000018) 04:06:48 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:48 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) 04:06:48 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) fcntl$getflags(r0, 0x408) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:48 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101000) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x1}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r1, 0x2, 0x9, 0x5, 0x1, 0x3ff}, &(0x7f0000000140)=0x14) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r2, 0x0, 0x0) [ 2404.141384][T27926] gfs2: can't find protocol [ 2404.141384][T27926] ock_nolock 04:06:48 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) sigaltstack(&(0x7f0000bbd000/0x4000)=nil, &(0x7f00000002c0)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/raw6\x00') ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000280)={0x4, 0xf1, 0x25}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000940)='numa_maps\x00') mlock2(&(0x7f0000bbd000/0x1000)=nil, 0x1000, 0x0) sendfile(r2, r2, &(0x7f0000000000)=0x15004400, 0xffff) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x60e02) ioctl$TIOCSSERIAL(r3, 0x541f, &(0x7f0000000200)={0x100000000, 0x7fffffff, 0x0, 0x1331, 0x1ac46929, 0x4, 0x4, 0x400, 0xcbe5, 0x8, 0x2, 0xfff, 0xfffffffffffffff9, 0xffffffff00000001, &(0x7f0000000180)=""/68, 0x18c, 0x7}) 04:06:48 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) fcntl$getflags(r0, 0x408) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:49 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) [ 2404.228373][T27926] gfs2: can't find protocol [ 2404.228373][T27926] ock_nolock 04:06:49 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xa0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:49 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:49 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10000, 0x0) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040)=0x200, 0x4) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000180)={0x0, @speck128, 0x2, "369590bb752948d0"}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000140)) lseek(r0, 0x0, 0x87) signalfd4(r0, &(0x7f0000000080)={0x8}, 0x8, 0x80800) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x0, @link_local}, 0x60, {0x2, 0x4e22, @local}}) 04:06:49 executing program 2: syz_init_net_socket$llc(0x1a, 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:49 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) [ 2404.509662][T28165] gfs2: can't find protocol [ 2404.509662][T28165] ock_nolock 04:06:49 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:49 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x40, @local, 0x2}}, 0x1, 0x1, 0xb9, 0x0, 0x8}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r1, 0x7, 0x5}, 0x8) lseek(r0, 0x0, 0x0) [ 2404.592033][T28165] gfs2: can't find protocol [ 2404.592033][T28165] ock_nolock 04:06:49 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xe0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:49 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:49 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) sync_file_range(r0, 0x1, 0x40, 0x1) ioctl$SIOCAX25ADDFWD(r1, 0x89ea, &(0x7f0000000180)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) symlinkat(&(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00') mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:49 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) r2 = geteuid() r3 = geteuid() syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="93865ae14ecb1bc2834b837ea7ff2ad46149c27899be6ec79d7418f8b5969b993eec12c24cf80b6bd1ca1653967219879831de5e32b8352b4193cdc3dbef9ba2c3b8d87f463f1421dd0ba1aa08e579fcc3d6b329643f054a404a601636f57bb3083d385b4dbbce023517c22c6b6441ac21880a6ff5f108b1f9228259ddbf8a74003fdf469ccd0151fd843bc63a091c39032da563698713fa63d042083c7b6273af4cf1f8799f14f64492980aab28aaa636", 0xb1, 0xffffffff00000000}], 0x100000, &(0x7f0000000440)={[{@filestreams='filestreams'}, {@logbufs={'logbufs'}}, {@prjquota='prjquota'}, {@grpquota='grpquota'}, {@attr2='attr2'}, {@filestreams='filestreams'}, {@sysvgroups='sysvgroups'}, {@swidth={'swidth', 0x3d, 0xff}}], [{@fowner_gt={'fowner>', r1}}, {@smackfsroot={'smackfsroot', 0x3d, '$trustedeth0'}}, {@seclabel='seclabel'}, {@obj_role={'obj_role', 0x3d, 'cgroupB^system.+'}}, {@euid_gt={'euid>', r2}}, {@uid_gt={'uid>', r3}}, {@pcr={'pcr', 0x3d, 0x3d}}, {@obj_type={'obj_type', 0x3d, '#+self!/proc)'}}]}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:49 executing program 2: openat$snapshot(0xffffffffffffff9c, 0x0, 0x80000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:49 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo/4\x00') ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000080)) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r1, 0x0, 0x0) [ 2404.804661][T28440] gfs2: can't find protocol [ 2404.804661][T28440] ock_nolock 04:06:49 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x2, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000001c0), 0x4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_IOCTL(r0, &(0x7f0000000040)={0x20, 0xffffffffffffffff, 0x4, {0x9, 0x0, 0x2, 0x4efa}}, 0x20) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mISDNtimer\x00', 0x20000, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:49 executing program 2: openat$snapshot(0xffffffffffffff9c, 0x0, 0x80000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:49 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x8, 0xfffffffffffffff7, 0x8, 0x6, 0x7, 0x9}) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r1, 0x0, 0x1) [ 2404.930367][T28440] gfs2: can't find protocol [ 2404.930367][T28440] ock_nolock 04:06:49 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1da, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:49 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x1) lseek(r0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in=@local, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, &(0x7f0000000140)=0xe8) getpeername$unix(r0, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x200, 0x5, 0x40, 0xfffffffffffffffa, 0x3f}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000002c0)={r1, 0xeb, "8f9c25a8ff6b7bc02410ee9760312f4ed67ea3396385ec4163a80ab9a282c0adb0334024e0b53a69bb2f7b4354d7837a643ddb9890a2f7754cf405621b91d30152a0973331c972d10997c50a23c97a1a92648712feb625a8b292dad82a1e1514499cb3b52451baf8e2e2d0388dc2de58a5c0bd8f37b81291ca943685e1552812c919edef64aac88786d16b655b930ac9aa104c978fa556ac7b8d25e228b5dfb15e28b23b7c7102cd0e0448e91bc7f55dea844d3e281f4182cf7c32036d046e998856e3e243e047cc034d981a75fad20eefffe4b2b104aef11f5e111557b0c71b630320b0437e38934ab428"}, &(0x7f00000003c0)=0xf3) 04:06:49 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00c1a62b3efc3719ccc4223a6f639b9c478c560c83aff4976bd95c8f9791ae1255c0d400cdd745ebb0bae4020fbc0473b27c42923e164b8e03b249ce82dd974e715a0b3fa0dd0b126512b6fadd7cccde"]) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:49 executing program 0: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:49 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80, 0x0) 04:06:49 executing program 2: openat$snapshot(0xffffffffffffff9c, 0x0, 0x80000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:49 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x10c) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2405.109963][T28744] gfs2: can't find protocol [ 2405.109963][T28744] ock_nolock [ 2405.149448][T28766] sysfs: cannot create duplicate filename '/fs/gfs2/127.0.0.1' [ 2405.166762][T28766] CPU: 1 PID: 28766 Comm: syz-executor.0 Not tainted 5.1.0-rc5+ #70 [ 2405.174767][T28766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2405.184833][T28766] Call Trace: [ 2405.188154][T28766] dump_stack+0x172/0x1f0 [ 2405.192528][T28766] sysfs_warn_dup.cold+0x1c/0x31 [ 2405.197480][T28766] sysfs_create_dir_ns+0x242/0x2a0 [ 2405.202602][T28766] ? sysfs_create_mount_point+0xa0/0xa0 [ 2405.208167][T28766] kobject_add_internal.cold+0xe5/0x5d4 [ 2405.213725][T28766] kobject_init_and_add+0x101/0x160 [ 2405.218954][T28766] ? kobject_add_internal+0x380/0x380 [ 2405.218977][T28766] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2405.230602][T28766] ? vsnprintf+0x58b/0x1af0 [ 2405.230633][T28766] gfs2_sys_fs_add+0x1aa/0x470 [ 2405.230652][T28766] ? recover_store+0x160/0x160 [ 2405.230680][T28766] ? snprintf+0xbb/0xf0 [ 2405.230697][T28766] ? vsprintf+0x30/0x40 [ 2405.230717][T28766] ? set_blocksize+0x2bf/0x340 [ 2405.230739][T28766] ? memcpy+0x46/0x50 [ 2405.230762][T28766] fill_super+0x12f5/0x25c0 [ 2405.230792][T28766] ? gfs2_online_uevent+0x1f0/0x1f0 [ 2405.230810][T28766] ? snprintf+0xbb/0xf0 [ 2405.230827][T28766] ? vsprintf+0x40/0x40 [ 2405.230848][T28766] ? wait_for_completion+0x440/0x440 [ 2405.230864][T28766] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2405.230879][T28766] ? set_blocksize+0x2bf/0x340 [ 2405.230898][T28766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2405.230918][T28766] gfs2_mount+0x504/0x5de [ 2405.230938][T28766] ? fill_super+0x25c0/0x25c0 [ 2405.230975][T28766] ? kfree+0x1fa/0x230 [ 2405.230992][T28766] ? vfs_parse_fs_string+0x116/0x170 [ 2405.231007][T28766] ? vfs_parse_fs_param+0x510/0x510 [ 2405.231026][T28766] ? fill_super+0x25c0/0x25c0 [ 2405.231042][T28766] legacy_get_tree+0xf2/0x200 [ 2405.231060][T28766] vfs_get_tree+0x123/0x450 [ 2405.231076][T28766] do_mount+0x1436/0x2c40 [ 2405.231109][T28766] ? copy_mount_string+0x40/0x40 [ 2405.231129][T28766] ? _copy_from_user+0xdd/0x150 [ 2405.231148][T28766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2405.231160][T28766] ? copy_mount_options+0x280/0x3a0 04:06:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) [ 2405.231186][T28766] ksys_mount+0xdb/0x150 [ 2405.262224][T28766] __x64_sys_mount+0xbe/0x150 [ 2405.262246][T28766] do_syscall_64+0x103/0x610 [ 2405.262266][T28766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2405.262285][T28766] RIP: 0033:0x45b69a [ 2405.285542][T28766] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2405.285551][T28766] RSP: 002b:00007f4c02fd5a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2405.285566][T28766] RAX: ffffffffffffffda RBX: 00007f4c02fd5b40 RCX: 000000000045b69a [ 2405.285575][T28766] RDX: 00007f4c02fd5ae0 RSI: 00000000200003c0 RDI: 00007f4c02fd5b00 [ 2405.285584][T28766] RBP: 0000000000000000 R08: 00007f4c02fd5b40 R09: 00007f4c02fd5ae0 [ 2405.285592][T28766] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 2405.285600][T28766] R13: 00000000004c7740 R14: 00000000004dd778 R15: 00000000ffffffff [ 2405.355783][T28766] kobject_add_internal failed for 127.0.0.1 with -EEXIST, don't try to register things with the same name in the same directory. [ 2405.397203][T28766] gfs2: fsid=127.0.0.1: error -17 adding sysfs files 04:06:50 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) getresgid(&(0x7f0000000040)=0x0, &(0x7f00000000c0), &(0x7f0000000180)) r2 = syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x400, 0x0) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000580)={0xad66, 0x10001}) r3 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)={{0x4000, 0x1000, 0xb, 0x3, 0x61a, 0x4221, 0x3, 0x6, 0x1, 0x5, 0x10000, 0x8}, {0x2000, 0x0, 0xf, 0xffffffffffff0001, 0x8, 0x2, 0x0, 0x2, 0x9, 0x2, 0x800, 0x1}, {0x0, 0x1, 0x4, 0x2, 0x3f, 0x40, 0xffffffffffffffc1, 0x5, 0x80000000, 0x696c00000000000, 0x6}, {0x2, 0x1000, 0xf, 0xfffffffffffffff9, 0xffffffffffffff46, 0x75fd, 0x0, 0x1, 0x7, 0x0, 0x7, 0x400}, {0x10000, 0x100004, 0xa, 0x100000000, 0x9, 0x80000000, 0x0, 0xfffffffffffffffb, 0x9, 0x100000000, 0x3, 0x763}, {0x115001, 0x0, 0xf, 0x29, 0x1, 0x7, 0x3, 0x200, 0xfffffffffffffffc, 0x0, 0x3, 0x100}, {0x0, 0x4000, 0xe, 0x100000001, 0x401, 0x0, 0x7fffffff, 0x5, 0x5, 0x2, 0x1, 0x3}, {0x0, 0x0, 0x86574756ee3a5a88, 0x1, 0x8, 0x6, 0x76, 0x3cc, 0x3, 0x2, 0x9c5, 0x27c}, {0x16000, 0x4000}, {0x4000, 0xd002}, 0x80000008, 0x0, 0x3000, 0x60001, 0x9, 0x4000, 0x3002, [0x38, 0x0, 0x7, 0x9]}) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000400)="b68d112acee46a1ffbba0595474da85345a456cad633d3709582221de3999b91c0879d29c918f0144fc8a18f5bc2d1b885f5ebed92d4b5dd9a402a710b4c54080859dcd442b02f51f28d7366bcc98291832f6a198c39cf", 0x57) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x40000, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000bba669b023d7eccc28963d611794f5cb263a67fc04bd36cc6a281d9ba6bbea92ec20de39f0446f97657126dd84f0c59e76662d0bc11d4480046708a1777c6017e5b9e3d4d5f15bf9a929c026749cc70ef22fa269bd95d929ef195deba774350c9d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000100040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) sendto$rxrpc(r3, &(0x7f0000000480)="d1fbe03c74f1f80a7b82bc01de856ecc0ef3874f7c96843a55798368cd48db21034ce6dfb67c80b25016c10d0748715f0dd093786687e0463ab66a32da07b410a2dd72a27b4b207120b191d8912bb27507b05cfb4c", 0x55, 0x4000080, &(0x7f0000000500)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e22, 0xff8c, @empty, 0x800}}, 0x24) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000200)={0x18, 0x4}, 0x18) 04:06:50 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x800, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616e733d63702c706f72743d3078303030303030303030303030346532302c6163636573733d636c69656e742c76657273696f6e3d3970323030302c6d6d61702c636163686574616734706f7369785f61636c5f6163636573732c61707072616973652c6f626a5f747970653d636f6d6d002c6673757569643d3d7d35773963b5aa08fd9ecb9927627738732d363700662d3177363539007f632c657569643e00", @ANYRESDEC=r2, @ANYBLOB=',`uid>', @ANYRESDEC=r3, @ANYBLOB=',fscontext=root,rootcontext=unconfined_u,appraise,pcr=00000000000000000047,permit_directio,\x00']) r4 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r4, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=""/126, 0xb2}) writev(r5, &(0x7f0000000080), 0x1a6) lseek(r0, 0x0, 0x0) get_mempolicy(&(0x7f0000000280), &(0x7f0000000580), 0x4, &(0x7f0000ffd000/0x3000)=nil, 0x0) 04:06:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:06:50 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18, 0x0, 0x7, {0x4}}, 0x18) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) [ 2405.592294][T28744] gfs2: can't find protocol [ 2405.592294][T28744] ock_nolock 04:06:50 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x224, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:06:50 executing program 0 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:50 executing program 1: timer_create(0x1, &(0x7f0000000040)={0x0, 0x11, 0x1}, &(0x7f00000000c0)=0x0) timer_delete(r0) r1 = socket$caif_seqpacket(0x25, 0x5, 0x5) fsetxattr$security_selinux(r1, &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x2) socket$key(0xf, 0x3, 0x2) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000080), 0x4) lseek(r2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r2, 0x3) 04:06:50 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2405.750003][T29085] FAULT_INJECTION: forcing a failure. [ 2405.750003][T29085] name failslab, interval 1, probability 0, space 0, times 0 04:06:50 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2405.820591][T29092] gfs2: can't find protocol [ 2405.820591][T29092] ock_nolock [ 2405.825950][T29085] CPU: 1 PID: 29085 Comm: syz-executor.0 Not tainted 5.1.0-rc5+ #70 [ 2405.836247][T29085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2405.846317][T29085] Call Trace: [ 2405.849618][T29085] dump_stack+0x172/0x1f0 [ 2405.853965][T29085] should_fail.cold+0xa/0x15 [ 2405.853986][T29085] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2405.854007][T29085] ? ___might_sleep+0x163/0x280 [ 2405.854026][T29085] __should_failslab+0x121/0x190 [ 2405.854046][T29085] should_failslab+0x9/0x14 [ 2405.874279][T29085] kmem_cache_alloc_trace+0x2d1/0x760 [ 2405.874299][T29085] ? is_bpf_text_address+0xac/0x170 [ 2405.874316][T29085] ? find_held_lock+0x35/0x130 [ 2405.874336][T29085] fuse_dev_do_write+0xb07/0x24c0 [ 2405.874359][T29085] ? fuse_dev_read+0x200/0x200 [ 2405.894206][T29085] ? __lock_acquire+0x548/0x3fb0 [ 2405.894232][T29085] ? aa_file_perm+0x40b/0xeb0 [ 2405.894248][T29085] ? find_held_lock+0x35/0x130 [ 2405.894265][T29085] ? aa_file_perm+0x40b/0xeb0 [ 2405.894291][T29085] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2405.913652][T29085] ? memset+0x32/0x40 [ 2405.933307][T29085] fuse_dev_write+0x15c/0x1f0 [ 2405.933325][T29085] ? fuse_dev_splice_write+0xaf0/0xaf0 [ 2405.933342][T29085] ? aa_file_perm+0x432/0xeb0 [ 2405.933365][T29085] ? aa_path_link+0x460/0x460 [ 2405.933386][T29085] ? find_held_lock+0x35/0x130 [ 2405.958182][T29085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2405.958199][T29085] ? iov_iter_init+0xee/0x220 04:06:50 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) [ 2405.958218][T29085] new_sync_write+0x4c7/0x760 [ 2405.958238][T29085] ? default_llseek+0x2e0/0x2e0 [ 2405.958261][T29085] ? common_file_perm+0x238/0x720 [ 2405.958275][T29085] ? __fget+0x381/0x550 [ 2405.958293][T29085] ? apparmor_file_permission+0x25/0x30 [ 2405.958306][T29085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2405.958322][T29085] ? security_file_permission+0x94/0x380 [ 2405.958341][T29085] __vfs_write+0xe4/0x110 [ 2405.958360][T29085] vfs_write+0x20c/0x580 [ 2405.958378][T29085] ksys_write+0x14f/0x2d0 [ 2405.958393][T29085] ? __ia32_sys_read+0xb0/0xb0 [ 2405.958409][T29085] ? do_syscall_64+0x26/0x610 [ 2405.958424][T29085] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2405.958437][T29085] ? do_syscall_64+0x26/0x610 [ 2405.958457][T29085] __x64_sys_write+0x73/0xb0 [ 2405.958478][T29085] do_syscall_64+0x103/0x610 [ 2405.988067][T29085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2405.988081][T29085] RIP: 0033:0x458c29 [ 2405.988105][T29085] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2405.988114][T29085] RSP: 002b:00007f4c02fd5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2405.988128][T29085] RAX: ffffffffffffffda RBX: 00007f4c02fd5c90 RCX: 0000000000458c29 [ 2405.988136][T29085] RDX: 0000000000000018 RSI: 0000000020000000 RDI: 0000000000000003 [ 2405.988143][T29085] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2405.988151][T29085] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c02fd66d4 04:06:50 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) write$binfmt_elf64(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"/1990], 0x7b8) 04:06:50 executing program 0 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:50 executing program 2 (fault-call:1 fault-nth:0): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) [ 2405.988160][T29085] R13: 00000000004c8003 R14: 00000000004de408 R15: 0000000000000004 [ 2406.202340][T29092] gfs2: can't find protocol [ 2406.202340][T29092] ock_nolock 04:06:51 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000240)='{cpusetmd5sumppp0&[@nodev\x00') syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000280)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="568e48eeaa9bda70b60da54f3a0739dfd5a1432a9d908eb63bf22f6783f82870daffe394cb3327b5ff350ca2dfb99386a81bf6a98494facacb20d4793281670afd1bb97cf7f89b93898c2256d4be705cb128e82014d9facd1cbb1cebec29eb2463c3a60dc3adbf38ff882b9fc78ecc1abf4349917f61a984f02a07190468268d37cff7dd55f5fad04a48ce2ab0f9e2533b04dd4a16ca4cb794dbacc0dfa3d934b5c2df0e75ea7dc310bb6824614eda07b8c28af163b16a7389376cf0c5b56f007245b03eed149b9762463b1ccab37c8d984e054a", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) bind$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x4}, 0x18) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f00000002c0)={0x0, 0x7, 0xd7, 0x8}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000200)={0x2, 0x0, [0x0, 0x0]}) 04:06:51 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000040)={{0x0, @addr=0x100}, "f200a361e6e23014e72feed2e31437c821a0c3b9f7ff26f18fdc7bfc23d5d76c", 0x2}) lseek(r0, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x140010, r0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x1) [ 2406.247164][T29441] FAULT_INJECTION: forcing a failure. [ 2406.247164][T29441] name failslab, interval 1, probability 0, space 0, times 0 [ 2406.322414][T29441] CPU: 1 PID: 29441 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #70 [ 2406.330439][T29441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2406.340502][T29441] Call Trace: [ 2406.343810][T29441] dump_stack+0x172/0x1f0 [ 2406.348156][T29441] should_fail.cold+0xa/0x15 [ 2406.352765][T29441] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2406.358592][T29441] ? ___might_sleep+0x163/0x280 [ 2406.363465][T29441] __should_failslab+0x121/0x190 [ 2406.368412][T29441] should_failslab+0x9/0x14 [ 2406.372925][T29441] kmem_cache_alloc+0x2b2/0x6f0 [ 2406.377787][T29441] ? kasan_check_write+0x14/0x20 [ 2406.382733][T29441] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 2406.388309][T29441] getname_flags+0xd6/0x5b0 [ 2406.392839][T29441] getname+0x1a/0x20 [ 2406.396752][T29441] do_sys_open+0x2c9/0x5d0 [ 2406.401187][T29441] ? filp_open+0x80/0x80 [ 2406.405443][T29441] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2406.410911][T29441] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2406.416405][T29441] ? do_syscall_64+0x26/0x610 [ 2406.421132][T29441] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2406.427208][T29441] ? do_syscall_64+0x26/0x610 [ 2406.431897][T29441] __x64_sys_openat+0x9d/0x100 [ 2406.436681][T29441] do_syscall_64+0x103/0x610 [ 2406.441288][T29441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2406.447181][T29441] RIP: 0033:0x458c29 [ 2406.451083][T29441] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:06:51 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x248, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:51 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x301100, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000180)="66a7c33a3622351527573d5c6590888ec1661d83622414c99e70ce7104bd2a7c86805c4d0dcc9d2eddd345015edb48ab908a6848de087b6b1ec19a060f1962c30c9b98b41db7bf8c0eb7987bc72a08", 0x4f) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000000c0), 0x4) 04:06:51 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2406.470704][T29441] RSP: 002b:00007f1de4359c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2406.479126][T29441] RAX: ffffffffffffffda RBX: 00007f1de4359c90 RCX: 0000000000458c29 [ 2406.487135][T29441] RDX: 0000000000000000 RSI: 0000000020000040 RDI: ffffffffffffff9c [ 2406.495119][T29441] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2406.503094][T29441] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1de435a6d4 [ 2406.511078][T29441] R13: 00000000004c52a4 R14: 00000000004d9350 R15: 0000000000000004 04:06:51 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30053030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00 ']) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f00000000c0)) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:51 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7f, 0x2000) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000100)=0x7, 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xab31, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f00000000c0)=0xfff, 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r2, 0x0, 0x0) [ 2406.608863][T29707] gfs2: can't find protocol [ 2406.608863][T29707] ock_nolock 04:06:51 executing program 2 (fault-call:1 fault-nth:1): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:51 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0xf, 0x3}, 0x18) [ 2406.693886][T29707] gfs2: can't find protocol [ 2406.693886][T29707] ock_nolock 04:06:51 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}]}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:51 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x268, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) [ 2406.769614][T29877] FAULT_INJECTION: forcing a failure. [ 2406.769614][T29877] name failslab, interval 1, probability 0, space 0, times 0 [ 2406.803057][T29877] CPU: 0 PID: 29877 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #70 [ 2406.811121][T29877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2406.821196][T29877] Call Trace: [ 2406.821226][T29877] dump_stack+0x172/0x1f0 [ 2406.821250][T29877] should_fail.cold+0xa/0x15 [ 2406.821270][T29877] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2406.821292][T29877] ? ___might_sleep+0x163/0x280 [ 2406.821314][T29877] __should_failslab+0x121/0x190 [ 2406.821331][T29877] should_failslab+0x9/0x14 [ 2406.821349][T29877] kmem_cache_alloc+0x2b2/0x6f0 [ 2406.821366][T29877] ? __save_stack_trace+0x99/0x100 [ 2406.821385][T29877] __alloc_file+0x27/0x300 [ 2406.821402][T29877] alloc_empty_file+0x72/0x170 [ 2406.821421][T29877] path_openat+0xef/0x46e0 [ 2406.821446][T29877] ? save_stack+0x45/0xd0 [ 2406.853683][T29877] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2406.853697][T29877] ? kasan_slab_alloc+0xf/0x20 [ 2406.853711][T29877] ? kmem_cache_alloc+0x11a/0x6f0 [ 2406.853725][T29877] ? getname_flags+0xd6/0x5b0 [ 2406.853737][T29877] ? getname+0x1a/0x20 [ 2406.853751][T29877] ? do_sys_open+0x2c9/0x5d0 [ 2406.853771][T29877] ? __x64_sys_openat+0x9d/0x100 [ 2406.872875][T29877] ? do_syscall_64+0x103/0x610 04:06:51 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x800) lseek(r0, 0x0, 0x7ffffffff7ffffd) [ 2406.872893][T29877] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2406.872917][T29877] ? __lock_acquire+0x548/0x3fb0 [ 2406.872941][T29877] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2406.915449][T29877] do_filp_open+0x1a1/0x280 [ 2406.915466][T29877] ? __alloc_fd+0x44d/0x560 [ 2406.915481][T29877] ? may_open_dev+0x100/0x100 [ 2406.915501][T29877] ? lock_downgrade+0x880/0x880 [ 2406.915524][T29877] ? kasan_check_read+0x11/0x20 [ 2406.931264][T29877] ? do_raw_spin_unlock+0x57/0x270 [ 2406.931302][T29877] do_sys_open+0x3fe/0x5d0 [ 2406.931321][T29877] ? filp_open+0x80/0x80 [ 2406.931343][T29877] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2406.941204][T29877] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2406.941221][T29877] ? do_syscall_64+0x26/0x610 [ 2406.941238][T29877] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2406.941252][T29877] ? do_syscall_64+0x26/0x610 [ 2406.941273][T29877] __x64_sys_openat+0x9d/0x100 [ 2406.950457][T29877] do_syscall_64+0x103/0x610 [ 2406.950479][T29877] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2406.950491][T29877] RIP: 0033:0x458c29 [ 2406.950507][T29877] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2406.950516][T29877] RSP: 002b:00007f1de4359c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2406.950530][T29877] RAX: ffffffffffffffda RBX: 00007f1de4359c90 RCX: 0000000000458c29 [ 2406.950546][T29877] RDX: 0000000000000000 RSI: 0000000020000040 RDI: ffffffffffffff9c 04:06:51 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x20000018, 0x3}, 0x18) [ 2407.064979][T29877] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2407.064989][T29877] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1de435a6d4 [ 2407.065006][T29877] R13: 00000000004c52a4 R14: 00000000004d9350 R15: 0000000000000004 04:06:51 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) accept4(r0, &(0x7f0000000040)=@nfc_llcp, &(0x7f00000000c0)=0x80, 0x80800) unshare(0x0) 04:06:51 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) ioctl$TIOCSETD(r1, 0x5437, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="66643ed52a6d7e194e41e223fbbc74c84f6a2f2daf75bd2f2d17fcbb511254a8ce4ca123f5bc129233188775cdb21c8b9debc2329b5840b3f974025668d5a5272b8ba492d0eb61e04ca34876e90c111a0800dd40b37b07771d73f8b2a6a3a54540f0c4d528f377d60ae8fecf20244b29b84c0d5f186ac56fe2dc", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18}, 0x18) 04:06:51 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x2}, 0x18) 04:06:51 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x6, 0x100) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000240)=0x863, 0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000200)={0x2, &(0x7f00000000c0)=[0xffffffff, 0x8]}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746db2f6ceee776146ff303030307d3030303030303030303034303030302c757365725f6964", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_STATFS(r1, &(0x7f0000000180)={0x60, 0xfffffffffffffff5, 0x1, {{0x5, 0x405edddc, 0x3, 0x1ff, 0x800, 0x3, 0x572, 0x100000000}}}, 0x60) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2407.133628][T30245] gfs2: can't find protocol [ 2407.133628][T30245] ock_nolock [ 2407.215109][T30245] gfs2: can't find protocol [ 2407.215109][T30245] ock_nolock 04:06:52 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x2e3, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:52 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2407.421537][T30535] gfs2: can't find protocol [ 2407.421537][T30535] ock_nolock 04:06:52 executing program 2 (fault-call:1 fault-nth:2): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:52 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r0, 0x0, 0xb, &(0x7f0000000040)='em0trusted\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r1, 0x4) lseek(r0, 0x0, 0x0) 04:06:52 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:52 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x7fffffd) r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000040)={0x100000001, 0x2, 0xffffffffffffffff}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="c53e4a9b9c09d6e667deb83d37670e76add214513f3c5dc6fc2b4a74d43c2b076078996b808e8ac75117fc96158401bf1e46b4d147f8c05827ffcb59f1f0972ea925e72ecdf5e5cb4aa9104e9cb1150d63d0246eef7bb975a7929cc0744caed3c972ed0f6733020081c40b7c8e4f0ad51a1e66eade9b1323819ea3c74ad889e9834aa7cfd681b3ecb5c887a427c36c21514e33ef597ce14959a3d2212f0860c9881bf352ea539f0f82ec8194a93be360227ff8fb045a22d778b344e7e501de74a7f53afa71f406dcfdcd595a186879d5a3658591", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0065d6a74de3b9d7d3c5e1e04252e6d6be0976"]) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x11}, 0x18) r2 = dup2(r1, r1) getsockopt$ax25_int(r2, 0x101, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 04:06:52 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1c, 0x0) lseek(r0, 0x10000000000000, 0x3) [ 2407.529719][T30535] gfs2: can't find protocol [ 2407.529719][T30535] ock_nolock 04:06:52 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x5}, 0x18) [ 2407.583254][T30577] FAULT_INJECTION: forcing a failure. [ 2407.583254][T30577] name failslab, interval 1, probability 0, space 0, times 0 [ 2407.609958][T30577] CPU: 0 PID: 30577 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #70 [ 2407.617972][T30577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2407.628033][T30577] Call Trace: [ 2407.631344][T30577] dump_stack+0x172/0x1f0 [ 2407.635692][T30577] should_fail.cold+0xa/0x15 [ 2407.640301][T30577] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2407.646154][T30577] ? ___might_sleep+0x163/0x280 [ 2407.651048][T30577] __should_failslab+0x121/0x190 [ 2407.655998][T30577] should_failslab+0x9/0x14 [ 2407.660512][T30577] kmem_cache_alloc+0x2b2/0x6f0 [ 2407.665369][T30577] ? __save_stack_trace+0x99/0x100 [ 2407.670491][T30577] __alloc_file+0x27/0x300 [ 2407.674912][T30577] alloc_empty_file+0x72/0x170 [ 2407.679684][T30577] path_openat+0xef/0x46e0 [ 2407.684116][T30577] ? save_stack+0x45/0xd0 [ 2407.688463][T30577] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2407.694284][T30577] ? kasan_slab_alloc+0xf/0x20 [ 2407.699056][T30577] ? kmem_cache_alloc+0x11a/0x6f0 [ 2407.704083][T30577] ? getname_flags+0xd6/0x5b0 [ 2407.708771][T30577] ? getname+0x1a/0x20 [ 2407.712846][T30577] ? do_sys_open+0x2c9/0x5d0 [ 2407.717440][T30577] ? __x64_sys_openat+0x9d/0x100 [ 2407.722385][T30577] ? do_syscall_64+0x103/0x610 [ 2407.727160][T30577] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2407.733240][T30577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2407.739486][T30577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2407.745735][T30577] ? __lock_acquire+0x548/0x3fb0 [ 2407.750675][T30577] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2407.756067][T30577] do_filp_open+0x1a1/0x280 [ 2407.760587][T30577] ? __alloc_fd+0x44d/0x560 [ 2407.765092][T30577] ? may_open_dev+0x100/0x100 [ 2407.769788][T30577] ? lock_downgrade+0x880/0x880 [ 2407.774674][T30577] ? kasan_check_read+0x11/0x20 [ 2407.779538][T30577] ? do_raw_spin_unlock+0x57/0x270 [ 2407.784672][T30577] do_sys_open+0x3fe/0x5d0 [ 2407.789109][T30577] ? filp_open+0x80/0x80 [ 2407.793363][T30577] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2407.798828][T30577] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2407.804292][T30577] ? do_syscall_64+0x26/0x610 [ 2407.808974][T30577] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2407.815046][T30577] ? do_syscall_64+0x26/0x610 [ 2407.819737][T30577] __x64_sys_openat+0x9d/0x100 [ 2407.824511][T30577] do_syscall_64+0x103/0x610 [ 2407.829117][T30577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2407.835061][T30577] RIP: 0033:0x458c29 [ 2407.838969][T30577] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2407.858666][T30577] RSP: 002b:00007f1de4359c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2407.867086][T30577] RAX: ffffffffffffffda RBX: 00007f1de4359c90 RCX: 0000000000458c29 [ 2407.875115][T30577] RDX: 0000000000000000 RSI: 0000000020000040 RDI: ffffffffffffff9c 04:06:52 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x2ee, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) [ 2407.883191][T30577] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2407.891185][T30577] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1de435a6d4 [ 2407.899162][T30577] R13: 00000000004c52a4 R14: 00000000004d9350 R15: 0000000000000004 04:06:52 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x2, 0x200000) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)={0x2b, 0x4, 0x0, {0x1, 0xfffffffffffffffa, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:52 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0x0, 0x7, {0x7}}, 0x18) 04:06:52 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) fallocate(r0, 0x0, 0x8000, 0x2) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="63c3151f4e021ded049bad3ded7c6ab9008481451392d1d61313c6"]) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x100, 0x0) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000040)={0xffffffffffffffff, 0x10001}) 04:06:52 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) [ 2408.004464][T30784] gfs2: can't find protocol [ 2408.004464][T30784] ock_nolock 04:06:52 executing program 2 (fault-call:1 fault-nth:3): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) [ 2408.097955][T30784] gfs2: can't find protocol [ 2408.097955][T30784] ock_nolock 04:06:52 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x6e) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f00000006c0)=0xc) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="265902cbfd56b45e6f4518c6fa7ce39d48a0525a11735f94f63f50941ef5740e3a4c788dc9b277005dd7331de6c4bea1db05bf57adfd10af51954db6e9a4f74e81edcd930dc1f87d15e2a0069cbf8090771f1b735cc101b161a0dff134c6c1698b76c1996f6c5aeaeb6509168bba4d5c07c542845516", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=staff_u,dont_hash,fowner<', @ANYRESDEC=r2, @ANYBLOB=',fowner<', @ANYRESDEC=r2, @ANYBLOB=',dont_appraise,euid>', @ANYRESDEC=r2, @ANYBLOB=',euid=', @ANYRESDEC=r2, @ANYBLOB="2c04bc06e3b0ddc3ff33c25d342b6deeb85d845d7fde4be32305d8a130cf47357b5e6a3febf179fcb78d27323905fe43a69929964a233c6d8123e46403e4a8dab6c203fd88b53ef4fa"]) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r4 = request_key(&(0x7f0000000280)='id_legacy\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000640)='\x00', 0xffffffffffffffff) r5 = creat(&(0x7f0000000680)='./file0\x00', 0x80) ioctl$KDSIGACCEPT(r5, 0x4b4e, 0x3e) keyctl$search(0xa, r3, &(0x7f00000001c0)='.request_key_auth\x00', &(0x7f0000000240)={'syz', 0x0}, r4) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x412200, 0x0) 04:06:52 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:52 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x800, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000080)) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4000020, 0x80) lseek(r1, 0x36, 0xf732127958be6cc6) 04:06:53 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0xf) [ 2408.243823][T31072] FAULT_INJECTION: forcing a failure. [ 2408.243823][T31072] name failslab, interval 1, probability 0, space 0, times 0 [ 2408.263762][T31074] gfs2: can't find protocol [ 2408.263762][T31074] ock_nolock [ 2408.266065][T31072] CPU: 1 PID: 31072 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #70 [ 2408.279394][T31072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2408.279400][T31072] Call Trace: [ 2408.279423][T31072] dump_stack+0x172/0x1f0 [ 2408.279443][T31072] should_fail.cold+0xa/0x15 [ 2408.279465][T31072] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2408.292821][T31072] ? ___might_sleep+0x163/0x280 [ 2408.292848][T31072] __should_failslab+0x121/0x190 [ 2408.301736][T31072] should_failslab+0x9/0x14 [ 2408.301753][T31072] kmem_cache_alloc+0x2b2/0x6f0 [ 2408.301775][T31072] ? rcu_read_lock_sched_held+0x110/0x130 [ 2408.332373][T31072] ? kmem_cache_alloc+0x32e/0x6f0 [ 2408.337416][T31072] security_file_alloc+0x39/0x170 [ 2408.342447][T31072] __alloc_file+0xac/0x300 [ 2408.342464][T31072] alloc_empty_file+0x72/0x170 [ 2408.342483][T31072] path_openat+0xef/0x46e0 [ 2408.356055][T31072] ? save_stack+0x45/0xd0 [ 2408.360393][T31072] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2408.366230][T31072] ? kasan_slab_alloc+0xf/0x20 [ 2408.371000][T31072] ? kmem_cache_alloc+0x11a/0x6f0 [ 2408.376020][T31072] ? getname_flags+0xd6/0x5b0 [ 2408.376032][T31072] ? getname+0x1a/0x20 [ 2408.376045][T31072] ? do_sys_open+0x2c9/0x5d0 [ 2408.376059][T31072] ? __x64_sys_openat+0x9d/0x100 [ 2408.376074][T31072] ? do_syscall_64+0x103/0x610 [ 2408.376087][T31072] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2408.376113][T31072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2408.376128][T31072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2408.376147][T31072] ? __lock_acquire+0x548/0x3fb0 [ 2408.376169][T31072] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2408.384923][T31072] do_filp_open+0x1a1/0x280 [ 2408.384938][T31072] ? __alloc_fd+0x44d/0x560 [ 2408.384958][T31072] ? may_open_dev+0x100/0x100 04:06:53 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000180)={0xffffffffffffffd5, 0x4, 0x0, {0x1000}}, 0x18) [ 2408.405288][T31072] ? lock_downgrade+0x880/0x880 [ 2408.405312][T31072] ? kasan_check_read+0x11/0x20 [ 2408.405333][T31072] ? do_raw_spin_unlock+0x57/0x270 [ 2408.428110][T31072] do_sys_open+0x3fe/0x5d0 [ 2408.428131][T31072] ? filp_open+0x80/0x80 [ 2408.437149][T31072] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2408.437163][T31072] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2408.437177][T31072] ? do_syscall_64+0x26/0x610 [ 2408.437192][T31072] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2408.437204][T31072] ? do_syscall_64+0x26/0x610 [ 2408.437223][T31072] __x64_sys_openat+0x9d/0x100 [ 2408.437240][T31072] do_syscall_64+0x103/0x610 [ 2408.437256][T31072] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2408.437267][T31072] RIP: 0033:0x458c29 [ 2408.437283][T31072] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2408.437291][T31072] RSP: 002b:00007f1de4359c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 04:06:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x6, 0x1, 0x80000000, 0x3}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x1}}, 0x18) 04:06:53 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x96, "da02bb8fdb0817db105e0dbfd560e54141d41b58b834d7b56911d0394872bcc9e61d28da8cbda26d2376a271b65d78e8bb2444e6b449aa3ee61a284322d9d52585ea26d88861f39fd0238e4130486c4293c6d4ddf4cfd077a71b02d5a2e53324aed850665b04f7e7891c8deec11be90d873539b8aac9d5949653668df5a12c12ca8bf42ce5c9310f5dae538a02841980c473315bea9d"}, &(0x7f0000000140)=0x9e) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)={r1, 0xfff}, &(0x7f00000001c0)=0x8) creat(&(0x7f0000000040)='./file0\x00', 0x142) [ 2408.437305][T31072] RAX: ffffffffffffffda RBX: 00007f1de4359c90 RCX: 0000000000458c29 [ 2408.437322][T31072] RDX: 0000000000000000 RSI: 0000000020000040 RDI: ffffffffffffff9c [ 2408.451701][T31072] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2408.451710][T31072] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1de435a6d4 [ 2408.451719][T31072] R13: 00000000004c52a4 R14: 00000000004d9350 R15: 0000000000000004 [ 2408.628935][T31074] gfs2: can't find protocol [ 2408.628935][T31074] ock_nolock 04:06:53 executing program 1: ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000180)) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) recvfrom(r0, &(0x7f00000001c0)=""/245, 0x38d, 0x40002140, &(0x7f00000002c0)=@ax25={{0x3, @null, 0x4}, [@null, @null, @null, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}, 0x80) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040)=0x30, 0x4) ioctl$VIDIOC_G_PRIORITY(0xffffffffffffffff, 0x80045643, 0x1) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mISDNtimer\x00', 0x505000, 0x0) 04:06:53 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) prctl$PR_SET_SECUREBITS(0x1c, 0x20) 04:06:53 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x20000018) 04:06:53 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x306, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:53 executing program 2 (fault-call:1 fault-nth:4): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:53 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000040)=0xe8) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x4, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:53 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x64) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2408.868352][T31468] gfs2: can't find protocol [ 2408.868352][T31468] ock_nolock 04:06:53 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x200) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000080)) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x20, 0x80000) lseek(r1, 0x0, 0x0) [ 2408.952699][T31468] gfs2: can't find protocol [ 2408.952699][T31468] ock_nolock 04:06:53 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x8000, &(0x7f0000000180)=""/204) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000040)={0x18, 0x1, 0x0, {0xc890}}, 0x18) r2 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0xe000000000000000, 0x82800) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f00000002c0)=0x3) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f00000004c0)={0x1, 0x20000000000000}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) 04:06:53 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x314, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:53 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x20800, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r2}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:53 executing program 0: r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x800) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x7ff, 0x2, 0x100000000, 0x66b4, 0x7, 0x6, 0x0, {0x0, @in={{0x2, 0x4e22, @empty}}, 0x5, 0xbc48, 0x2, 0x7fff, 0x8}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000340)={r1, 0x6, 0x20}, 0xc) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d0a652850a059c5fb926425390be7", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2409.101701][T31648] gfs2: can't find protocol [ 2409.101701][T31648] ock_nolock 04:06:53 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x20) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) [ 2409.160788][T31648] gfs2: can't find protocol [ 2409.160788][T31648] ock_nolock 04:06:53 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10000) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r1, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xb5, 0x121000) 04:06:54 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="000000f9000000000000", @ANYRESDEC=0x0, @ANYBLOB='\b\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x5d7e13176ce4d9be, 0x3}, 0xdf) 04:06:54 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x328, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:54 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r1, @ANYBLOB="2c273dc775705f69643d", @ANYRESDEC=r2, @ANYBLOB=',max_read=0x0000000000000009,default_permissions,blksize=0x0000000000000600,max_read=0x0000000000000005,hash,\x00']) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x6) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='\xe7dev/snapshot\x00', 0x0, 0x0) 04:06:54 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x92}}, {@default_permissions='default_permissions'}]}}) r1 = getuid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='\x1b\xc6rI\x87\xb49\xfcsto;\x8d', 0x0, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000200)={0x0, 0x6, 0xb29, 0xd2, 0x4, 0x22, 0x4, "a7b96f158d0682773096d1f889760b01c7503f9a", "1717c23b79627f6b08489f3db13e60e5c0d2520a"}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x80800, &(0x7f00000006c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64873d3030303030303030303030302c757365055f69643d00", @ANYRESDEC=r1, @ANYBLOB="2c67726f75705f69643d68ee71f217b09aeed62d78ea1a217688efec270712dac724cf8cc04385b0533a140205bb14b85bc67dcfb7a2f65b03b1410e5e5c0e8929cec869470366dbfc0683a8de16c3f50b57e442683328", @ANYRESDEC=r2, @ANYBLOB=',blksize=0x0000000000001000,max_read=0x0000000000000081,max_read=0x0000000000000008,blksize=0x0000000000000800,allow_other,default_permissions,default_permissions,max_read=0x0000000000000007,default_permissions,default_permissions,smackfsfloor=rootmode,audit,uid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2409.339963][T31923] gfs2: can't find protocol [ 2409.339963][T31923] ock_nolock 04:06:54 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x47}}, 0x18) 04:06:54 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200001, 0x0) ioctl$TIOCSIG(r1, 0x40045436, 0x1c) write$binfmt_aout(r0, &(0x7f00000000c0)={{0x107, 0x4, 0x5, 0x22b, 0xff, 0x8, 0x227, 0xe8d6}, "2fb779ae90fe0fc7f47c54bcb48cb6bb54b5d63232a5492b9b1cde936642ccf865386e750285694af7fafbc310e76437e5a9f73f008a73b1caef92598e0750dcede1b73240aabcfdd80dedb71be253e4fd74646b1edf"}, 0x76) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x900, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044000}, 0x4008011) 04:06:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/.ev/snapshot\x00', 0x0, 0x0) [ 2409.444578][T31923] gfs2: can't find protocol [ 2409.444578][T31923] ock_nolock 04:06:54 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000080)=0x4) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r1, 0x5, 0x4320bbb2, 0x1}, 0x10) fremovexattr(r0, &(0x7f0000000100)=@random={'btrfs.', '&\x00'}) accept$nfc_llcp(r0, &(0x7f0000000140), &(0x7f00000001c0)=0x60) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000200), &(0x7f0000000240)=0x4) 04:06:54 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x32c, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:54 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x22, 0x3, 0x0, {0x1, 0x1, 0x0, '$'}}, 0x22) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3, 0x0, {0x4}}, 0x18) 04:06:54 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xfff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000000c0)={0x3, 0x0, [0x0, 0x0, 0x0]}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) 04:06:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='//ev/snapshot\x00', 0x0, 0x0) [ 2409.588661][T32090] gfs2: can't find protocol [ 2409.588661][T32090] ock_nolock 04:06:54 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x1) lseek(r0, 0x0, 0x0) 04:06:54 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0xfffffffffffffffd, &(0x7f0000000540)=ANY=[]) unlink(&(0x7f0000000200)='./file0\x00') write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x1) 04:06:54 executing program 0: mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x21) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2409.671061][T32090] gfs2: can't find protocol [ 2409.671061][T32090] ock_nolock 04:06:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev\xe7snapshot\x00', 0x0, 0x0) 04:06:54 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x382, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:54 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x410040, 0x0) lseek(r0, 0x0, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000040)={0x7, 0x7b, 0x1}, 0x7) getsockname(r1, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, &(0x7f0000000140)=0x80) 04:06:54 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0xfffffffffffffffc) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d1f885123c76ac06f70abbb3317a8871c14293890a677f7016ea8df99954f", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 04:06:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/.napshot\x00', 0x0, 0x0) 04:06:54 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000001340)={0x9, 0x9, 0x2, 0x9d, &(0x7f00000001c0)=""/157, 0x80, &(0x7f0000000280)=""/128, 0x1000, &(0x7f0000000340)=""/4096}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fu=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200a00, 0x0) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x100000000000000, 0x1000, 0x1524, 0x4, 0x1}) [ 2409.892255][T32385] gfs2: can't find protocol [ 2409.892255][T32385] ock_nolock 04:06:54 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x28, &(0x7f00000000c0)}, 0x10) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) write$apparmor_exec(r1, &(0x7f00000001c0)={'exec ', 'vmnet0\x00'}, 0xc) 04:06:54 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030302d85056055e9a6e5aff4b730083030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c00b7b1fd3a2bcdef857764759c4eccea5fe0105a0dfec47e7d363da025fb6eed0b80c1967005448d2d26d8e89d3620f20e17658a718c62fc752f4143d6bf1d795108032405bc1f2581bf6f41ab69c50d0a4baa93f8eead2bbc2eb7baff3a8f7f2fbef964b9a57216fffa728286291d3cd8212c16a384c477ce78b382ef9ae38750330c226122bf714b592f07d9ef"]) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x101, 0x1, 0x0, 0xb2b}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev//napshot\x00', 0x0, 0x0) 04:06:54 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x1, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000080)) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000000)={0x1}) [ 2409.988705][T32385] gfs2: can't find protocol [ 2409.988705][T32385] ock_nolock 04:06:54 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x3a4, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:54 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) clock_adjtime(0x3, &(0x7f0000000180)={0x0, 0x8, 0x9, 0x7, 0x5, 0xf95, 0x2, 0x9, 0x58b, 0x2, 0x0, 0x3, 0x0, 0x5, 0x4c2, 0x4, 0x7, 0x7, 0x3ff, 0x4, 0xd45, 0x200, 0xfff, 0x8, 0x2, 0xb4}) r1 = open(&(0x7f0000000040)='./file0\x00', 0x400, 0x21) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x80000) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000280)={{0x400, 0x599b}, {0x3f, 0x1}, 0x0, 0x7, 0x1}) 04:06:54 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snap.hot\x00', 0x0, 0x0) 04:06:54 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="73e2501e87e71fe0a278dfcc95434f0710add11350e9dc2079579bc97f0651bc0dcd85e8474e1506540e6799b7ab5db62a1995148797604c04eae0b2f4e144f06f18a305b3ee6d89ae6c48853d2a69e83ef2e63361b062c5aff21ccd7de4fddd6bec6fb96670baf50bc50cc04ac60844f3c1f02a197cd5d93b962acfa4d330b753064839e23f9648f3b18cda561276eed0efe3b6bfd27a440398b4a0d7d3f593bb3a5fe3e6947f6d483c0fa5864212172c4941a1c4928dd551d8940806a4e95b5707034938ae4317649d4d568c128ad1bb94a9272448a73a4937b2536ffaf9ce7d466735c916a122f849b87517b100"/250], 0xfa) 04:06:54 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d74c90c958fca3f1d91bd9bc690134b26b1d24b0d6f9913a01a", @ANYRESDEC=0x0, @ANYBLOB="3c00a38db1423b1603a3291e6501dbdef4dd44385d5b4eead3376ba98ef388c7834d042150e7d1acc60c0b699a639b"]) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:54 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x80) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x3f, 0x8000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='.\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_fscache='cache=fscache'}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@afid={'afid', 0x3d, 0x1}}], [{@subj_user={'subj_user', 0x3d, '/dev/fuse\x00'}}, {@obj_type={'obj_type', 0x3d, 'proc@\\'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/fuse\x00'}}, {@obj_role={'obj_role', 0x3d, '@/'}}]}}) [ 2410.167417][ T347] gfs2: can't find protocol [ 2410.167417][ T347] ock_nolock [ 2410.242256][ T347] gfs2: can't find protocol [ 2410.242256][ T347] ock_nolock 04:06:55 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snap/hot\x00', 0x0, 0x0) 04:06:55 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x3d6, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:55 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c677f6f243d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$pokeuser(0x6, r1, 0x9b, 0x6) 04:06:55 executing program 1: r0 = msgget$private(0x0, 0x380) openat$capi20(0xffffffffffffff9c, &(0x7f0000001040)='/dev/capi20\x00', 0x4000, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000040)=""/4096) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r1, 0x0, 0x0) 04:06:55 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x80, 0x4000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xb4, r2, 0x504, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x57b1d96d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x4000, 0x0) ioctl$VIDIOC_S_INPUT(r3, 0xc0045627, &(0x7f00000000c0)) [ 2410.400323][ T544] gfs2: can't find protocol [ 2410.400323][ T544] ock_nolock 04:06:55 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x02', 0x0, 0x0) 04:06:55 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000600)=0xe8) r2 = geteuid() r3 = geteuid() r4 = geteuid() syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x5, &(0x7f0000000480)=[{&(0x7f0000000180)="621732cfb3be0a87104f80e012cb133ad0d19924078b5c541493d7b9e2183ef7991e69fee621e1874181b39e825a9a643c374a021b94496e58e9c369b3453b22aa44eac1617803c25d3a2a39a8d6b470364cf7805c3fa88a3163e1dc042f6ef4c2407fe0f7a0b894e7667da0a3c4b4013c020fd46eb128ab2cfe5008930be895378a48e6cb222b9ccb4655f29165db05e35a8dc605c66580794981568983185d9c9e4524b0527f9d06fbafb36a925c7bb33d4192645fd853409a15dd867c", 0xbe, 0x3}, {&(0x7f0000000240)="ea5c97a32e1deb49a9719085c0758fac8c422baf0bf0c9d9e0d41d1e2a251104ae67f4cea21b3f94b9ee509d746f4d3b1c4f1baf38d3068f02358533d838430696b63cc357f0e3c91df17c7687f72cdd03237c2a4b00fb66d194afbcc485baa7f2633e4d094db2d0b9", 0x69, 0x12b52}, {&(0x7f00000002c0)="a090cbaecda7968d48df90e60a0faba7331492e28c96b21b6ee078400b711b5042cfadb5ee", 0x25, 0xfffffffffffffffc}, {&(0x7f0000000340)="cbe700", 0x3, 0x100000001}, {&(0x7f0000000380)="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", 0xfb, 0x100}], 0x101000, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'maccroatian'}}, {@force='force'}], [{@uid_gt={'uid>', r1}}, {@obj_user={'obj_user', 0x3d, 'ppp0procem1$'}}, {@hash='hash'}, {@context={'context', 0x3d, 'system_u'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@subj_role={'subj_role', 0x3d, 'em0ppp0em0$\\'}}, {@uid_lt={'uid<', r3}}, {@smackfsfloor={'smackfsfloor'}}, {@fowner_gt={'fowner>', r4}}]}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) [ 2410.495024][ T544] gfs2: can't find protocol [ 2410.495024][ T544] ock_nolock 04:06:55 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x536}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1800}}]}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) listxattr(&(0x7f0000000040)='./file1\x00', &(0x7f0000000180)=""/102, 0x66) 04:06:55 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x3ea, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:55 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000080)={0xf, 0x0, 0x0, {0x40, 0xcee, 0x6, 0x7f264fe4}}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x80000001}, &(0x7f0000000180)=0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'bpq0\x00', 0x302}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={r1, @in6={{0xa, 0x4e20, 0x3, @rand_addr="6aa41cf71f9d66e27eed284a2aaa16fc", 0x2}}, 0x0, 0x2, 0x100, 0x5a644c58, 0x61}, &(0x7f0000000280)=0x98) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r2, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000100)={0x5, 0x28, [0x101, 0x2, 0x3, 0xaec, 0x10000, 0x1, 0x7, 0x5, 0x5, 0x7]}) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f00000000c0)=0x1d) 04:06:55 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x03', 0x0, 0x0) 04:06:55 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) sendto(r0, &(0x7f0000000180)="36196d3e95df28286f902230d3c1f649fd8790868f5ddd956c07edcd97811989b7fb9ef5ae73eb1d0cce62e26e0cea2d8c7b690b69bf07f54880aab87f3f67597c4100f096ad9a1d824cd9d164eb028f6fa57eddcbf62b6c7cc4537176bee4388524a0c9f25332cbf6e8440e9652b33e", 0x70, 0x4000, &(0x7f0000000200)=@ethernet={0x307, @remote}, 0x80) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:55 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200100, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)={0x2a, 0x4, 0x0, {0x0, 0x4, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000180)={0x4, 0x4, 0x8}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030300e303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0035bbb58c4a5cd59076b4b08bbe6779c8cd9bf45fd25066299c5ced6234a292a5494529a8fe47d35a00e454729cfd6e00108f45bf66507109d0f6e2a8cff32e1ac590a41747cc41f7c5e3913ee870d5e4bf414e2bc0333cb71063fbb748c4459eeca4987adcf3a621623f068ccd4f97144539399633da12264ac210"]) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x9000000002}}, 0xffffffb2) [ 2411.228437][ T811] gfs2: can't find protocol [ 2411.228437][ T811] ock_nolock 04:06:56 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20000, 0x0) lseek(r0, 0x3f, 0x2000000001) 04:06:56 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB='Nrootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x04', 0x0, 0x0) [ 2411.310344][ T811] gfs2: can't find protocol [ 2411.310344][ T811] ock_nolock 04:06:56 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:56 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x3ec, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:56 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0e49369d5d4f3f05e4a40f6379ea2b0732c0fa2c95a14b7ded99940ad1d5ccaafb6de2b7b4ab5b701980dec52269752fea1cf61201033318cdc7b92bd9d710f0921a7e3ad84fa9d8548be34fc57f7783646b2fbf04a7ccb214411598f53720"]) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@known='trusted.syz\x00') write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:56 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x200000, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f00000000c0)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18}, 0x18) 04:06:56 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x5, 0x2, 0x6}}, 0x30) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2411.511887][ T1166] gfs2: can't find protocol [ 2411.511887][ T1166] ock_nolock 04:06:56 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) eventfd(0xf20) 04:06:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:56 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6690e5975ee069b7f2818855f0c0622019414f9442ad2451b344a4b3b5fd6a2e99b6a2f91b087f6e246d9474ba1a23f98e883a8ea1f48fdd338b5b82b39e8581f68151f19c2079750e640faf9f6808f06ea3d164e79ebac5bb807f839bf6321f891d42842e464535e339bbf0f6778794470e54636925f132513b92c4b42e6e0bbc227735717f895443ea8db1eb23d13597352f31385aa205712e6587150001b41d654748bc5bbffeada4ef3ebbaecfb9898b0ca7103ed9e50651ae509f9a93974a21a0a92ba9d0801ca0133c0c3b620ed6215d7c2351bcee0b026daa4e54e3e1e1149669ae7c8fb571efc015ce6bc9f98b2df6b05b28f462", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x16, 0x4}, 0x18) [ 2411.648632][ T1166] gfs2: can't find protocol [ 2411.648632][ T1166] ock_nolock 04:06:56 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x80a, 0x8) recvmmsg(r0, &(0x7f0000000c80)=[{{&(0x7f0000000180)=@nfc_llcp, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)=""/35, 0x23}, {&(0x7f00000000c0)=""/40, 0x28}, {&(0x7f0000000200)=""/21, 0x15}], 0x3, &(0x7f0000000340)=""/175, 0xaf}, 0xae3}, {{&(0x7f0000000280)=@isdn, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/116, 0x74}, {&(0x7f0000000480)=""/173, 0xad}, {&(0x7f0000000540)=""/108, 0x6c}, {&(0x7f00000005c0)=""/163, 0xa3}, {&(0x7f0000000680)=""/78, 0x4e}, {&(0x7f0000001440)=""/4096, 0x1000}], 0x6}, 0x5}, {{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000880)=""/105, 0x69}, {&(0x7f0000000900)=""/190, 0xbe}, {&(0x7f00000009c0)=""/191, 0xbf}], 0x4, &(0x7f0000002440)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000000ac0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000b40)=""/40, 0x28}, {&(0x7f0000000b80)=""/90, 0x5a}, {&(0x7f0000000c00)}], 0x3}, 0xff}], 0x4, 0x10020, &(0x7f0000000d80)={0x77359400}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:56 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x3f2, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:56 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x10) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303030343030303006000000725f69643d3c879d085fcc198f782da8a8ae797664fb4ff08a2e8fc367481aafc19a05ae54c2147b0c66d388b37206b2d3a14396072fef5c8fb100647cd6708ba4eeedecd24e3c0fade5c6db17fcdd7e272092", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:56 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000080)) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1000000000004, 0x20000) lseek(r1, 0x0, 0x0) 04:06:56 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x4, 0x101000) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x9, 0x8, [0x1, 0x101, 0x7f, 0x7, 0x8, 0x2, 0x3, 0x6]}, &(0x7f0000000180)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0xfffffffffffffffb, 0x8007, 0x3, 0x0, r2}, &(0x7f0000000200)=0x10) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) socket$inet6_udplite(0xa, 0x2, 0x88) [ 2411.865477][ T1708] gfs2: can't find protocol [ 2411.865477][ T1708] ock_nolock 04:06:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:56 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f00000000c0)=0x1c) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000180)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000200)={r2, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0xb66, 0x2}, &(0x7f00000002c0)=0x90) [ 2411.978415][ T1708] gfs2: can't find protocol [ 2411.978415][ T1708] ock_nolock 04:06:56 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:56 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) lseek(r0, 0x0, 0x0) mq_timedsend(r0, &(0x7f0000000040)="1e2af5c07163bc84", 0x8, 0x73, &(0x7f0000000080)={0x0, 0x989680}) 04:06:56 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dlm_plock\x00', 0x40000, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000680), &(0x7f00000006c0)=0x4) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r2 = getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGSKNS(r4, 0x894c, &(0x7f0000000600)=0x7) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="3ee3f5bf1548db29ef913d8eefc4561eedb49561e03f9f55e19fa793f48d53410b4cc527fd98e79a04476131c257ff72d626866e42d88da786a461ba751343", 0x3f}, {&(0x7f0000000200)="e3cc7dea21f4966efaab2cd5934a3696aec3e344eb211876bf1e4f4bc1bc2d957ca75bd3c2da490b9449fcd7d1db86bab7e0e5e6b0a08313d1f3fefd4de72ee70f6d4a05248198a650edcf4439cb75c660d1620755acb3aac44f2c22f3ce6845856e9926641ce6d11dce754d61eb83f7fbb138400389558608e3b50f85136f1a3ca5a3b8375785694f8aa8c69e34d8e6396e5b44b5f71a6433979779e696755e0a", 0xa1, 0x7}], 0x40040, &(0x7f0000000540)={[{@hide='hide'}, {@dmode={'dmode'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@cruft='cruft'}], [{@smackfshat={'smackfshat', 0x3d, 'proc!ppp1'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_gt={'euid>', r3}}, {@appraise_type='appraise_type=imasig'}]}) fcntl$getflags(r1, 0x40a) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='?group_id=', @ANYRESDEC=r2, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303038312c66756e633d4250524d5f434845434b2c6673757569643d7639367b617566342d763f77732d3976777f2d663367002d77366332370000742c00"]) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x5}}, 0xfffffffffffffc64) 04:06:56 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:56 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x3f4, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:56 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:56 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6772643dccebab37258a4e0ca876aa6ef7aafdd0f2e2ae3047a1408037d451277bf1d54abc9fca5acfd48c10005a0ac9e4be2f4f617d8dc7e23c9ed9dac12f035c979bea9cf532d872d8af20715bee4162a9418ab8c155265f61c8f1d3ee1afa41462ba795e809e50a471c729d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x42000, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x6ba) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f00000001c0)={0x1, 0xfffffffffffffc01, 0x4}) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x20, 0x0) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000040)={0x401, 0x800}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x4c, &(0x7f0000000280)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e21, @rand_addr=0xffff}, @in={0x2, 0x4e23, @rand_addr=0x7}, @in6={0xa, 0x4e21, 0x92c2, @remote, 0xfffffffffffffffa}]}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={r2, 0x5, 0x9, 0x40}, 0x10) lseek(r1, 0x0, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000200)) [ 2412.187265][ T2032] gfs2: can't find protocol [ 2412.187265][ T2032] ock_nolock 04:06:57 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000180)=""/19, 0x13) write$FUSE_IOCTL(r0, &(0x7f00000001c0)={0x20, 0x0, 0x7, {0xc68a, 0x4, 0x1, 0x6}}, 0x20) fstatfs(r0, &(0x7f0000000200)=""/255) r1 = syz_open_dev$adsp(&(0x7f0000000340)='/dev/adsp#\x00', 0x4, 0x101080) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000004c0)=[@in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, @in6={0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}], 0x98) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="def3d2ed4fe94c8a3e7a3e19ae1d1629b1a411010cd603d1b89aa0321bce6f7325dfad174d9938e98da1ece29da76eb201e8e01cd555cc96bb10c7c830177ac529bdc018b9e17000aab5a3db53f6ebf93725680f", 0x54) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/dsp\x00', 0x501000, 0x0) r3 = getpgrp(0x0) syz_open_procfs(r3, &(0x7f0000000580)='net/snmp\x00') fsetxattr$security_capability(r0, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000400)=@v2={0x2000000, [{0x4b4e, 0x56}, {0xa72, 0x7}]}, 0x14, 0x0) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000380)={0x18, 0x0, {0x0, @empty, 'bcsf0\x00'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:57 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) getpriority(0x2, r0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000180)={0xb, 0x4}, 0x18) 04:06:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\xff', 0x0, 0x0) 04:06:57 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x60880, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000080)=0x100) getsockopt$inet_buf(r0, 0x0, 0x3f, &(0x7f0000000040)=""/64, &(0x7f0000000100)=0x40) lseek(r0, 0xfffffffffffffbfe, 0x5) r1 = add_key(&(0x7f0000000200)='blacklist\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000240)="7ebb897d7a5f92dbbbe66f44bd86ec42af0a3f6d1e7bd754125be512", 0xfffffffffffffec1, 0x0) keyctl$assume_authority(0x10, r1) bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0x12) [ 2412.285014][ T2032] gfs2: can't find protocol [ 2412.285014][ T2032] ock_nolock 04:06:57 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x3fe, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\xf6', 0x0, 0x0) 04:06:57 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x4000000000, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@default_permissions='default_permissions'}], [{@subj_type={'subj_type', 0x3d, 'fuse\x00'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_hash='dont_hash'}, {@permit_directio='permit_directio'}]}}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f00000000c0)) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:57 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x618d5ebc4168b5) 04:06:57 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x10000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000000c0)=0x73d144f6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2412.492976][ T2302] gfs2: can't find protocol [ 2412.492976][ T2302] ock_nolock 04:06:57 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000080)=0xbe0, 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x9, 0x0) lseek(r1, 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 04:06:57 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x10f, 0x4}, 0x18) [ 2412.564454][ T2302] gfs2: can't find protocol [ 2412.564454][ T2302] ock_nolock 04:06:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:57 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:57 executing program 0: chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000200)=""/215) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:57 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f0000000180)={@ipv4={[], [], @multicast1}, 0x0}, &(0x7f00000001c0)=0x14) r2 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x20, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) r4 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="58010000280000012abd7000fedbdf2500000000", @ANYRES32=r1, @ANYBLOB="0a00f3fff1ffffff01000a0008000100647272000c00020008000100b4f40000080005000708000008000500ff0900000800010061746d001400020008000300a8c0e20008000100", @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="3c000300cbe5ce95711e808d3cf9be56daf4a68bb745e5c234a57fc2e749204b3e57d5fa3b381938e3125be398857bcc79b4f627a20081662004481e08000100", @ANYRES32=r4, @ANYBLOB="08000100647272000c000200080001000800000008000500f3080000"], 0x158}}, 0x800) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) fchmodat(r0, &(0x7f00000002c0)='./file0\x00', 0x5) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r5, &(0x7f0000000000)={0xffffffffffffffe5}, 0x18) 04:06:57 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) sendto(r0, &(0x7f0000000180)="36196d3e95df28286f902230d3c1f649fd8790868f5ddd956c07edcd97811989b7fb9ef5ae73eb1d0cce62e26e0cea2d8c7b690b69bf07f54880aab87f3f67597c4100f096ad9a1d824cd9d164eb028f6fa57eddcbf62b6c7cc4537176bee4388524a0c9f25332cbf6e8440e9652b33e", 0x70, 0x4000, &(0x7f0000000200)=@ethernet={0x307, @remote}, 0x80) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) [ 2412.778754][ T2665] gfs2: can't find protocol [ 2412.778754][ T2665] ock_nolock 04:06:57 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0x80045301, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xfffffffffffffffc}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="0000000000000000ffe2", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000040)={0x18, 0x3}, 0x18) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0xa0000) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r3, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000051}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xa0004044}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x60, r4, 0x102, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2e}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}]}, 0x60}, 0x1, 0x0, 0x0, 0x800}, 0x0) 04:06:57 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000180)=@ng={0x4, 0x7, "83f5bff0087d16127920e40899cadb4aa08dab36"}, 0x16, 0x1) 04:06:57 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x400040) recvfrom$unix(r1, &(0x7f00000000c0)=""/15, 0xf, 0x40000160, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2412.871367][ T2665] gfs2: can't find protocol [ 2412.871367][ T2665] ock_nolock 04:06:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:57 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:57 executing program 1: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x3ea, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:57 executing program 0: socket$tipc(0x1e, 0x7, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="dae552976d2e278a0ec61e6fe9ad3516a6636ff5bceda9be9efa544b5068c439617235c9e2d09f3176c54063662c7e1e54d263f8afe470e3d4873eb4ce63d456e5e66f1bbe348ac91a0672221c1388bb9cd6ecac070e349b383ea9fc8e2346b881461b1d821501437f96b9134a6cfb1fcd1b679245089923a8c3fb39eeee82e346855b3a8a3ecd982060d16c0769fec49b31a1f08f6aecf4f49def3167b4adead4d4807f0f905bc0d97268546846327c8e87b939a1031c16ef820d430af6da98decb1462f48c86e9c579dd6c43c6c8", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:57 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) [ 2413.051704][ T2761] gfs2: can't find protocol [ 2413.051704][ T2761] ock_nolock 04:06:57 executing program 3: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000180)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='fuse\x00', 0x12000, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@euid_eq={'euid', 0x3d, r3}}]}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2413.125085][ T2761] sysfs: cannot create duplicate filename '/fs/gfs2/127.0.0.1' [ 2413.135902][ T2761] CPU: 0 PID: 2761 Comm: syz-executor.4 Not tainted 5.1.0-rc5+ #70 [ 2413.143812][ T2761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2413.153865][ T2761] Call Trace: [ 2413.157218][ T2761] dump_stack+0x172/0x1f0 [ 2413.161563][ T2761] sysfs_warn_dup.cold+0x1c/0x31 [ 2413.166514][ T2761] sysfs_create_dir_ns+0x242/0x2a0 [ 2413.171634][ T2761] ? sysfs_create_mount_point+0xa0/0xa0 [ 2413.177209][ T2761] kobject_add_internal.cold+0xe5/0x5d4 [ 2413.182766][ T2761] kobject_init_and_add+0x101/0x160 [ 2413.187974][ T2761] ? kobject_add_internal+0x380/0x380 [ 2413.193362][ T2761] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2413.199610][ T2761] ? vsnprintf+0x58b/0x1af0 [ 2413.204141][ T2761] gfs2_sys_fs_add+0x1aa/0x470 [ 2413.208946][ T2761] ? recover_store+0x160/0x160 [ 2413.213725][ T2761] ? snprintf+0xbb/0xf0 [ 2413.217892][ T2761] ? vsprintf+0x30/0x40 [ 2413.222055][ T2761] ? set_blocksize+0x2bf/0x340 [ 2413.222076][ T2761] ? memcpy+0x46/0x50 [ 2413.222111][ T2761] fill_super+0x12f5/0x25c0 [ 2413.230852][ T2761] ? gfs2_online_uevent+0x1f0/0x1f0 [ 2413.240534][ T2761] ? snprintf+0xbb/0xf0 [ 2413.244694][ T2761] ? vsprintf+0x40/0x40 [ 2413.248861][ T2761] ? wait_for_completion+0x440/0x440 [ 2413.249502][ T2822] gfs2: can't find protocol [ 2413.249502][ T2822] ock_nolock [ 2413.254846][ T2761] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2413.254863][ T2761] ? set_blocksize+0x2bf/0x340 [ 2413.254881][ T2761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2413.254907][ T2761] gfs2_mount+0x504/0x5de [ 2413.283598][ T2761] ? fill_super+0x25c0/0x25c0 [ 2413.288306][ T2761] ? kfree+0x1fa/0x230 [ 2413.292387][ T2761] ? vfs_parse_fs_string+0x116/0x170 [ 2413.297676][ T2761] ? vfs_parse_fs_param+0x510/0x510 [ 2413.302887][ T2761] ? fill_super+0x25c0/0x25c0 [ 2413.302907][ T2761] legacy_get_tree+0xf2/0x200 [ 2413.302925][ T2761] vfs_get_tree+0x123/0x450 [ 2413.302945][ T2761] do_mount+0x1436/0x2c40 [ 2413.321132][ T2761] ? copy_mount_string+0x40/0x40 04:06:58 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') setsockopt$inet6_buf(r1, 0x29, 0x1b, &(0x7f0000000180)="ae5bcb5e539d4cb89b373c83cbac6ffb0d0057504a2e6942e424f9fccb92dd2256692a9cb12e22b6a20eb536170829daf385c2e8c3e8671d350cc0856f56a6e7f11f96092d9e704c0b70cd8aa679ac168eece72e8eb36504e949d75f065a6d6b6fc7a206f18c87c53b214d92d61b", 0x6e) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) socket$can_raw(0x1d, 0x3, 0x1) [ 2413.326121][ T2761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2413.332369][ T2761] ? copy_mount_options+0x280/0x3a0 [ 2413.337575][ T2761] ksys_mount+0xdb/0x150 [ 2413.341831][ T2761] __x64_sys_mount+0xbe/0x150 [ 2413.346517][ T2761] do_syscall_64+0x103/0x610 [ 2413.346539][ T2761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2413.346549][ T2761] RIP: 0033:0x45b69a [ 2413.346563][ T2761] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2413.346571][ T2761] RSP: 002b:00007f5bad5b6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2413.346585][ T2761] RAX: ffffffffffffffda RBX: 00007f5bad5b6b40 RCX: 000000000045b69a [ 2413.346593][ T2761] RDX: 00007f5bad5b6ae0 RSI: 00000000200003c0 RDI: 00007f5bad5b6b00 [ 2413.346601][ T2761] RBP: 0000000000000000 R08: 00007f5bad5b6b40 R09: 00007f5bad5b6ae0 [ 2413.346609][ T2761] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 04:06:58 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:58 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2f67726f75705f69643db0c36bbb8d57a59681df50b11df6ea", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$netlink(0x10, 0x3, 0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1042000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x4c, r2, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x40}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x8040) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) r3 = accept4$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x0, @multicast1}, &(0x7f00000003c0)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000400)={0x7c0000, 0x8, 0x6, 0x8, 0x0}, &(0x7f0000000440)=0x10) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000480)=@assoc_value={r4, 0x3}, 0x8) [ 2413.346618][ T2761] R13: 00000000004c7740 R14: 00000000004dd778 R15: 00000000ffffffff [ 2413.353457][ T2761] kobject_add_internal failed for 127.0.0.1 with -EEXIST, don't try to register things with the same name in the same directory. [ 2413.429910][ T2761] gfs2: fsid=127.0.0.1: error -17 adding sysfs files 04:06:58 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x603, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) [ 2413.658507][ T2867] gfs2: can't find protocol [ 2413.658507][ T2867] ock_nolock [ 2413.733433][ T2867] gfs2: can't find protocol [ 2413.733433][ T2867] ock_nolock 04:06:58 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x2) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) 04:06:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001940)='cpuacct.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000001980)={0x0, 0xfe, 0x2}, &(0x7f00000019c0)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000001a00)=@assoc_id=r1, &(0x7f0000001a40)=0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="f7066380d6ed689f970e72855004fabff0d2c4e4f7a606de510e3810c348a1f8fbaf7f960d13184380eafe0d9c2d1936c4beb018f1a9876a5e67692c015822460aa7d5910ff70f6d94a62d7feb9cc73093a0771a6079e4d9e2440c8d22bb7b54fed89e7d6a93deb96a9bbca2d2f3042951ff1ee2d6e911348b1b23e5cbcca9bbb5c8491782ba01000000e5241d14131cda667689"]) r3 = geteuid() stat(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x7f, 0x6, &(0x7f0000001580)=[{&(0x7f0000000180)="c0aee6d49adbada59f16e93b1ca916684802d09c59ccc118b1a578a6e541586fcb1d99c72a1153c9a98284c39e17b2989f52019d9ae7640e46ec01b20a3326a22d23fdd62f706160c4ba667bcb193a57a66012ef50df0441064c9d139d89b1c2dd42bfc4d434cbca972a0cdcab0ad618236a54b415e671b843", 0x79, 0x1}, {&(0x7f00000000c0)="45a084a48d3af84bffdf764e9dde926677fd96b3f57c5c454451391cd81f739a5957c003ca99804bfda148883ea157d42dc267c9e84a2075", 0x38}, {&(0x7f0000000240)="50a694df9b6f4f0610b9b6d851a8e7da8c0c11b320f0a1874e270a42e1f371acb986afbbc0b3d6a45d5769d55ea249ea5023c8d5386201bfedbb4694ae3474c182a8568df5238485ffad6cdcdc2a2cffebde38dabe073d6c5f20325a0994a1d59d7ebf611720ac9e1ada44d5fc1072e46c3c31ffe9b74b454bcdfc9195d7e08d92cfde966f37a48a5b03eaaa60f7a005ffa18f7d69ed9cccc86c547635be64909296bdd23bf05ca072504a23a97cae8362c7d06f96af21c5cee03c178ae298c7", 0xc0, 0x400}, {&(0x7f0000000480)="f6d0c075fd4312c76a6e6c890d85415ccbd6ccdfee35ec04eb5c74d4d2458057053423fd01d0c67979aa66f9148de12143f951c81e4cb56f17adac66d784783aace43768e1394547bb04fc49c770a82957c45eade2b7dfe9faa0b8e09fdc3d4f7fbaabb9fc53eb909269f3c74dd6921fb1554174dc0ddcc80a8e6492da34f5c4170c46b390ea3c0a992b0091144f426a24", 0x91, 0x7}, {&(0x7f0000000540)="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", 0x1000, 0x800}, {&(0x7f0000001540)="cdff214a49e59e83586c1f869a1ed81e01f7f43bcd7106625c2cca9c322f27f4ce690bd05efa2b9c4012c093a16df196eb", 0x31, 0x3}], 0x200000, &(0x7f0000001700)={[{@nls={'nls', 0x3d, 'cp737'}}, {@umask={'umask', 0x3d, 0x1000}}, {@nobarrier='nobarrier'}, {@force='force'}, {@nobarrier='nobarrier'}, {@creator={'creator', 0x3d, "49c56f00"}}, {@decompose='decompose'}, {@decompose='decompose'}, {@nobarrier='nobarrier'}], [{@subj_type={'subj_type', 0x3d, '+#vmnet0[mime_type'}}, {@smackfsroot={'smackfsroot', 0x3d, 'fuse\x00'}}, {@measure='measure'}, {@fowner_lt={'fowner<', r3}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x32, 0x64, 0x37, 0x36, 0x77, 0x32], 0x2d, [0x62, 0x77, 0x0, 0x3b], 0x2d, [0x7f, 0x62, 0x30, 0x76], 0x2d, [0x63, 0x77, 0x0, 0x65], 0x2d, [0x71, 0x32, 0x75, 0x65, 0x36, 0x7d, 0x77]}}}]}) r5 = pkey_alloc(0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000018c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001900)='/proc/capi/capi20ncci\x00', 0x4003, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000003b00)={0xffffffffffffff9c}) accept4$tipc(r7, &(0x7f0000003b40)=@name, &(0x7f0000003b80)=0xffffffffffffffb0, 0x7fd) pkey_free(r5) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18, 0x4}, 0x18) syz_open_dev$cec(&(0x7f0000001840)='/dev/cec#\x00', 0x1, 0x2) syz_open_dev$admmidi(&(0x7f0000001880)='/dev/admmidi#\x00', 0x0, 0x40000) 04:06:58 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:06:58 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x80800) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000380)) getuid() getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getpgrp(0x0) fstat(r0, &(0x7f0000000480)) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000005c0)='user_id', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@ipv4_delrule={0x30, 0x21, 0x1, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_SUPPRESS_PREFIXLEN={0x8}, @FRA_GENERIC_POLICY=@FRA_L3MDEV={0x8, 0x13, 0x401}]}, 0x30}}, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000007c0)) getresuid(&(0x7f0000000200), &(0x7f0000000840), &(0x7f0000000880)) getegid() ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000008c0)) fstat(r0, &(0x7f0000000900)) getgroups(0x4, &(0x7f0000000980)=[0xffffffffffffffff, 0x0, 0xee01, 0xee01]) ioctl$VIDIOC_EXPBUF(0xffffffffffffff9c, 0xc0405610, &(0x7f00000009c0)={0xf, 0x1, 0x100000001, 0x84000, 0xffffffffffffff9c}) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a00)={{{@in6=@ipv4={[], [], @empty}, @in6=@initdev}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) lstat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)) 04:06:58 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x200) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000080)) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x20, 0x80000) lseek(r1, 0x0, 0x0) 04:06:58 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:58 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) ioctl$TIOCSETD(r1, 0x5437, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="66643ed52a6d7e194e41e223fbbc74c84f6a2f2daf75bd2f2d17fcbb511254a8ce4ca123f5bc129233188775cdb21c8b9debc2329b5840b3f974025668d5a5272b8ba492d0eb61e04ca34876e90c111a0800dd40b37b07771d73f8b2a6a3a54540f0c4d528f377d60ae8fecf20244b29b84c0d5f186ac56fe2dc", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18}, 0x18) 04:06:58 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2, 0x0) 04:06:58 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) r1 = shmget(0x0, 0x3000, 0x400, &(0x7f0000ffa000/0x3000)=nil) shmat(r1, &(0x7f0000ffb000/0x2000)=nil, 0x7000) [ 2413.906626][ T2880] gfs2: can't find protocol [ 2413.906626][ T2880] ock_nolock [ 2413.923169][ T2883] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 04:06:58 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = getuid() mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2413.997056][ T2880] gfs2: can't find protocol [ 2413.997056][ T2880] ock_nolock 04:06:58 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='!\x00']) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x240c00, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000200)=0x1) write$input_event(r1, &(0x7f0000000140)={{0x0, 0x7530}, 0x1f, 0x6, 0x69}, 0x18) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000180)={0x1, 0x1ff, 0x1, 0xeb0c}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'bcsh0\x00', {0x2, 0x4e24, @local}}) 04:06:58 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x3, 0x0) 04:06:58 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:58 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) ioctl$TIOCSETD(r1, 0x5437, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="66643ed52a6d7e194e41e223fbbc74c84f6a2f2daf75bd2f2d17fcbb511254a8ce4ca123f5bc129233188775cdb21c8b9debc2329b5840b3f974025668d5a5272b8ba492d0eb61e04ca34876e90c111a0800dd40b37b07771d73f8b2a6a3a54540f0c4d528f377d60ae8fecf20244b29b84c0d5f186ac56fe2dc", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18}, 0x18) 04:06:58 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0xfffffdd0) [ 2414.180772][ T3103] gfs2: can't find protocol [ 2414.180772][ T3103] ock_nolock 04:06:58 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x4, 0x0) 04:06:59 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x15b, 0x410800) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x1f, 0x1, 0x400, 0x6, 0x7fffffff}, 0xc) 04:06:59 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) signalfd4(r0, &(0x7f0000000040)={0x87}, 0x8, 0x80000) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18}, 0x18) [ 2414.300276][ T3103] gfs2: can't find protocol [ 2414.300276][ T3103] ock_nolock 04:06:59 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000180)={0x60, 0xffffffffffffffda, 0x1, {{0xffffffff, 0x3, 0x1, 0x29ba, 0x9, 0xfff, 0x800, 0x7fffffff}}}, 0x60) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYRESHEX=r0, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESOCT=r0, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:59 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:06:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x300, 0x0) 04:06:59 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r1 = getpgrp(0xffffffffffffffff) sched_setparam(r1, &(0x7f0000000040)=0xff) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:06:59 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) ioctl$TIOCSETD(r1, 0x5437, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="66643ed52a6d7e194e41e223fbbc74c84f6a2f2daf75bd2f2d17fcbb511254a8ce4ca123f5bc129233188775cdb21c8b9debc2329b5840b3f974025668d5a5272b8ba492d0eb61e04ca34876e90c111a0800dd40b37b07771d73f8b2a6a3a54540f0c4d528f377d60ae8fecf20244b29b84c0d5f186ac56fe2dc", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18}, 0x18) [ 2414.487267][ T3526] gfs2: can't find protocol [ 2414.487267][ T3526] ock_nolock 04:06:59 executing program 5 (fault-call:5 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1000000, 0x0) [ 2414.555504][ T3526] gfs2: can't find protocol [ 2414.555504][ T3526] ock_nolock 04:06:59 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000130000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',groupd=\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) r1 = dup(r0) getsockname$tipc(r1, &(0x7f0000000040)=@name, &(0x7f00000000c0)=0x10) 04:06:59 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) [ 2414.660199][ T3701] FAULT_INJECTION: forcing a failure. [ 2414.660199][ T3701] name failslab, interval 1, probability 0, space 0, times 0 [ 2414.704538][ T3701] CPU: 0 PID: 3701 Comm: syz-executor.5 Not tainted 5.1.0-rc5+ #70 [ 2414.712459][ T3701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2414.722547][ T3701] Call Trace: [ 2414.725858][ T3701] dump_stack+0x172/0x1f0 [ 2414.730206][ T3701] should_fail.cold+0xa/0x15 [ 2414.734810][ T3701] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2414.740629][ T3701] ? ___might_sleep+0x163/0x280 [ 2414.745491][ T3701] __should_failslab+0x121/0x190 [ 2414.750438][ T3701] should_failslab+0x9/0x14 [ 2414.754950][ T3701] kmem_cache_alloc_trace+0x2d1/0x760 [ 2414.760333][ T3701] ? lock_downgrade+0x880/0x880 [ 2414.765206][ T3701] snd_seq_port_connect+0x60/0x510 [ 2414.770332][ T3701] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2414.776585][ T3701] snd_seq_ioctl_subscribe_port+0x1e5/0x310 [ 2414.782495][ T3701] snd_seq_kernel_client_ctl+0x101/0x150 [ 2414.788152][ T3701] snd_seq_oss_midi_open+0x542/0x6a0 [ 2414.793449][ T3701] ? snd_seq_oss_midi_setup+0x50/0x50 [ 2414.798845][ T3701] ? __mutex_lock+0x3cd/0x1310 [ 2414.803624][ T3701] snd_seq_oss_synth_reset+0x486/0x8f0 [ 2414.809094][ T3701] ? snd_seq_oss_synth_cleanup+0x480/0x480 [ 2414.814960][ T3701] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2414.821221][ T3701] ? fsnotify+0x811/0xbc0 [ 2414.825572][ T3701] snd_seq_oss_reset+0x79/0x2b0 [ 2414.830434][ T3701] ? fcntl_setlk+0xcd0/0xcd0 [ 2414.835039][ T3701] ? snd_seq_info_done+0x30/0x30 [ 2414.839983][ T3701] snd_seq_oss_release+0x74/0x150 [ 2414.845025][ T3701] odev_release+0x54/0x80 [ 2414.849361][ T3701] __fput+0x2e5/0x8d0 [ 2414.853355][ T3701] ____fput+0x16/0x20 [ 2414.857346][ T3701] task_work_run+0x14a/0x1c0 [ 2414.861948][ T3701] exit_to_usermode_loop+0x273/0x2c0 [ 2414.867251][ T3701] do_syscall_64+0x52d/0x610 [ 2414.871857][ T3701] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2414.877753][ T3701] RIP: 0033:0x458c29 [ 2414.881652][ T3701] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:06:59 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:06:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2000000, 0x0) [ 2414.901277][ T3701] RSP: 002b:00007f88e9c9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 2414.909690][ T3701] RAX: 0000000000000005 RBX: 00007f88e9c9cc90 RCX: 0000000000458c29 [ 2414.917752][ T3701] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2414.925723][ T3701] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2414.933871][ T3701] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f88e9c9d6d4 [ 2414.941847][ T3701] R13: 00000000004bf189 R14: 00000000004d0350 R15: 0000000000000006 04:06:59 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000042001, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f00000000c0)={0x3, 0x5, 0xbbb3, 0x0, 0xf, 0x7, 0x0, 0x20, 0x3, 0x5}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2ce9"]) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2415.011801][ T3811] gfs2: can't find protocol [ 2415.011801][ T3811] ock_nolock 04:06:59 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) ioctl$TIOCSETD(r1, 0x5437, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="66643ed52a6d7e194e41e223fbbc74c84f6a2f2daf75bd2f2d17fcbb511254a8ce4ca123f5bc129233188775cdb21c8b9debc2329b5840b3f974025668d5a5272b8ba492d0eb61e04ca34876e90c111a0800dd40b37b07771d73f8b2a6a3a54540f0c4d528f377d60ae8fecf20244b29b84c0d5f186ac56fe2dc", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 04:06:59 executing program 5 (fault-call:5 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:06:59 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x3000000, 0x0) [ 2415.098396][ T3811] gfs2: can't find protocol [ 2415.098396][ T3811] ock_nolock 04:06:59 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2415.165954][ T3922] FAULT_INJECTION: forcing a failure. [ 2415.165954][ T3922] name failslab, interval 1, probability 0, space 0, times 0 [ 2415.200275][ T3922] CPU: 0 PID: 3922 Comm: syz-executor.5 Not tainted 5.1.0-rc5+ #70 04:06:59 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xc00, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) [ 2415.208201][ T3922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2415.208208][ T3922] Call Trace: [ 2415.208236][ T3922] dump_stack+0x172/0x1f0 [ 2415.208260][ T3922] should_fail.cold+0xa/0x15 [ 2415.208282][ T3922] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2415.208302][ T3922] ? ___might_sleep+0x163/0x280 [ 2415.208320][ T3922] __should_failslab+0x121/0x190 [ 2415.208336][ T3922] should_failslab+0x9/0x14 [ 2415.208353][ T3922] kmem_cache_alloc_trace+0x2d1/0x760 [ 2415.221947][ T3922] ? lock_downgrade+0x880/0x880 [ 2415.221975][ T3922] snd_seq_port_connect+0x60/0x510 [ 2415.221997][ T3922] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2415.222018][ T3922] snd_seq_ioctl_subscribe_port+0x1e5/0x310 [ 2415.231065][ T3922] snd_seq_kernel_client_ctl+0x101/0x150 [ 2415.266441][ T3922] snd_seq_oss_midi_open+0x41d/0x6a0 [ 2415.266460][ T3922] ? snd_seq_oss_midi_setup+0x50/0x50 [ 2415.266489][ T3922] ? __mutex_lock+0x3cd/0x1310 [ 2415.266510][ T3922] snd_seq_oss_synth_reset+0x486/0x8f0 [ 2415.266540][ T3922] ? snd_seq_oss_synth_cleanup+0x480/0x480 [ 2415.266554][ T3922] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2415.266570][ T3922] ? fsnotify+0x811/0xbc0 [ 2415.278405][ T3922] snd_seq_oss_reset+0x79/0x2b0 [ 2415.278421][ T3922] ? fcntl_setlk+0xcd0/0xcd0 [ 2415.278438][ T3922] ? snd_seq_info_done+0x30/0x30 [ 2415.278453][ T3922] snd_seq_oss_release+0x74/0x150 [ 2415.278474][ T3922] odev_release+0x54/0x80 [ 2415.294763][ T3922] __fput+0x2e5/0x8d0 [ 2415.294785][ T3922] ____fput+0x16/0x20 [ 2415.294800][ T3922] task_work_run+0x14a/0x1c0 [ 2415.294828][ T3922] exit_to_usermode_loop+0x273/0x2c0 [ 2415.305032][ T3922] do_syscall_64+0x52d/0x610 [ 2415.305054][ T3922] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2415.305066][ T3922] RIP: 0033:0x458c29 [ 2415.305089][ T3922] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2415.317118][ T3922] RSP: 002b:00007f88e9c9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 2415.317133][ T3922] RAX: 0000000000000005 RBX: 00007f88e9c9cc90 RCX: 0000000000458c29 04:07:00 executing program 5 (fault-call:5 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2415.317141][ T3922] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2415.317150][ T3922] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2415.317159][ T3922] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f88e9c9d6d4 [ 2415.317167][ T3922] R13: 00000000004bf189 R14: 00000000004d0350 R15: 0000000000000006 [ 2415.481876][ T3929] gfs2: can't find protocol [ 2415.481876][ T3929] ock_nolock [ 2415.497487][ T4133] FAULT_INJECTION: forcing a failure. [ 2415.497487][ T4133] name failslab, interval 1, probability 0, space 0, times 0 [ 2415.537758][ T4133] CPU: 1 PID: 4133 Comm: syz-executor.5 Not tainted 5.1.0-rc5+ #70 [ 2415.545689][ T4133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2415.555761][ T4133] Call Trace: [ 2415.559084][ T4133] dump_stack+0x172/0x1f0 [ 2415.563444][ T4133] should_fail.cold+0xa/0x15 [ 2415.568048][ T4133] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2415.573870][ T4133] ? ___might_sleep+0x163/0x280 [ 2415.578729][ T4133] __should_failslab+0x121/0x190 [ 2415.583675][ T4133] should_failslab+0x9/0x14 04:07:00 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="66643d989205aab9abf08d6bebbe7d80eafdc7ea3086b93119afa1ad30b84f15f22f24199da53abbec9486dcbed847cc76bf5164ce12503531e1690216737e95ad59fdf7af7a0937e6f8ce75d4a95fadde464e859c8e8082714e370df2f027fb0bbb7a784d61a92a643b076f25d3090c8432670aa6570836d68ee5164fe7e48531924933d1c5716c9cd4cbf38383992d9317969271373e4c4a1220aef7", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75700069643da8b2520058639b6a70d6cb9971bd64900e0b996cf1895cfafd293a49a8a3fa0507c06f1000ac2213f57c0a46a888aaf1239a70cbe1d9212725693ddae874d6238a9df6d6b96576b47643aa31e5d1957c9b48ca2dfb15be81ba40c1834b02c8e9cc3128980a7b38dd653a8f0c6b2d9343c3e3cd2d4fc3a97f7e6470a4efd17bc7a6b197f3024bbc00", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2415.583695][ T4133] kmem_cache_alloc_trace+0x2d1/0x760 [ 2415.583711][ T4133] ? lock_downgrade+0x880/0x880 [ 2415.583738][ T4133] snd_seq_port_connect+0x60/0x510 [ 2415.603553][ T4133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2415.609781][ T4133] snd_seq_ioctl_subscribe_port+0x1e5/0x310 [ 2415.615694][ T4133] snd_seq_kernel_client_ctl+0x101/0x150 [ 2415.621312][ T4133] snd_seq_oss_midi_open+0x542/0x6a0 [ 2415.626580][ T4133] ? snd_seq_oss_midi_setup+0x50/0x50 [ 2415.631945][ T4133] ? __mutex_lock+0x3cd/0x1310 [ 2415.636720][ T4133] snd_seq_oss_synth_reset+0x486/0x8f0 [ 2415.642169][ T4133] ? snd_seq_oss_synth_cleanup+0x480/0x480 [ 2415.647970][ T4133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2415.654215][ T4133] ? fsnotify+0x811/0xbc0 [ 2415.658532][ T4133] snd_seq_oss_reset+0x79/0x2b0 [ 2415.663367][ T4133] ? fcntl_setlk+0xcd0/0xcd0 [ 2415.667939][ T4133] ? snd_seq_info_done+0x30/0x30 [ 2415.672858][ T4133] snd_seq_oss_release+0x74/0x150 [ 2415.677886][ T4133] odev_release+0x54/0x80 [ 2415.682225][ T4133] __fput+0x2e5/0x8d0 [ 2415.686202][ T4133] ____fput+0x16/0x20 [ 2415.690164][ T4133] task_work_run+0x14a/0x1c0 [ 2415.694759][ T4133] exit_to_usermode_loop+0x273/0x2c0 [ 2415.700028][ T4133] do_syscall_64+0x52d/0x610 [ 2415.704625][ T4133] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2415.710496][ T4133] RIP: 0033:0x458c29 [ 2415.714381][ T4133] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:07:00 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x4000000, 0x0) 04:07:00 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000280)=0xe8) ftruncate(r0, 0x4) getgroups(0x2, &(0x7f00000002c0)=[0xee01, 0xee01]) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x8000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}, {@max_read={'max_read', 0x3d, 0x9}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1a00}}], [{@func={'func', 0x3d, 'PATH_CHECK'}}]}}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:00 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) ioctl$TIOCSETD(r1, 0x5437, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="66643ed52a6d7e194e41e223fbbc74c84f6a2f2daf75bd2f2d17fcbb511254a8ce4ca123f5bc129233188775cdb21c8b9debc2329b5840b3f974025668d5a5272b8ba492d0eb61e04ca34876e90c111a0800dd40b37b07771d73f8b2a6a3a54540f0c4d528f377d60ae8fecf20244b29b84c0d5f186ac56fe2dc", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2415.734016][ T4133] RSP: 002b:00007f88e9c9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 2415.742418][ T4133] RAX: 0000000000000005 RBX: 00007f88e9c9cc90 RCX: 0000000000458c29 [ 2415.750385][ T4133] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2415.758338][ T4133] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2415.766289][ T4133] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f88e9c9d6d4 [ 2415.774242][ T4133] R13: 00000000004bf189 R14: 00000000004d0350 R15: 0000000000000006 04:07:00 executing program 5 (fault-call:5 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2415.820396][ T3929] gfs2: can't find protocol [ 2415.820396][ T3929] ock_nolock 04:07:00 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xf6ffffff, 0x0) 04:07:00 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f726d6ff2faff228064653d30303030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:00 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xd00, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:00 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@remote, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2415.945274][ T4147] FAULT_INJECTION: forcing a failure. [ 2415.945274][ T4147] name failslab, interval 1, probability 0, space 0, times 0 [ 2416.003967][ T4147] CPU: 0 PID: 4147 Comm: syz-executor.5 Not tainted 5.1.0-rc5+ #70 [ 2416.011901][ T4147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2416.022462][ T4147] Call Trace: [ 2416.025771][ T4147] dump_stack+0x172/0x1f0 [ 2416.030128][ T4147] should_fail.cold+0xa/0x15 [ 2416.030153][ T4147] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2416.030193][ T4147] ? ___might_sleep+0x163/0x280 [ 2416.040571][ T4147] __should_failslab+0x121/0x190 [ 2416.040588][ T4147] should_failslab+0x9/0x14 [ 2416.040605][ T4147] kmem_cache_alloc_trace+0x2d1/0x760 [ 2416.040628][ T4147] ? lock_downgrade+0x880/0x880 [ 2416.050406][ T4147] snd_seq_port_connect+0x60/0x510 [ 2416.070215][ T4147] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2416.075948][ T4147] snd_seq_ioctl_subscribe_port+0x1e5/0x310 [ 2416.081858][ T4147] snd_seq_kernel_client_ctl+0x101/0x150 [ 2416.087503][ T4147] snd_seq_oss_midi_open+0x41d/0x6a0 [ 2416.087522][ T4147] ? snd_seq_oss_midi_setup+0x50/0x50 [ 2416.087551][ T4147] ? __mutex_lock+0x3cd/0x1310 04:07:00 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) ioctl$TIOCSETD(r1, 0x5437, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) 04:07:00 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xfffffff6, 0x0) [ 2416.087573][ T4147] snd_seq_oss_synth_reset+0x486/0x8f0 [ 2416.087595][ T4147] ? snd_seq_oss_synth_cleanup+0x480/0x480 [ 2416.087611][ T4147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2416.087633][ T4147] ? fsnotify+0x811/0xbc0 [ 2416.103038][ T4147] snd_seq_oss_reset+0x79/0x2b0 [ 2416.103056][ T4147] ? fcntl_setlk+0xcd0/0xcd0 [ 2416.103073][ T4147] ? snd_seq_info_done+0x30/0x30 [ 2416.103095][ T4147] snd_seq_oss_release+0x74/0x150 [ 2416.124912][ T4147] odev_release+0x54/0x80 [ 2416.124929][ T4147] __fput+0x2e5/0x8d0 04:07:00 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) stat(0xfffffffffffffffe, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2416.124953][ T4147] ____fput+0x16/0x20 [ 2416.144825][ T4147] task_work_run+0x14a/0x1c0 [ 2416.144851][ T4147] exit_to_usermode_loop+0x273/0x2c0 [ 2416.144870][ T4147] do_syscall_64+0x52d/0x610 [ 2416.144894][ T4147] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2416.153194][ T4147] RIP: 0033:0x458c29 [ 2416.153210][ T4147] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2416.153218][ T4147] RSP: 002b:00007f88e9c9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 2416.153233][ T4147] RAX: 0000000000000005 RBX: 00007f88e9c9cc90 RCX: 0000000000458c29 [ 2416.153240][ T4147] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2416.153256][ T4147] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2416.177544][ T4147] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f88e9c9d6d4 [ 2416.177554][ T4147] R13: 00000000004bf189 R14: 00000000004d0350 R15: 0000000000000006 04:07:01 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000280)='/dev/snd/controlC#\x00', 0x6, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000002c0)='user_id'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000003c0)={{0x3, 0x7, 0x870, 0x9, 'syz1\x00', 0x4}, 0x6, 0x120, 0x7, r1, 0x1, 0x6, 'syz0\x00', &(0x7f0000000380)=['user_id'], 0x7, [], [0x2a, 0x40, 0x3, 0x3ff]}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18, 0x4}, 0x18) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'system.', 'user\\em1selinuxkeyring,-eth1nodev%-\x00'}, &(0x7f0000000180)=""/218, 0xda) 04:07:01 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1000000000000, 0x0) 04:07:01 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2416.256207][ T4257] gfs2: can't find protocol [ 2416.256207][ T4257] ock_nolock 04:07:01 executing program 5 (fault-call:5 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2416.330437][ T4257] gfs2: can't find protocol [ 2416.330437][ T4257] ock_nolock 04:07:01 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030303430b3e1735d818020931c6f7141", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000180)) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) prctl$PR_GET_NAME(0x10, &(0x7f0000000340)=""/98) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f00000000c0)) 04:07:01 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x100000000000000, 0x0) 04:07:01 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xe00, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:01 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x13) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:01 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) ioctl$TIOCSETD(r1, 0x5437, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) [ 2416.518270][ T4413] gfs2: can't find protocol [ 2416.518270][ T4413] ock_nolock 04:07:01 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200000000000000, 0x0) 04:07:01 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030308ccdfa91af7be43694722b153030303034303030382c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2416.618754][ T4413] gfs2: can't find protocol [ 2416.618754][ T4413] ock_nolock 04:07:01 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xf00, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:07:01 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x3}, 0x18) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1000, 0x8c000) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) 04:07:01 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x300000000000000, 0x0) 04:07:01 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x4}, 0x39) 04:07:01 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) ioctl$TIOCSETD(r1, 0x5437, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') [ 2416.804565][ T4802] gfs2: can't find protocol [ 2416.804565][ T4802] ock_nolock 04:07:01 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x400000000000000, 0x0) 04:07:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x401, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x2, 0x100) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000100)={0x0, 0x0, 0x2080, {0xf001, 0x2000, 0x2}, [], "d9c9a32b995df17e632413244d3d8157142b2d2ac94315020437052de9222ad4dc83dc8be5a24ed7fa80c9ab30bd0afb4083b0d430070dd2280e90bcda5ed7c95d30b7e6ab6caba15f57b7f0f3d43a469c30842f056872ce734f368d6b78b623c97d4e1b9a482dffe1d55e8b353cf9bbde111ef7a4d463b89a5325d5d0f05f6340fe82bb3e19d87dcf0ab09c5aa73f67cd93be771c46807e0ca27c947dfb0057900e9d64062485248e2f543ab251de450f683802e6959526973ac940722624f3457445ba757a8edf6a825b1e376c6dee42b5ee10e639112a11c9ff42da0b7f58bdf523ae0bd3904d6943008631645b3ceb7f1c014ce984327c4b57081d492ff8a177447fc4aba1f8c7f5cdbedacf46471d3d08d8c27c5a4514a9b731cd3aac7f81ded107f81932340ebdec4b97f9d7f5ce612e3939a2324d748f1288573506f6ad40d91fc23308c5a912f83fe9e134c39d7d0b3bdc6a5cb31f756a3011d7ddd311787b24bdb19e395ae347633063f8ffba19353dadc37acaa7a43ae3449a2e3e83ca64dbc1448f3a04528be8b9d509250fb01aab97bcd27fa53f5e8475a11bb9510211e521ff57a90d23048fdaa5866bb014d75579d238cc5de1f30573d88a5a8eb7aeebd67d8311de5022515d2c888b48d7e5ae583e31ed12474efc00fda624d6638ffec5dd307d620befb6847957f463f87475f6456e40b7db0d60f988fcdffd5adfcac569b21b15f520c8e41937edb3fc8bc7de44f81f7fe93594e5ff70af6271eaa258a8398b445aca386fbf3ce43930d0562634e5a60f5bb1f10525d0d9fb900c1ca03e9dcfd79f32d51999c587f96bc593d456271bc0fa07a75897570e8d40a9a498cee9c0d7339ab86e932ff2ff3ea24568d3b4a370601030855b38d48297a41ae0fc9b754b714f6aa04f956fc1339e94e3cf16b748940f6547909f6755c697c517425e32d75c2f5159b0e8b8ead532174d94cecaf844b0700791c850e9ff2f729ea7d21aa1bb6c29426c93686bacae52c039361e640426f242bd90c989cb9223c831bb01f7c3e4a9a3406574b894daac44465c3d1fdea06cb185d0e803015d7b997c69fc6f0c16c0b2d8cd0c47365dc6605b904a55df3593ef090c7d62f8b701416c2362a1db086d0053edb3655081d1dc69d24b55439da443ee18fad95ddfdb2ab6814eea0fe2e2566062bc581792590624711a1b2fa7501e489167fe3eea893e764fee108eb9e1779fde754b95196b20f313fd698f6467f21a13b0d0d1469b5e9a07c2605caba82a5c500636b1d0debd12490f045df9a7a0a74642af9b5361c8ec95c0ca41d4f8477b543ce56102733074f57ea8418d41293684fa3166faf0c8eccd29ad3fa7e1d3009083691e3ddd36197279bedb9fb0c370ab1732d08870964f743a70f0ede0c84ce29f79a47629e09bb160405647594bbef9b677c97afcac9bef6a60246d7b1138f181fcdb57d64dd248c7dd631189983c325cc3f5213343e36d6e9b773092c07794555448a7103f735a36a9efd7096ba778c316f54f46af0ce6345644f9221d9be37bf34ed2d52198f73829f870db6a533f601638e257c3b840860f3bf78c69563645648a06c8ce3695ced846239fe0e84f41e6363871145a7e575833c7d3272eff4de1a0276dcf4441161e114db0cdfb354c9742cd701c5be221af37331240662e3fad752e28b7ef0855bbd1e92d8f9e8ae27d8e059a411934cdb142fafbd559288339d3ab62c37c8f3e89be702d3c0bd5131a0e391dd9d28ebdeb0e46400059e06d4bd1646b40ad07bdcf8056347167b33866106a8e6c3fce89bd70a7a0093376e48ca9e1c8907a66e8ae1194750cda88da802c4df57d20ecea82498d54f62ca59e097248e16d7901d273c16a734f50411e21e66c7042fb7452f98e987a49d01b3058f1a1948d0b4a0613f7b0aba8ed83e67d50ca6c528b9466453fb923b3385f879673fe42b35303956544cfe69676d3983d1b8b4835f19936a9e0b423f2ce9bb492680814dae7a5d39bf5d80bc13f29d9aac17c512351922c2600f4a4112fb78e63299cd3958e75fd515787525ad2ce2d7e97fe6d9e06dd18e474b260cd6e13d67896fa268d55179e5c15a9ec16e809f9547f6f09fdca3ff09a34669a898d120bc4eaecf62f23e2931be4b5e7e7469c8f099f322c58d56dd2fea3789db0c5a4989968849b0362be76cb4ab2d1d78d2ea74a8699aab45ea3142856f367759d5ef2f8bd09830ef09aaac621fa51c5a144d76f91e3de31e1b472c260a233c032f0bac397104d0bf35cb5a841e7e439438692fad3ed4d307c76aa2a8172c2e4996f80c2d426173e9b5272ca57c9525fe695237db7a7422620c19e0d96d68f5e2acc27e1e42bcbbb9028432680ea1fca6a91b1aae1afb721c11cfb189518f5a6a5bb1c277d969dea1a8abc2496dc5ff7518fcdc746815f8cd514843949e4f0a8901732b88460cca333d5b55f081493481cb0fa0cb0070f800cad6fd224e9d01b1535eb9a7ced3f4d3fe15e02e8e53496bfd9aa4e915b0851124491ca4ef7f64e15864a0437c7e91b602b29a3e8d0083b3aa821269f03c5b5382f6fb8c546872aff11677bf5e95c27449c2dd299832f734ab0780031dbe3569dad85b90d62faaaa50e8fa9d3fd248b399e83f21894139a736a57ca2e267c8cda7c192650e2f117af28133cdb9b7ec8966524bcbff67f9d6c73f0ac0fc9a4382a85d4bc57abbf7e04859e95c59914bc28f23560770a26e09f49ed0e4d556dc730e222d1bffb33f0e69aeaa24b753cc26bc72ff3c940c1e3298c386cf1e9e9297f81cffcddb98f9856d82641c58935b28f6a7ac8082f7a677c29544e44cc95be3c697e96142c0661e3d1426215c4e2f625e04865aa2fab0f44eedfac16cd1091e06b075ff68cf7644d4e3dd4ea65f097c60f96e951a151c81c4304e203a565f0f979109e56489d774f1020b721c5911bccd68c8462b25c6f34f866e7ebffe7276634366239340dbd85567463ec280b073830c8696ff449414735172fdb0055f9f90b9d266bb545d83f0b04c04ec92ade4b504864d822b97f46577299d58550dd6baa8e7baf266c1dfb5f6cadb693d894d2d54cf6b6a87060c3dcf42f79a3cbf5709ab59502abca59d05a0d851e9a606123e68b63b8a33476777994bd9099a5b93816f2b0658b245a52a94e0c930928847bf14b26c62f19762d7956dee808af55742e78119f978ea533a30a397a0f8826e7808fff8034f671f3957b2311cce6a31221f8de7ea0d550cb61165d43b4b82b1b9d909e3b558348f31b15835549f1c5ac4a48dfcd4249e2df4ffb8943d04898c5afd818b2ea91ba27491dd0bf30459ec83ca9b06d32ce72a42092e2d42b4d2609c5361f476dcacd9730a406bff5791d4bc9fa176065435ec7923a4ff6c51cb62522af85f774f180806032a3c3147e620eba080dab5f4db990add3688332ac9479987c27ffdf9ab6ce745f9e899ae97642578f5958b153166f5385c82d9d2f0494f48dcd2a15463dc327253bac9a273bde3d0cdc45aabbe49e8ab570590f613b1e5dd2b1a6e52991ce43565ed63741530950ada3d285ae1efccb0f1b77fdc5d748a98ff01bc6772eee21b2588ee8d7b90809514ffab424dd0cdd38c7994e8e516a4114c11e3f83ffdc03cd08472cdd37adeb9a6e58cbedd921195cdb0c8afb81302613500f47aac60c349d3f56d88f85024446ed44b94b758b69ac3295a2266b7e10a254e01842136184cca9b0e5bc2e9211242cab3fd1171bd4048e6baf8c402ce2b24cb8b22d5fa1cb743ef45bb6152f35c005ce95eb4091a0185468552f4b399a3f6abf08cf81b2f695bf686a5a13c9b0fab65b0d9c200c43d74cc694a121a60bc1fe4ea2f29b4c868261c883972910311af88370ee8549c7e77304d679728b26a1e5feff29013c11238bf5a9eccde6acd981d7120225f03bf10cf2afcc14285647644c43e672faf0fb89bf43f33671fd3f929be51f4888fca6d0f2ef49fa9f946c0af22f2a9b56a19bc9603f07c7675df17a4d439ad6a92b1060126fb15928f912609e71411b5377f745e3bce06fafa838b2e89decdd6a176e174fdeff76059244c6213b2b3f0a078dbeff7b45398d77ee20f4b6690d7478e2105d6811d8cb22af5f822e87c532305859d75d75388b75c1808f02950daf9d55b70e3df47cc5084e73f05f4f138aae71d884aef3f888e24bad9d8e7a73a145d969ebb59163d8ffcf422325da3350b149974140b1edeba12321639100ba2d86d67826e539bd4bbfb7126c74f06fe57c6aab888338872c94344c454bb8b9af107aa7bda23e656663d4d86072c9d09950d97aa6db250f6bb7afa0169f5955c580b82827ee48872affcb6aa7e123e36fad37526b192a2837ac70b2b4ad13c9250c12f4d8c17b26253a0e985f77d56819ff89e79854c3baa9d69ce4e54c903de662936f43a99328193f98537860ccdbff1c6ffd002698087f56e13f7a4519371c43ce270c8dcdb07aa2380d6078b545114181293d3b9fbec46591082b7008a9df8f0b64e4d3dea65f9ec6d0c739c8a1414ddcab909dc2f6c10bf5932c3bd4db7d37e1067aab1972082a362bc5e0a1dcf86eee894ea8e32374fd2c7a81f53df608543fb546ce81decf9eeedcd490f1a285a1c4cad4dcfa68f30cc485a758b58110fed0d300b8cf72226bfff35414cd6bb044cfe21117b6071660192fe5fd92d613719ca00e47fdcc1a2cb6fd42083ba5dc48e181acbe1858b945f74eda96666daa57213c28e48bb64ed9926fb1ddae4fdb4997089ec48e61d3febbe6ab619cc6a40a0c7b966568eb10f03ae827cbbf8a2ee2ec52b336df052658d1333997a855d7a5ec62ed4920389cec61d36ea5e16fd9b70c2e661455350d6c1c8651fa4f5f7121a19399ee94c8b7d6c52f7a6d8b5c21d7d5ef20c4438e4e9751ae6eb31733b9af652b8a8f14c88805d216ce577bdee20bf5e081bfe4a6e9f74b2be12fee1554da7f4cf26080af46245cafa909bb702660ae1712bc070c53901e7dde699da03fdb59d308c858c0704180b5e4f66c3f3081d65581f4b057546d189c81cf886fb089adba98a37b8f07e5a33d55c030e2875d08dee1c034e96d3e4e198f43c2682cb2c00766e57c6417715764c2ca054be91502aabf616cb84a8226d7bb6a975e5f55f154aadc2af4c4a7d71b58753235167d85b357bc74d4a3c09150888021840be70b1341fbbd0a04f1c278155d7b18030ef8587b177258e50d9e1581826f077cebace4f0e13b7a6f1b057cfd2762695ffa083ae85ca93e9e54baab7c0aab72bfb4471899b4ed5ccde7ebca0f3a8f164f28ad65512297931f6a454d5ce88f9721b132026e4f705f492105aba39775ff56d604bc88911e4514d72d881fb2b29aff32c592eaf06267ab1961e5b6a70bdfee1c86ea71cabe19cb65d4acf1b9d2e977128850019a66b9828b99de7d23ab80de9f13fc637bc7f08c3360253293b63937c7124fac629f03875b1a23aa81e6480af07d95e4614d6f71dcf6febd774b164abae803638fd38e2449767beb88d547a22f38036c61e44055ddd7bc18ea4b45a7b31e94fb55888f0059bed359c326feccec68b7d25953774ffc3f9d0f7bca256f254a213c07cec031777c50f230d24a5013f34aa97f430e792a01b0de99ed06736b759f9f5048ba2fd83ce2773b95d954ab07fa4e79b913b49e1b2462b89066bc3c8a9aaf725b3480803db4f33d57684f2de09817c4847ecb65a857a5f2f6e621f8699dab1d5ad61bda07a7f5ab0ed472d422", "7eb1fefdc8cf99cedac48f534711798593471f9e7ca3046c98b5f46df20a10e5414fb1cdb77b0e6b38005a5deb065ce42b0d15e9e30a2eed03dd9ae5de240bb46ff394a6d8f98c4721252463c4855d3d21beb0f191dbf529b77b97200f6af713e728fc3de6f84a73f886d150ead0a6e8f0eb26f91b2d7d49cdd2a2af91ff542f3ef6cd4f734d161c2c52b18df4ce9c4ebe6be8a761026715c7b33b72cf0a82a9c01843574e38bb8a8e32a041689e26d37407b650465a2510cf0484f91fcd5c1324ec7ac029c56398c0a0c05fbe49f60c83be0577173081ddd09375b49406b221ca40411e95bf366244d454fb12d07a523ff399d1e2a57e085b56e0293351fa545bf82ad68583b1a01ecd89b9edbb9a448a4b98eac7d70a29e42aec3cb898341119b2b164ebd88b9303b966266f615980458b71b7795a12836a8fd65e1a74987b2940e5427102bce188020f5f78c9146e1b1a0cf58c8fa197271042aa4e35501c57ed24859d8294c8132f8d207010055dcd69b4951c641bf6f4d625e54c4d4c6dd87c1f871e4dc03383049ab5ff3e62f433c651e8721dcffc6537432f23d92feabd2f47dea61e7ab32b116d2475329a5637e462bad33ac090d13062d844d4ff0b14c9e58d0d5f44715676b7a38d1a22e4a32546399483898a978d8c281690a34983d3bb451526ab4b0340b8c0d5d10e80e1fcb8be6f88ef09ad95e74846bb4fbd61b81e9b81c03f6c0ecfc256c9d2a2430f8ad167b9fdbf4679727890b43b3454583fe9b30e298f9a90a06677d6670b8f459932ef19de16e3fc53e746bf8726ddff11f0190e1e4d09698c8840fcc691f252451aedea66aecbb6fad73246cff7931f1a18d5c4265d7c5cb66389bcc7bae364768ba029a2ee2c7d079c802a81f647ad7e376b102acf54f74f3311eba931777bee6602914d3bc3101dea78d90bf2d1e7c86d2ae1ff64f022899b08b4801651a96e20d8ba9b48322ec3317d8f6d46817f342249b21daeb816a3804ca8ebbdf0f63bc300bb8aa91244f92648a3e24961da7175b987aa9fb6dc481b81f7b3de61b56b7a1c477c3b72ff3fb388cb587acf99255406f62a127d3b4dd74fe66d8fc3c5170965f5a7d10f7093c8e12325e6c72f894bfa2d1c967fe63ad237daaa48b8135eb701e39007602d0555fa7e8888d5d087b7c8ae50415bb7514ffa163ad965d199e2d2be8d26a85f4ab5bb92f71aecea7d1ca0709b06cc983fb3c4eee11482dfb804dfadcf4f42a649f21b22f0d9d39615db7779b435f2e6e32e0be283023bd21e36b0c623ad3ae3ceae4e8583255bb76131d7054e2fc4c6207c6242ee790eecf3bdf9b982978c006434e93d059d6e3fcdf4bd5b4f635b61bce3a28d94cb14eb33ca3eadce14a28f3c88cd9af458956c15c2e14e7bbe2c17deae268705d67d282c59e8d656a704ed20773e5a279e9c90fc4a203bc13067846d6329bb65aeb2b4fcdf2741b7bbe4ae9d251b23e678a48daaa517c43a192785273656fb460a89ed76c3df7db6a62d0c7362e9c77df4cb8ccea3cc278edc0aa1e5c52acb8d086ad1884527519d59eef09e9995b566f73a1eef346493fef9357821a17f8d353b2a77bbe5d59d2fe2803f11d0670023366dc1c96b13093c69dfe30cc1c8822d7f1e6cc805f55690983246ce29ed930861014cc23745cf132c17c66c0faa14167678a0d24e1b3eb319e5be9e53c3323982992904c9822017fef34264eef0b0f8e901e4cb6e1d5f4a7ce063fd3d0d2384db7893229fdb687d220bf1c24d7477cc6bd484d317532f8a3fcf49025688317ad7bd4695563ae83b47ca8e88292cbf7178470ab0d505bc84f35f2ab5eaf29602e62ee6d6459144ef70d2872eeacd07e1d66edf51ab60a26e4d5d21ac70d93845a8e4fb622f4a8a1d6d837527f55a9ca6dea93706eaea496301db49546e9082465da28f258f3b51641b953cc7ee8002452abc5227542a0b640d6ac84102c5a474fc6bb4c3b612f134afc9ba1148aa1248db49cb78ca4ea4109d96e538073f500b0350a52491b34598eb4f8395c840276c6e329a2f95f6d2f5bc8c627c27a1a22f0360f5bc72bfb64580b125726241a446bc61512de476527059a43c347f10e089cc7f17c042e8d2953d62c491091f9026c0ad96c9d365fe16b806da9f11d2f89c272335b5aa1ca25f4e05f0c6649977ab88c4b0048f10bd7fc7482ec27166325ddfb815fe6e315420df541b0d5878876116d162b015f35f5992ff0e10fb84c25f774383a132f9dc609a643bd0d3f7df0ec3d011544b05a031225aa4ed6650813a436ea5812726ab79ca8548ad7d29f631f8119e6e4cd0f30c48c93261e312677ae9b867f73f1965248c9391ff97fd0baefee9e177a334c99861bc3d1dfa1027061368176e45f1dd801a3e7cab62d3cd5975d4d8eb4be2519e87dbee1d2b7ea61fa78c21cf9329f4cc2b34ad03fbb5d7dd597b1cda9210ef99c5bfc3f5da6364dab47d2abc41edb3bb4f3cb1fdfc023e60a838481cb599786ac78331ed7f9c28f2270c70cd0ea3782b2e7e72e94a25e96e14c8f583d0e9d0bb440da3438997d3f944b2c87a86b028bb7309ac1cb2215e1b5fc483841cce7bd0014352581a7cfc62daa9f4018b7d71826483c25b8473512e33fb169bf562841b30e46692580471b7cb0966678f3341e7fbb0e2cd1925c2fa824e1f7b87e4aa9fd8f53b33a0142bdc60dee8e40091bf63ded0f71d2feaf33de8c8091257e187b282ad4001d9cf43b393f94c10c12d51361bd7e4327797b705af4b6e02588e55df5c6493ea3ce5192afb04fa67269d476c33c3a3dc9e2dc4d1dcf9b476f99f8d0136f475b0c8a029d3480d3fd3ec83449e627fd10b9fecab40237ff6f40be5fd50523575b93d4d0d41b04e5dd9d0fb3163ba4b19fa2ea7099724c13c06c4e09934b790fb998bed54eccf0a846742872e506d697f06852ede8f5a96dfacf0d8208260b03e2b2d92ab2a9b7685c56cee64b833c5d55b78aba2bc0f7072c8668a9429883f23d32d7c0f795169b0c1b797c1d22120abcb2bd0affa7b7c0df6784cb3082f2a7253344b82a1b2974d8dacdb048af4f40294ab277641aec28ffdd860ea5162ede1f3a1f24a6a816c6a3c0c34422217be7e13f9b9de0684a44e9716625f7390c0c44a83f9d2fa7455cd962804082065a51110143217123c9a73473719a99035662586ee05a8ad8943f0f48f5fc41a94c8f40daed44f27bd2a85e207b61ca65a9f9ccc1cc6f2bfa83bed3be6e965188fcee0d78c0ba783168839a9bc2199b83ea9694479d4c7b0234691cf2fb8adc4696594f74f62caae68ebe417783121f310305e5a69e908920c8452219aa39470bf12ad3a2e6cf35463e4933b5ee5582c3c65b355f7a19dcac9803e806bdfb5c3a8fa286df916ea244146ec81aa885306e0c5633462ffc9f4ac44f694a6a0082612dc4724759367e166361b695c27ac05cd464d1d10a78a50eaa2c31b7b49e24fd524486566f3207e6597085f9e904f72067d50d7176a70a90fea0cddca574a5b23738edd7045f4544894d0547ad2a4e015a1d8b2253f0e77f1247e73d9f77d88602d835571e1429176935548d5171246c8d4c9cdddf187e321093a460f59ed387d3ed21463d4cca20a173d46ca3bc9c27c22b91cbda636a28811f06046038ecd7be28507723da6a3a9d8bc8b6ebdbae3b9df155c98783613bca7bfd19bbdd08373e13cfe46152a2b1102795e0697f4e6a534cceb883cada3a2c1bd643690481377565fe1fc0038c28c0586026105146d54a494b45a4d03ba2fc6ae2f09d8d8c07060cce862418e248a8cf1e66dc62269d6500775b721be0258ebfb8857c0e0e0caa2a1c5c8b3639ac15d6b2aa510736a8ef8f876e2766c71e71658bff760637192b1497ca7c765ec251ce1842a7d60798596c6c229f2e6a6ec95217c307e5c98d4183583d99b81bc39802256d3c449df7541212547bb4bc4fee0cf617c1739290446e7c387bbf70c876fa151a96fcd7ef84189550d35ce41f7d7ae654ad25c2f678d33cd4ed4b8733cfc59287af093c434a168740c1beb30e69acc4cea32d74eabadecc330e7a0f33e4189c788b7632a2310ad58c439d5d367ff3e5f486caf83b4850c59f72fc0c42cdb6a7a86d04887bce09bd9b6c4b15c081dd4b6bb0ec97dd2e89be31725fc6ba613dd26612acbe8f0cfba36d26bd39aa8ddad8b8a0136e17c848b36e1aa7522e6ec265a6db0ec1d457df79967667d2d1affded7095bd31b64b766f18ccd9badb7d39802474a674336f6e6ac7b70bb12301cb0872532a47355cdba3c5590d44ddc08ff7ea4dc842ade2135462b64ec6c5ffd9b9da0b5131f04bea788186739b15b06406ef2cc893fa6551dff2ef86406f6944c6ba9f3caf1f1861ff99a018a17d5c72c2838efb371d03f40580d5d4ca997bb6f321ff778f4f2b7f6da564fad61c33ce3a263fc799f23757bc9b4b8cbc1fd7888992075efe069f624112d91dbe0eaa445099b112e2ca66ea2c9ff2dd248d51c3bb07d149dc46942e70e165c675b35c5a8437375f2835ce745335b4d39b81365e578e431ae3eca2ccd014bfd97e59d223cb4237ee7dc16487013728e4d18e3a4505ceab5c36473a55ef49a9f280932a10240dc1ec827c0f86bc13f9087ca746503a1db200ad7a302df49ed0a94469e21031d4e489c7ac35d42725d13932d39d891563e85bd4fcc80e7fefa8efeadc9cb2741ad1320a217fc3489ff85d820c7b4c637cf553d1cf1f0d2c4c693e48a23d71976e9096d5087b84948ec81a877adf7445ca79487878906c319f48e1a852aba1243f669d7ee3613dd3d95a213ab41939e5fb99c267de60b380284acc453309eca3108edf3e822f24b3246fbd2d3b8980a90dbf74096bad93bf19eb8a00f442e44b5a111d8d165d2b7f329018d4ef5021293764bc49e3049ab751bfc4177fa9c2c6d2f475cd14e7885923a21d0fee5dc818421d2029c6222a1674332537af34e1fd62d333d80440e7e14b84bfc31270757be4fa69b9b0f5bdc82e73bfc2dde518c64cba609fba65e38b2b4c1a43d234cac8d1f852918ff4f94231cd3357a195f33fe072aa202cdc41a4e6478bb18ada8a2319c802f85597eeec0569b3390f45fb70e8236997412d79c4e3582a514a6d45f3ea98d7cc21d42f49ed9c0cf857fac75e9392bbe66a9bf4dee7ee0fa7982c657b3f90a88dbacdd9cf5a4cf546eb18202902b43dccdd3030a66fae9b3bbe77d0a7324d3dee46f41ebe634d113a79be4c1427f8e6911d6fa32484eea6238cab46064ad1a05ca895bac0d43d663508ad8a47590efebe813ab12602ee6be3ef082364ce21f28c5c87389b2231601baa22ae51d9650fea80a04eba195157b28972ffe9debcaf7a7c22c1c957120a631f7cf4acb344129f883558f38d020f40f92c3ca709679e5d428745f84af4ba7425f5f00d00c066140606f6207b26aeb191f6abc1eb4cb8e15a82cb8b4ee8d82eeb9b0e87f4f65a8ef7ec53f2d51de65a7f6f801922e8d0d3d76f2218958cac84435a9f2ad864608402060b452b26ced085e1003b36ef67b8be790bd477d7c8dc444aa0705c619aca0d8e0679b7b7df01c2377bad1e66960cebda6c8d1fade73d69300f4f37c9123669db88ad768dd48c09ee04068d70716f317991427d6686f8df2ddf757cd84083bde669942b05681a5e428385d12b66dd1f34cae970cf239efdcbab33e3ad6084ab813a5d0aef5e9ba53acbbc114d7e6b88246f6895a3524c057dbe5a0aec49c5c797a204597fe6f9c3309"}) read(r0, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r3) 04:07:01 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = dup(r0) ioctl$KVM_SMI(r2, 0xaeb7) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x40000000004000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1800}}]}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2416.907210][ T4802] gfs2: can't find protocol [ 2416.907210][ T4802] ock_nolock 04:07:01 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xf23, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:01 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) fgetxattr(r0, &(0x7f0000000040)=@random={'btrfs.', '\x00'}, &(0x7f0000000180)=""/196, 0xc4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:01 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xf6ffffff00000000, 0x0) 04:07:01 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) ioctl$TIOCSETD(r1, 0x5437, 0x0) 04:07:01 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69873d", @ANYRESDEC=0x0, @ANYBLOB=',uid<', @ANYRESDEC=r1, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) r2 = dup(r0) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f0000000080)) read(r0, 0x0, 0xffffffffffffffac) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f0000000100)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r3) [ 2417.125480][ T5015] gfs2: can't find protocol [ 2417.125480][ T5015] ock_nolock 04:07:01 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:02 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x2) [ 2417.212565][ T5015] gfs2: can't find protocol [ 2417.212565][ T5015] ock_nolock 04:07:02 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = getegid() stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) creat(&(0x7f0000000040)='./file1\x00', 0x140) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, ',\x93'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_gt={'fowner>', r2}}, {@uid_eq={'uid', 0x3d, r2}}]}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:02 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:02 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:02 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x4) mkdir(&(0x7f0000000140)='./file0/../file0\x00', 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="66533d17c5baa09d7072aa434db0add31bd79456823dcef292059f077d5a202216369c00000000000007ff8bc639d51ac8f7a4e0f3118d53716f624d2e887f836fa1cc156a72bb5d18d056f91652406b1d761a4c748327b560989deb9c308ac00a0d331feb4b2fe9", @ANYRESHEX=r0, @ANYBLOB="ac726f2a08000064653d306f7b303030307328f73031303034303030303030341d4ac163fc755e69c1bd36b37d303030302c747396adf8430bed9164fa67c3a0abbb65725f23203d4a00", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000240)={0x0, @bt={0x10001, 0x3, 0x0, 0x1, 0xd4e6, 0x101, 0xa63, 0x400000000000000, 0x5, 0x0, 0x81, 0x7, 0x4d, 0xfff, 0x0, 0x2}}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)=0x4) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000180)=0x5000) ioctl$CAPI_NCCI_GETUNIT(r1, 0x80044327, &(0x7f0000000200)=0x401) 04:07:02 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x3) 04:07:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fstat(r1, &(0x7f00000001c0)) r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r2, 0x0, 0x0) r3 = semget$private(0x0, 0x3, 0x404) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) semtimedop(r3, &(0x7f0000000080)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000140)={r4, r5+10000000}) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r6) [ 2417.419095][ T5253] gfs2: can't find protocol [ 2417.419095][ T5253] ock_nolock 04:07:02 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x1) 04:07:02 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) r1 = dup3(r0, r0, 0x80000) sendto$unix(r1, &(0x7f0000000340)="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", 0x1000, 0x487ff, &(0x7f0000000180)=@file={0x1, './file0/file0\x00'}, 0x6e) [ 2417.505036][ T5253] gfs2: can't find protocol [ 2417.505036][ T5253] ock_nolock 04:07:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x8, 0x10400) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) dup2(r1, r2) 04:07:02 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x1) 04:07:02 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1100, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:02 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:02 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x4) 04:07:02 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x1) [ 2417.689501][ T5383] gfs2: can't find protocol [ 2417.689501][ T5383] ock_nolock 04:07:02 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x300) 04:07:02 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="66643d7f72d756a6185b22ff724f1dc8c2aacf9b013311f2937467be02f66cc393c0c55109d6eb47cd8e4214", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x14680, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x40, 0x4002) mkdir(&(0x7f0000000180)='./file0\x00', 0x1c7) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0xffffffffffffff4e}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r2, 0x7fffffff}, &(0x7f0000000200)=0x8) [ 2417.764195][ T5383] gfs2: can't find protocol [ 2417.764195][ T5383] ock_nolock 04:07:02 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socket$inet6_udp(0xa, 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:02 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1200, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000180)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r2, 0x0, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r3, 0xc0086421, &(0x7f0000000140)={r4, 0x3}) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x2000, 0x0) dup2(r2, r5) 04:07:02 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1) 04:07:02 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x1000000) [ 2417.928780][ T5597] gfs2: can't find protocol [ 2417.928780][ T5597] ock_nolock 04:07:02 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.opaque\x00', &(0x7f0000000340)=""/172, 0xac) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030305f69643d7e18fca7f831c2d89360a68f827d1d351bb8b1727f00ff4c3d822fecc3cb874f20e410df32b64e63e75d76cbff2f060e80acea2c076922f669c1feb516305a39f212f981e3d73b03235f103101e74680f9876bb9ee3ee249da002eba800e9893fd8d784d1bb960241859dc0ff6fe1c90606663b193f149e7a0872d483e7cb64c521184aa62b0702dd691993ed6f17d6dd2fca6f94ada7af6694694adce54dd83c715ef262f53a98caaa3c12b94fed368029b52", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xfff, 0x200000) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x200100, 0x0) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000140)={0x0, r2}) r3 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) read(r3, 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r3, r4) 04:07:02 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chdir(&(0x7f0000000040)='./file0\x00') write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:02 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x2000000) [ 2418.023143][ T5597] gfs2: can't find protocol [ 2418.023143][ T5597] ock_nolock 04:07:02 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1300, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:02 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1) 04:07:02 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x3000000) 04:07:02 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000340)=""/186, 0xba) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643dba4e13ef1a88a0deaa47ae565ec68829a565bb7158025e9d5e746645485a9269c5dfc6e8f4efcdfb09b9e5771898be5428b92febe7c8a224f6b889bd1d7fd188c79487a02cdb15e89241a510feac5e16420b7b99bf1ef208e38e08584b8e03b41d13041daa47b675fd129ba5c1f0fc085807958c108080b4fc6246615ce406fee92640c4e281b4b3918c04548f7c78332bb914f06685c9a08a37d8299f6092ffed32940ddf671d0c55c9dbbaf3fa258f6cd7c2f2e224f46e15f5e376e511ee0c56d728245d8da0", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2418.189614][ T5736] gfs2: can't find protocol [ 2418.189614][ T5736] ock_nolock 04:07:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0), &(0x7f0000000200)=0x4) read(r1, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) r4 = dup2(r1, r3) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e22, @remote}, {0x2, 0x4e21, @loopback}, 0x200, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000080)='syzkaller0\x00', 0x8000, 0x8, 0x1}) [ 2418.289516][ T5736] gfs2: can't find protocol [ 2418.289516][ T5736] ock_nolock 04:07:03 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x4000000) 04:07:03 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1) 04:07:03 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1400, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:03 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fD#', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x8000, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0)=0x7, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000200), &(0x7f0000000040)=0x68) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x82c0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) 04:07:03 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0xf6ffffff) [ 2418.455283][ T5956] gfs2: can't find protocol [ 2418.455283][ T5956] ock_nolock [ 2418.537204][ T5956] gfs2: can't find protocol [ 2418.537204][ T5956] ock_nolock 04:07:03 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x404180, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="123d5a8a97537f24fe7ccf45d8c662c820888f187d8205142bd330112087c2c6839f05a21bbd77aa8dc4a3f8dc4b3ca62943ee44d3719e6e4fc899bff26c6a841d2f68c4d9978f86b4971210e6e45cdd8ea772366c6b8eb330c0660e155d0dc590389ddcfe8ace6178d6788a2bb8e27094b20a333dfa413a9a00d31e3063642296181a3242f4a7b4aa2d80fe67f1423cf61e05232c28a88a6ee1f1ad34b4caba2bedb04310e8727b4b37", @ANYRESOCT=r0, @ANYRES64=r0], @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f6400020000000000003030f9f212b530303030303034303030302c757365725f69643d283fc6da08007d8c6735aa58490658a45159ed7b63221c746b8296c1c4562b4a956acf06003e9d6e0873c105adbe8741ad40b06fd7b341316318b66573081d72eb282c31b49c46492406eeaa1d1a32c03b587284b78a9d8897364586a63501f0608d0ecbeb3e9be5a50927c8a8ab029aec59734d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:03 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1) 04:07:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000080)={'ip6gre0\x00', 0xf8}) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:07:03 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1403, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:03 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0xfffffff6) 04:07:03 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x5, 0x4, 0x20}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2419.002755][ T6150] gfs2: can't find protocol [ 2419.002755][ T6150] ock_nolock 04:07:03 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, r1) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:03 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x1000000000000) [ 2419.081961][ T6150] gfs2: can't find protocol [ 2419.081961][ T6150] ock_nolock 04:07:03 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1) 04:07:03 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f00000000c0)={0x7, 0xd, 0x2, "4003e7b01cbbaf16250a567444fff3eef3151adf7e8f332eb1348494844f33bd", 0x7f775f5d}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x10, r0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x2}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x200}}, 0x2, 0xff, 0xfffffffffffffffa, 0x8, 0x80}, &(0x7f00000002c0)=0x98) 04:07:03 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x100000000000000) 04:07:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x1, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x4000, 0x0) write$binfmt_aout(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/1214], 0x4be) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000100)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) r4 = dup2(r1, r3) getdents64(r4, &(0x7f0000000600)=""/87, 0x57) 04:07:03 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1500, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:04 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x200000000000000) 04:07:04 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400200, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x303) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:04 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1) 04:07:04 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) creat(&(0x7f0000000540)='./file0\x00', 0x40) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x7}}, {@timeout={'timeout', 0x3d, 0x8}}, {@common=@access_client='access=client'}, {@sq={'sq'}}], [{@euid_lt={'euid<', r1}}, {@appraise_type='appraise_type=imasig'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fsname={'fsname', 0x3d, '/dev/fuse\x00'}}, {@fsname={'fsname', 0x3d, 'rootmode'}}, {@uid_lt={'uid<', r2}}]}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2419.363799][ T6403] gfs2: can't find protocol [ 2419.363799][ T6403] ock_nolock 04:07:04 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="66643d5d792137bb55f9625ed580469a0da821eef6d2e82fc36ce07604b1526792afc7e7156942fb4c0e5593e2b38ccd79040c58bb34c1", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:04 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x109082, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000100)=""/26) recvfrom$rose(r1, &(0x7f0000000140)=""/89, 0x59, 0x10000, &(0x7f00000001c0)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r2) 04:07:04 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x300000000000000) [ 2419.465323][ T6403] gfs2: can't find protocol [ 2419.465323][ T6403] ock_nolock 04:07:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:04 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1600, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:04 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) sync_file_range(r1, 0xffffffffffff45b3, 0x5, 0x4) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="8b4d632e5d42fcb1c4971c87e1fac900bb56f9fa3cc3df53a89999735da5165955d8b7cc5759d0098c5ae203b1fbdbabc8e1884c4bdff2d792614f1cc88bcab2433b9bb16463fc0941cfe617f58bf24b7f87190fd5a943cecba85084137612cfe2f64c96884e58cb3f88d5a5295c71d0d1e196cf9a1f7b09b5e374bc4c3b9534015948b377c4c2bc17", 0x89) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:04 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x40200, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:04 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x400000000000000) 04:07:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x3, 0x4000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0xfffffffffffffffc, 0x3ff, 0x3ff, 0xfffffffffffffffa, 0x100}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000180)={r2, 0x9, 0x10}, &(0x7f00000001c0)=0xc) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r3, 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) sync_file_range(r0, 0xffffffff, 0x8000, 0x3) dup2(r3, r4) [ 2419.649556][ T6584] gfs2: can't find protocol [ 2419.649556][ T6584] ock_nolock 04:07:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) [ 2419.755213][ T6584] gfs2: can't find protocol [ 2419.755213][ T6584] ock_nolock 04:07:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:07:04 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) getegid() lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:04 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d692dc53930303030303030303030303030303030303034303030302c75736572", @ANYRESDEC=0x0, @ANYBLOB='0x0, @in6={{0xa, 0x4e21, 0xffffffff00000000, @rand_addr="4351676ec2a822bbed13251ce31597e9", 0xfffffffffffffffa}}, [0x7, 0x8000, 0xc6, 0x0, 0x7, 0x4, 0x4, 0x5795, 0x3, 0x1f, 0x3, 0x7, 0x8000, 0x7, 0x80000000]}, &(0x7f0000000480)=0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000180)={r2, 0x8}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000200)={r3, 0xcd7a000000000000}, &(0x7f00000001c0)=0x8) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={r3, 0x1, 0xe89f}, &(0x7f00000002c0)=0x8) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)) ftruncate(r0, 0x0) 04:07:04 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1700, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:04 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0xf6ffffff00000000) 04:07:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:04 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x2, 0x40000) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xdca9) [ 2419.973043][ T6751] gfs2: can't find protocol [ 2419.973043][ T6751] ock_nolock 04:07:04 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000280)=0xffffffffffffffff, 0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x400, 0x80142) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x2d8, r3, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffffffffffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x94, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa2a0}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x188, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7d78}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @local}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x10000000, @remote, 0xff}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bpq0\x00'}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4800000000000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffe00}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x30c}]}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x519}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xaf63}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}]}, 0x2d8}, 0x1, 0x0, 0x0, 0x800}, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000680)={0x18, 0x4}, 0x18) 04:07:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f00000001c0)={0x4009, 0x3, 0x800}) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x6, 0x440182) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000100)={0x100000001, 0x4, 0x100, 'queue1\x00', 0x2}) read(r1, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) syncfs(r2) dup2(r1, r3) 04:07:04 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) fcntl$getown(r1, 0x9) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x100, 0x70bd25, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x80) [ 2420.093072][ T6751] gfs2: can't find protocol [ 2420.093072][ T6751] ock_nolock 04:07:04 executing program 1: mkdir(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:04 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x12) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="0600000000000000bbc0", @ANYRESDEC=0x0, @ANYBLOB="0104000000000001"]) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x2002, 0x0) getsockname$netrom(r1, &(0x7f0000000340)={{0x3, @rose}, [@default, @default, @remote, @netrom, @rose, @default, @rose, @netrom]}, &(0x7f00000002c0)=0x48) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) r2 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18, 0x0, 0x8, {0x2}}, 0x18) accept4$x25(r2, &(0x7f0000000140)={0x9, @remote}, &(0x7f0000000180)=0x12, 0x0) 04:07:04 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1800, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:05 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/149, &(0x7f0000000000)=0x95) 04:07:05 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000280)) write$FUSE_DIRENT(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="80000000daffffff0400000000000000020000000000000001000080000000000a000000010000002f6465762f6675736500000000000000050000000000000000000000010000000a0000007f0000002f6465762f66757365000000000000000300000000000000040000000000000008000000ff0f0000726f6f746da04565"], 0x80) getgroups(0x6, &(0x7f0000000180)=[0xee00, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00]) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x2000000000000000, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f00000002c0)={0xfffffffffffffd8d, 0x4, 0x0, {0x7}}, 0x18) 04:07:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x800, 0x0) dup2(r1, r2) [ 2420.305674][ T7026] gfs2: can't find protocol [ 2420.305674][ T7026] ock_nolock 04:07:05 executing program 1: mkdir(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:05 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:05 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2420.394580][ T7026] gfs2: can't find protocol [ 2420.394580][ T7026] ock_nolock 04:07:05 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) 04:07:05 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x183800) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000280)='syz1\x00') r2 = dup3(r0, r0, 0x80000) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x30, 0x26, 0xb, 0x15, 0x5, 0x0, 0x1, 0x67, 0xffffffffffffffff}}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f6b643d83f7f15d4403d4e872c7afe7a18512d99ee13dc45dbccd2883f69616d1f81850cb79d6e03bd6b87c8ca7aa49913d7f710060e53e8565ad101d6a94e10d7875f6028c99b98f421f2d720950de9738bc7740d972f7c17256b9791c01ae9c19d1b3613551b5e8d2658d867e14f208efdb", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:05 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1900, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:05 executing program 1: mkdir(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x95289ca44b2f34cf) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x81080, 0x0) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000080)={0x5, 0x4}) dup2(r1, r2) [ 2420.609634][ T7190] gfs2: can't find protocol [ 2420.609634][ T7190] ock_nolock 04:07:05 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000020000020}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd26, 0x25dfdc03}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x880) lsetxattr$security_selinux(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:auditd_log_t:s0\x00', 0x22, 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:07:05 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x4}, 0x18) 04:07:05 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1) [ 2420.718463][ T7190] gfs2: can't find protocol [ 2420.718463][ T7190] ock_nolock 04:07:05 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1a001, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x2) ioctl$TIOCSCTTY(r0, 0x540e, 0x8) 04:07:05 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1a00, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:05 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x20000, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0xc) r3 = dup2(r1, r2) r4 = shmget$private(0x0, 0x2000, 0xa0, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_UNLOCK(r4, 0xc) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000080), &(0x7f0000000100)=0xb) 04:07:05 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x2, 0x109000) pread64(r0, &(0x7f0000000140)=""/93, 0x5d, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x2c) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="69643dff000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2420.951483][ T7486] gfs2: can't find protocol [ 2420.951483][ T7486] ock_nolock 04:07:05 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1) 04:07:05 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x100, 0x800) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f00000001c0)="f538da7295902ebdaf3746c61db6344012fd237a1dd6602fd6f68abaa036b5b710fec5634a06dd68188733bb3059c2b8b06ecce8c39e672840f358ca5fe7d8732cd62c348c02bd64447764e6f44fb0e3a3b1f26dfa47b7c6dbc91b07bd0165c44342c3567b8f42a154b25def92e924eba30eb2b151844ff6a973ca281347193839bbd0f211c91027cf46bf7558bd1479a45d3b43baf0b929", 0x98) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x101380, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) recvfrom$rose(r1, &(0x7f0000000080)=""/234, 0xd9, 0x11ffe, 0x0, 0xfffffffffffffc46) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x80) getsockopt$inet_buf(r1, 0x0, 0x20, &(0x7f0000000280)=""/72, &(0x7f0000000300)=0x48) 04:07:05 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2421.077491][ T7486] gfs2: can't find protocol [ 2421.077491][ T7486] ock_nolock 04:07:05 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x921, 0x400) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f00000000c0)={0xd, 0x8, 0x2800}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:05 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1b00, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:05 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1) 04:07:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x301000, 0x0) dup2(r1, r2) 04:07:06 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x80004) readahead(r0, 0x3, 0x25c0) 04:07:06 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = fcntl$dupfd(r0, 0x406, r0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040)={0x1000, 0x9, 0x834c, 0x294000000000}, 0x8) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2421.264733][ T7739] gfs2: can't find protocol [ 2421.264733][ T7739] ock_nolock 04:07:06 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) [ 2421.336849][ T7739] gfs2: can't find protocol [ 2421.336849][ T7739] ock_nolock 04:07:06 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1c00, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:06 executing program 2: socket$isdn_base(0x22, 0x3, 0x0) r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x5514, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000240)={'nat\x00'}, &(0x7f0000000280)=0x24) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000000)={0x100000001, 0xf3f9}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000200)={@rand_addr="7000f7b0b8e77d5f396185b13ab34c69", 0x77, r3}) 04:07:06 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r2, 0x3, 0x30}, &(0x7f0000000200)=0xc) 04:07:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) r3 = fcntl$getown(r1, 0x9) write$P9_RGETLOCK(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="270000003702000207000000000000070000000000000000", @ANYRES32=r3, @ANYBLOB="14006b657972696e672b6e6f6465765e042b70726f63"], 0x32) dup2(r1, r2) [ 2421.489685][ T7998] gfs2: can't find protocol [ 2421.489685][ T7998] ock_nolock 04:07:06 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:06 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:06 executing program 2: r0 = eventfd2(0x8, 0x1) dup(r0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x200, 0x0) 04:07:06 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',gooup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:06 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3181}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:07:06 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xfffffffffffffffd, 0x0) r0 = msgget(0x3, 0x4) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r2, 0x0) msgrcv(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000065c502acf8e8789400"/253], 0x105, 0x0, 0x1000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) [ 2421.667611][ T7998] gfs2: can't find protocol [ 2421.667611][ T7998] ock_nolock 04:07:06 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:06 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1d00, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:06 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3, 0x0, {0x4}}, 0x18) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f00000000c0)={0xffff}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 04:07:06 executing program 2: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x3, 0x4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:07:06 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x101000, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x1}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d7c55cfd133bee4d53627a9675b25063b4b6970f3d2586b4099e3df7481a0228b76a51e08d50ab9621d1d956bdbf3305a011130739a0b509a4a580ff8c6aa257f6866724e038eca268b0870861b2b9a0d882f730a16", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75707f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pause() write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) getpriority(0x3, r2) read(r1, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r3) [ 2421.894909][ T8300] gfs2: can't find protocol [ 2421.894909][ T8300] ock_nolock 04:07:06 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:06 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) [ 2422.024903][ T8300] gfs2: can't find protocol [ 2422.024903][ T8300] ock_nolock [ 2422.034447][ T8355] Unknown ioctl 1074819277 [ 2422.063491][ T8355] Unknown ioctl 1074819277 04:07:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x1, 0x84000) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, r4, 0x103, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x68a5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe5}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x40000) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r5) 04:07:06 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:06 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1e00, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:06 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x200, 0x81112) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f00000001c0)={0x0, 0x80000001}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000000c0)={0x101, 0x22, 0x0, 0xffffffffffffff9c}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:06 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f00000006c0)=0xe8) syz_mount_image$f2fs(&(0x7f0000000180)='f2fs\x00', &(0x7f00000001c0)='./file0\x00', 0x180e9f3b, 0x5, &(0x7f0000000540)=[{&(0x7f0000000200)="d1cf90c2bb06ae6cbcbec90004b115a8b9fe39001e596678b975c2a9f54fcafb0bdd111300604e07e1ff3b5370d47531c8a7fd27bfd98d8a7ab6c1f19cbbd62ef70d6d48c9e6550bf657ca9e52d26058fdddfc91a54bf043f50ad06b7ea1acf0a63b28bfae6494cd16b1df69c877c8800a1eb4c4279f1a2314a431e9372fd56c91bdff101014f8a597aac3f50d567a42732b6a1efdeec0fa828bea73c16884b8bf775d24bc6b8d089f6e87291391a3dd139cd0a158e29132f1db5e421148a2135dc2305eae1c0fb0a53003", 0xcb, 0xd96}, {&(0x7f0000000340)="570a6a7d5412f182be1b5b4d196413d385b12431adb4882dbfbbdbfa277e94c13800c58b0b0d6e285694bd9ed07e76e7bbbb032ced2050c80c39ca2de31d0feb94d0af9b7460717e4ccf0cf12010c424e354e8e108e7b971701eb769", 0x5c, 0x77}, {&(0x7f00000003c0)="e6e99b6a4e41f0fd190f34fbf85dfb545bab69bc8975d1ea4b8b0e576d61bccb3f2f62d12188979d220a98cafccd4872e7d0f14a5050845a25c68f6bf8a50a1813b652", 0x43, 0x6}, {&(0x7f0000000440)="955b5efff84bccda519255dca7dc266f03e26c63e6308eab698ff69ccdead18926d3f8795d9fa980de9d5bb513c0888e985777dea3e9c69622d93cc85d7c0242ef5b715c587de4cfc82d743d20e5f2a469c45c85468ad13945e287abf0a408b9ba2bceb8378b1bfabdac323a7ef87d4dd443966fbbef798ecd11bd6124973d786e7e7b5d", 0x84, 0x8}, {&(0x7f0000000500)="5347bf002e778b747ec6ded89a37c45c414637fa441582a325a9f854790ced29ec6f92ce1802d49d6d4966e8", 0x2c}], 0x48, &(0x7f0000000700)={[{@flush_merge='flush_merge'}], [{@fsuuid={'fsuuid', 0x3d, {[0x77, 0x77, 0x77, 0x30, 0x31, 0x61, 0x31, 0x33], 0x2d, [0x77, 0x36, 0x37, 0x62], 0x2d, [0x34, 0x63, 0x34, 0x36], 0x2d, [0x63, 0x7f, 0x61], 0x2d, [0x34, 0x77, 0x65, 0x37, 0x61, 0x30, 0x77, 0x61]}}}, {@pcr={'pcr', 0x3d, 0x3e}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@hash='hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x63, 0x35, 0x63, 0x67, 0x64, 0x66, 0x34], 0x2d, [0x30, 0x39, 0x7f, 0x61], 0x2d, [0x33, 0x77, 0x65, 0x36], 0x2d, [0x37, 0x35, 0x75, 0x65], 0x2d, [0x36, 0x77, 0x31, 0x72, 0x62, 0x33, 0x39, 0x3f]}}}]}) r1 = accept4(0xffffffffffffff9c, &(0x7f00000007c0)=@tipc, &(0x7f0000000840)=0x80, 0x80800) getsockopt(r1, 0x3384, 0x6d, &(0x7f0000000880)=""/55, &(0x7f00000008c0)=0x37) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000900)={0x4, 0x10001, 0x5, 0x1cca2325, 0x40000000, 0x8, 0x4, 0x4, 0x7, 0x10001, 0x1}, 0xb) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00'/10, @ANYRES16=0x0, @ANYBLOB=',\x00']) fsetxattr$security_smack_transmute(r2, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x2) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0xc055f8073bf821d9, 0x4}, 0x18) 04:07:07 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) setns(r0, 0x8000000) [ 2422.215392][ T8468] gfs2: can't find protocol [ 2422.215392][ T8468] ock_nolock 04:07:07 executing program 3: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000180)=0xc) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:07 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:07 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c08af7b30a2fe28b1bc64760c331d2e7400473b29042218183f81ec81c55103fdf7570566ba7b1edb121e615ea302c99f38acf0836285f22483187f57eb77b081fee99ced4058feb3a5d91660769b22dd6fada5d01a765a679648cc0769ed7b49a0c6874a5cfff97537a237e812dd11e7200b2d0c40a7d8ca23f47ca0ff4c61d63b2229faa8f0a550430800000000000000ea28f32ce93ec0861333c4182fbe4853ed7d95a8c40a6b40d79a5f2f8da9038ec6d7a56b87bb29fe55bca06d3c0618edc8ae1c5a41564883007c248f8b0acda8c36c99a7e9cf5f6bdbffc9c712df048d6a26312dd49742b165c8a842eb7731f400000000000000000000000000005b030cdfe63adde9f2e2f1d24af7e0fe0b205c2d80142f364b4933fefedb4b7b2f9033df"]) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2422.315086][ T8468] gfs2: can't find protocol [ 2422.315086][ T8468] ock_nolock 04:07:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getpeername$unix(r1, &(0x7f0000000280)=@abs, &(0x7f0000000300)=0x6e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f0000000100)="339a819dab8ad417c1900c6da5b4b1cb0e7e247c2f933d80d54bc933e00d9beae05b2a0da98902280f29228f9d4eb1a2984456e901268cd400e39011e8dbb7a0de724825c70708cab13cce2cf597ca41958c3b4186cbfc6ba2af6e0b540e042a7c65469a21f773c1264c34232cd31d3d45696ea5652f8bfd0425399100d534db75e59f6fa63223e226145993ae6b798a28cc824c460b20004213e698942ea05bf790b7de9740f7d672a45f", &(0x7f00000001c0)=""/83}, 0x18) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000340)) r3 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r3, 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r3, r4) 04:07:07 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) listen(r0, 0x6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10500, 0x40) 04:07:07 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x1f00, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:07 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c766f6f746d6f64657a3030375bda6401888635303030303030303034303030272c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69641d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x4, 0x4}, 0xfffffdac) 04:07:07 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0xfffffffffffffffa, 0x3}, 0x18) 04:07:07 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80001, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x400}, &(0x7f00000000c0)=0x8) write$selinux_attr(r1, &(0x7f0000000140)='system_u:object_r:systemd_unit_file_t:s0\x00', 0x29) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000100)={r2, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000180)=0x9, 0x4) 04:07:07 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:07 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x80000, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000140)={0x20, 0x0, 0x8, {0x7fff, 0x4, 0x6, 0x7ff}}, 0x20) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400, 0x0) ioctl$KDMKTONE(r2, 0x4b30, 0xffff) r3 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r3, 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)) dup2(r3, r4) [ 2422.542993][ T8602] gfs2: can't find protocol [ 2422.542993][ T8602] ock_nolock 04:07:07 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000180)={r2, 0x2}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:07 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) 04:07:07 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2422.665237][ T8602] gfs2: can't find protocol [ 2422.665237][ T8602] ock_nolock 04:07:07 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x240, 0x610000) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:07:07 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:07 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x400800, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f00000000c0)={0x9, 0x5, 0x5, 0x6, "92045e9ee9974c9896ff920b7fe38ef3fc7181e2b395cb1a8b33cfdf562a0fe4"}) 04:07:07 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000000)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x204000, 0x0) 04:07:07 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="66643dee1114842851fbb88a4bfb6edacf0a39b640d8bc087782bd9043a7086001d242c9332c8131a4c7a36c4e4c8f8f402e7abd3803d1a504b5fa182b6cc1d6b3517ba7196bc308bf30d8fd9346d1aa30e1a55cb6dd5d63ba44657ed7945e6c8a5c2944cf742e977572e5f202f1fba946522f09985b2b67e60319bf84f788f9e303a418179e787c1036705dbf4a79", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030303030091d303030302c757365725f69643dfc0dd58a37766e78c93aef784ea782862ce35ddc5647a358d74ca09be05d041cad8dbed9db7be2f4e53c32f10cecdf31fa3ec2aa257ada5030dd38138487276a7c4a1cb8b8cf0aa8ca3b2aec15c577751128c46d27797fb57b8ff3f96c19bf320d35fbe06fa065550711e4540000000000000000557bd6bb611fb8fff08e5e8d2c1879b0fc15c66807c1e8b632715ce2b6becf93513a40cc09f5925f660ad3e7de9a3e8c235f938c01e619c7ba", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c007e02d79af53c58a70f7fb679e22551d306d40d738f766088e34fefe6aef88739431a1efeb9411448b4e66573ab18f6c608ca6f7bf363b2593ce7232bf90ae893484ad7b4"]) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200, 0x0) [ 2422.909700][ T8934] gfs2: can't find protocol [ 2422.909700][ T8934] ock_nolock 04:07:07 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:07 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='?\x00']) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2422.977481][ T8934] gfs2: can't find protocol [ 2422.977481][ T8934] ock_nolock 04:07:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x200, 0x200000) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$sock_rose_SIOCDELRT(r2, 0x890c, &(0x7f0000000100)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x4, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}) dup2(r1, r2) 04:07:07 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:07 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d8a74cb2d99e29395922d0ee070068fe42238b141b0eaef44acaea5a4e6e15d0cc5349b855d16c942a87dade161bb3d275e70b8b78e47d50a4e4443fcbfd5f5632054b71b3fe1e5730f36cbfe53e067fee419c730cfba7f14127647e238c4f3321fe4050285735a87fd8f6bf54ba947587414e8aa8ed7f12d9cf4810cba8be0585389287684b50f458f34bb54812f1dc144fb954a3260f02c87aa7b5f1146b3ac44803c035c989f2ba8435ffe60ba15ff691fd36b338669dd7cc71f2da319d3f72795f2bad84815773bccc7221e1e9ae34594b503e936", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:07 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) fchmod(r1, 0x8) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000080)={0x0, 0x0, 0x2080}) 04:07:07 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:07 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socketpair(0x1d, 0x800, 0x2, &(0x7f0000000040)={0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) getpeername(r1, &(0x7f0000000180)=@nl, &(0x7f00000000c0)=0x80) [ 2423.167043][ T9165] gfs2: can't find protocol [ 2423.167043][ T9165] ock_nolock 04:07:08 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000200)) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x2080) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f0000000180)={[{0x1f, 0xfffffffffffffff9, 0x1, 0x3, 0x4, 0x81, 0x7ff, 0x2d4, 0xfffffffffffff59e, 0x4, 0x7, 0x7e3, 0x8}, {0x7, 0x6, 0x3, 0x7, 0x2, 0x0, 0x8001, 0x2, 0x1, 0x4, 0x42992dd8, 0xfff, 0x7}, {0x400, 0x6a2, 0x6, 0x2, 0x0, 0x6d0, 0x8001, 0x20, 0x6, 0x172, 0x8, 0x3, 0x6}], 0x7f}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r2) 04:07:08 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) [ 2423.304804][ T9165] gfs2: can't find protocol [ 2423.304804][ T9165] ock_nolock 04:07:08 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x2100, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:08 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x2200, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000340)={0x3f, 0x22a980b7b82d85f0, 0x4, 0x2000, {0x0, 0x2710}, {0x7, 0x0, 0xffffffffa979b105, 0xfffffffffffffffd, 0x8, 0xffffffffffff7fff, "ca185358"}, 0x0, 0x1, @offset=0x5, 0x4}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0xfffffffffffffffd, 0x21, 0x7, 0x1, 0x0, 0x80000001, 0x440, 0xd, 0x0, 0x8000, 0x6, 0x7fffffff, 0x7, 0x20000000, 0x3e, 0x40, 0x1, 0x101, 0x5, 0x100000001, 0xfffffffffffffff7, 0x8, 0x7, 0x1, 0x0, 0x4, 0xe76, 0x7, 0x8000, 0x7fffffff, 0x6, 0x8, 0x2, 0x9, 0x81, 0x177, 0x0, 0xb7ab, 0x4, @perf_bp={&(0x7f0000000180), 0xe}, 0x424, 0x14, 0x1f, 0x0, 0x400, 0x80000000, 0x42e}, r2, 0x9, r1, 0x2) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000000c0)) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f00000002c0)=0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r0, &(0x7f0000000440)="9a50bff048ca32d56cb8ccb2e4bb116a5b0b47961b1e7bc44335a612d8ee49c5f8a3333ea342ec86857b5a8ba2a7eb360eb7c9d183d2b3daed2e5e3e15d17f41161c02b6b23c501113f5c5a7e5d5e6d7b3cef3135e53e2d30b4c44c0ad7dba7c88def79b5f918f47e818a76143f57bb8980ceffa7337cc14a477180d358270c962121e0d02c041f3a3830e005bacf9f65577515a99236f5291ac872a9c3729db81744d9e5697dd13d083b4d1f19228e8475edfd355fdf43a5da02e15e691b99ba321a6c4c4af02bb162a44af21e57c39aaefdc367e9666c1999db4b875204f7113be46924ad4c3d701959b9d0872112b21a9027689b916d0b0c4440320c1", &(0x7f0000000540)=""/222}, 0x18) r4 = socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) ioctl(r4, 0x101000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000003c0)={0x2, [0x0, 0x0]}, &(0x7f0000000400)=0xc) madvise(&(0x7f0000f32000/0x3000)=nil, 0x3000, 0xd) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:08 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d31e26ef72cd8ee4bab20f9dcf3408f1e1b5da8b456b97b07fd22860b3c06d544bc702f424118b341d4c765e61792a807b07b7b0f2b0ea4598eb95c6a894f0591686bfacfb23064c14fb046702b87bf5a71302fc2abfb42902d3c45053887ba648c35753d562a5759db9cff285ea8b31e21a1354ed2891f30af7c8fbd269532506778ee8e7f6ed9ac519dba9c736f23562b1cd5a3320226d256ae948c9ec758b68539ac2dcd81df14d20b79a4abb2a2b5709e8e5c9b5bf2f2c53adba22c39f015a810b032cd43cbc5d5d0b489dcd92c8643911b37e101dc9cdf4081", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2423.440430][ T9315] Unknown ioctl -1067952623 04:07:08 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000080)=""/76) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000000)=0x401, 0x4) [ 2423.462585][ T9337] gfs2: can't find protocol [ 2423.462585][ T9337] ock_nolock 04:07:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x3ff, 0xc0601) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000100)={0x400000000, 0x7fff, 0x3ff, 0xfffffffffffffffa, 0xcf, 0x40, 0xc7, 0xfffffffffffffff9, 0xfff, 0x101, 0x7fff, 0xd5d}) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) read(r1, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r3) 04:07:08 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0xffffffffffffff9f) 04:07:08 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:08 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xd, 0xcf35, "f15c25f21a"}, 0x0) [ 2423.576297][ T9337] gfs2: can't find protocol [ 2423.576297][ T9337] ock_nolock 04:07:08 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x2200, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:08 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000a80)='fuse\x00', 0x82000, &(0x7f0000000c80)=ANY=[@ANYBLOB="65fc9f3f99a1ca9a71a79d4c7bb33fe03accf05cfc43e4af165f3da1cdd7268988de2418f87f30ba91d784147eb14855368418", @ANYRESHEX=r0, @ANYPTR64=&(0x7f0000000b80)=ANY=[@ANYRESDEC=r0, @ANYBLOB="70504a5a7c096a93de0108fb0539861b4c5d448950be679212d5a6214e6a227b59c86c5a815b64ac2b2ec7e0f0cc95328d2aee1812edd345f4dec65df8abe483907ce10b464555a0831eb2821b22c48f0eb9ea42d1510b809f445f1607bcdf2210cf3064abafc7efd297994e14845f6759d7a9f7f536a1c3067ff6e0ebf80b80367661ee9757795dc5e27bb14c109829b05135a1d9edccf056b0d231c5e9c7eaf82c6fc9850942888318b641391b4884cb51212fcb89ded7f4b797c3c217399fc01edc406ed195db154bb9b7", @ANYRESOCT=r0, @ANYRES32=r0], @ANYBLOB="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", @ANYRESDEC=r0, @ANYRESDEC=0x0, @ANYBLOB='?\x00']) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240)=0x0, &(0x7f0000000280)) write$P9_RGETATTR(r1, &(0x7f0000000340)={0xa0, 0x19, 0x2, {0x0, {0x80, 0x0, 0x1}, 0x28, r2, r4, 0x9, 0x1, 0x7f, 0x9, 0x7, 0xffffffff8512cce1, 0xe1, 0xfffffffffffff9f0, 0x8000, 0x8, 0x3fffc000000, 0x3f, 0x7, 0x81, 0xec6}}, 0xa0) utime(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x50e04d21, 0x6755}) syz_mount_image$f2fs(&(0x7f0000000400)='f2fs\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x4, &(0x7f0000000780)=[{&(0x7f0000000480)="3479c3e07acdcac1dd7638f5499de1276270cde30de1ade753d16a290a74efe05ade99fb9486457158d833f2f67ffc9fba9045d2da251d505e85a290eae463decae330fb72b003ca7ad5542cf6cedbe6d0a78058f92911d8bfb2b753f12a5d547c3190e5d6ae49c391671eb3374a33adbe9a891089874fd7d0e4c87bd8df0be2ae3a8925cceac9d762d85b97a64ed7cf7f3299f36f75af1beb8a4d961551656eff6df8cc4d82d28118732cc35d768ac446b0e53952", 0xb5, 0x40}, {&(0x7f0000000540)="42d038c2c8be298ed30828930a49decffab486ac541a070d902ac1ea3b6157a780b4ef7f6131793001fd62622559c4a7f9a8ed12f11c79df836ac870dd7f25051f3e9f62ccd38249e4252219c7407fdfd08fde0ffb382e1923619ff046bcaa1a8e74504bb82bc2e037abdb8d2f0a571f5a8199f682bba1594bf57314ee5d37a5a1e11bf33a35af10a4b3b71f1e4045a259842e3bf6ee4104fad78d52d6eac894d74df8fbc9295a6fb2cbef90627c97f44b1eb30b102af3a21328d19d94b2d6127261a6506f7dc8c78c4e399ad31e5bd22ec0a65706dcede9a8125b71884f7d0505803a15d8b7d4f47bdc43e81c8d7da0a8b956f4f1c96d5138", 0xf9, 0x7}, {&(0x7f0000000640)="2526b3067a7c405f7a214019f42d317a9513fe52461b6de276e7208a934649bf056655d6e88b26e00c93f1dca502231ebbb79d0302128127959a3cf8625cceb86e67760a62177d22e55a56dcfe2fdd20570a529099474837", 0x58, 0x7}, {&(0x7f00000006c0)="b5aa005c1a206d68c74ac7b4e8a18df8688e563d75d5edba8976852cbd39c8ce7d9ca310a351543d4bdfc82e702bf421c94c0d577724297fb1c46be94c17d3739d588efef11c71bb0bc6d84ec6472087a9bc39bec6ded60b0856059d59b96df086d5a5fd4d06a5b138146c0004908b32d2b22df1eb2249a2e617ebd3db2abe02bfb1f9a3d652788cf0b323e8b09e", 0x8e, 0x9}], 0x2, &(0x7f0000000800)={[{@resgid={'resgid', 0x3d, r3}}, {@whint_mode_user='whint_mode=user-based'}, {@quota='quota'}, {@grpjquota={'grpjquota', 0x3d, '/dev/cachefiles\x00'}}, {@jqfmt_vfsv1='jqfmt=vfsv1'}, {@noextent_cache='noextent_cache'}, {@fastboot='fastboot'}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@subj_user={'subj_user', 0x3d, 'vmnet0'}}, {@pcr={'pcr', 0x3d, 0x1}}, {@seclabel='seclabel'}, {@uid_eq={'uid', 0x3d, r2}}, {@smackfsroot={'smackfsroot', 0x3d, 'mime_type'}}, {@euid_gt={'euid>', r2}}, {@subj_user={'subj_user', 0x3d, 'fuse\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x30, 0x0, 0x62, 0x32, 0x77, 0x36, 0x66], 0x2d, [0x77, 0x39, 0x38, 0x71], 0x2d, [0x0, 0x7f, 0x37, 0x79], 0x2d, [0x72, 0x39, 0x72, 0x72], 0x2d, [0x35, 0x36, 0x7b, 0x0, 0x61, 0xa3667a76d77754e1, 0x37, 0x77]}}}]}) fanotify_mark(r1, 0x0, 0x2, r1, &(0x7f00000009c0)='./file0\x00') write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000a00), &(0x7f0000000a40)=0x4) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000002c0)={0x4, 0x1, 0x9}) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x40000, 0x0) ioctl$TCSBRK(r5, 0x5409, 0x20005) 04:07:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0xf) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000140)={&(0x7f0000000100)=""/56, 0x10000, 0x800}, 0x18) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r3) 04:07:08 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7, 0x101000) ioctl$SIOCNRDECOBS(r1, 0x89e2) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f00000000c0)={'vlan0\x00', 0x7}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:08 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0x4, @empty, 0x8}}, 0x80, 0x101, 0x1, 0x0, 0xfffffffffffffffd}, &(0x7f00000000c0)=0x98) fcntl$addseals(r2, 0x409, 0x1) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={r3, 0x8}, &(0x7f0000000280)=0x8) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U-', 0x2}, 0x28, 0x1) [ 2423.776411][ T9623] gfs2: can't find protocol [ 2423.776411][ T9623] ock_nolock 04:07:08 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) [ 2423.856893][ T9623] gfs2: can't find protocol [ 2423.856893][ T9623] ock_nolock 04:07:08 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x2300, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x1, 0x200) dup2(r1, r2) 04:07:08 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x1, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x1, 0x0) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000080)={0x7e, "02a0378f78099abacb469b1dc47fb7adf9bfc45563f42d6471a162335134f15b375113190f054613f815d2b02de20217ec658bdf3156d6eab2a493dd8c925cf077a3f3a80163309b010bc696063d763e8bde43266ceea233f3dc955cc456f6f0ab51885cb69f459c39138cb5694b5f0e7499e8037c8969afc28447583bf97dc9"}) 04:07:08 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x10000, 0x0, 0x8, 0x6}}, 0x20) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:08 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:08 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2eff, 0x4000) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000200)=0x8) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x74, 0x0, [0x80000000, 0x80000001, 0x8]}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2424.051269][ T9740] gfs2: can't find protocol [ 2424.051269][ T9740] ock_nolock 04:07:08 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) [ 2424.135186][ T9740] gfs2: can't find protocol [ 2424.135186][ T9740] ock_nolock 04:07:08 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x800) write$P9_RLERROR(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="190000200b664910002f6465762f73657175656e63657232005002e1949375d4d172faded5cc7263153e3674a8f91d11e42fcae8800b9723c19893ecd542912855d4f407bee642aae21ec681bf5a872197fe0eb888530043e7a8d3dd3fde0000001d6d02e5f0f61aee"], 0x19) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x8, 0x101000) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x420800, 0x0) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x0) read(r0, 0x0, 0xfffffffffffffea7) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYMENU(r4, 0xc02c5625, &(0x7f0000000080)={0x632, 0x2, @name="05b49f0d6390a7f5e2f4ac8a04516fc5302da23ec94e19f8bbe5f9771e1af79c"}) dup2(r3, r4) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000140)=0x7e) 04:07:09 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x230f, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:09 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280)={0x0, 0x7f}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000340)={r1, 0x94, 0x30, 0x9, 0x6}, &(0x7f0000000380)=0x18) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r3 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, &(0x7f00000000c0)=0x1c, 0x800) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000180)=0x2) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:09 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x33f, 0x20000) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f00000000c0)) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000080)="2e581c254510f52fc0") fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:09 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:09 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) futex(&(0x7f0000000080), 0x7, 0x0, &(0x7f0000000100)={r0, r1+10000000}, &(0x7f0000000140)=0x1, 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 04:07:09 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x401) r2 = dup(r0) write$P9_RFSYNC(r2, &(0x7f0000000180)={0x7, 0x33, 0x2}, 0x7) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f00000000c0)=r2) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2424.350065][ T9964] gfs2: can't find protocol [ 2424.350065][ T9964] ock_nolock 04:07:09 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 2424.443315][ T9964] gfs2: can't find protocol [ 2424.443315][ T9964] ock_nolock 04:07:09 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x20000) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000180)={0x2, 0xff, 0x3, 0x5}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) geteuid() sendfile(r1, r1, &(0x7f0000000040), 0x3) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f757074be4dbf", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:09 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) timer_create(0x7, &(0x7f0000000040)={0x0, 0x25, 0x4, @thr={&(0x7f0000000180)="58477805c63739c0e78b90d3991993a83235c9ac8d0d3fbfada5518a1575c1a01b3ebf858d335e3b074a4c6690f8a989153b979cf22464b8dffa8688d8e6476428a15480040ba8cec97152ddf905f6785a689378cf26a81575bd2f8cf2e55ed82fb10d687e31cce7cab697b82dcfcf210993a9f4d9f8ed96db62e1ec5533e3361c4bca0ae429e34983d27d31ecea015124fcb6d4928351cd09f92560e16769f5b581767f90abf4965ec9ae5c7e359250dddb5048e9f9814c0964413484ceb1f77a9367e9412684171478411cb5ce71e7229822d3795e4dcf3ee7e7511c8a3b57a2d35ff283d0c1fc265aa213c592", &(0x7f0000000280)="b79c36452b3aede2feb4f168ef5e61eac040f23e80e0e470b403c37a3e0eb632186bfd3c65c5b8955932ae4826ffce2cbe9950b0b3102895f1ccbc6120e2dbbdf81be169e6fe830a1ca9a12555a1ec4e6cca6b87"}}, &(0x7f00000000c0)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:09 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x2402, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:09 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x80000001, 0x400) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:07:09 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0xdd, "fb8c920f4fae3aea5f968e9a46372a7a6b0a487b2b4d2fa1200e5bad2dd1ccf4cfdb68064aaad381c5d7070e4a69f3ccf6a17d345de00492c6818a1ea64575e9152fa2724f7ee090282227ee511a63c15da26a1f8f1937b0595dbf2df31a460a3b25faa9085fddbab412bd06eb970e2f73ae721f7c082379210b1cbd9c9f5cc94f09cc49520a7835929d6430626fb28f3618e412801f68e65eec39471a218b6b04fa59caeca347f3bea242645c17988446f7fc659af746152734b5fabf7b4913dc0571d3d8a04e37227a0dbd92169fb44cad263361182eb7bea9f279d6"}, &(0x7f0000000000)=0xe5) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000280)={r2, 0x4}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={r2, 0x800080000000000}, 0x8) 04:07:09 executing program 0: getuid() mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = add_key(&(0x7f0000000640)='syzkaller\x00', &(0x7f0000000680)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r1 = add_key$user(&(0x7f0000000600)='user\x00', &(0x7f00000006c0)={'syz', 0x2}, &(0x7f0000000180)="b19dab99bf09bd9b230539eb08282bae4d1b36c7c7286ded4db00a63726aac3e1a71c8165842c226d9b5d13f97360725df634422181bc3", 0x36, r0) keyctl$get_keyring_id(0x0, r1, 0x8) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) mount$fuse(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x800, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,u{er_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r3, @ANYBLOB=',fsmagic=0x0000000000000000,dont_measure,appraise_type=imasig,\x00']) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x100000000, 0x20000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000480)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000000500)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x2, @remote, 0x88a}, r5}}, 0x30) r6 = request_key(&(0x7f0000000540)='cifs.idmap\x00', &(0x7f0000000580)={'syz', 0x3}, &(0x7f00000005c0)='\x00', 0xfffffffffffffffd) keyctl$reject(0x13, r1, 0x0, 0x6, r6) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2424.689352][T10263] gfs2: can't find protocol [ 2424.689352][T10263] ock_nolock 04:07:09 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:09 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030173030303030303030303030303030343010e92b7884760a4f3030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18, 0x0, 0x1}, 0x18) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x10001, 0x2000) 04:07:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f00000001c0)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$EVIOCGEFFECTS(r2, 0x80044584, &(0x7f0000000100)=""/146) ioctl$TCSETX(r2, 0x5433, &(0x7f0000000080)={0xba, 0x6, [0x6, 0x7, 0x2, 0x8, 0x9], 0x4}) dup2(r1, r2) [ 2424.816894][T10263] gfs2: can't find protocol [ 2424.816894][T10263] ock_nolock 04:07:09 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$update(0x2, r0, &(0x7f0000000180)="5881629fcf509f6a8eef1bec975ba811546e444eee4d0168d5c82cf6d2bf8f3894ed3129d60f35eac5a0f440142540eec6fd43fb1b45a2", 0x37) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={r1, 0x3, 0x1, 0x7fff, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000000)={0x18, 0x3}, 0x18) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f00000002c0)={0x14}) 04:07:09 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x2803, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:09 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:09 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x20000, 0x0) getsockname$llc(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) 04:07:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xa2, 0x40) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000100)=""/182) read(r1, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r3, r3) 04:07:09 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2424.986626][T10563] gfs2: can't find protocol [ 2424.986626][T10563] ock_nolock 04:07:09 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) [ 2425.048012][T10563] gfs2: can't find protocol [ 2425.048012][T10563] ock_nolock 04:07:09 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 04:07:09 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:09 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x2c03, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000100)={0x0, @reserved}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_dev$sndmidi(&(0x7f0000000240)='/dev/snd/midiC#D#\x00', 0x275, 0x0) read(r0, 0x0, 0xffffffffffffff7b) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f00000001c0)=0x4) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000002, 0x6, 0x80010) dup2(r2, r3) 04:07:10 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3f, 0x40000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f00000000c0)={0x7ff, 0x3, 0x800d, 0x1, 0x1, 0x9, 0x100000001, 0xfffffffffffffffd, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r2, 0x7fff, 0x10, 0x5, 0x1}, &(0x7f00000001c0)=0x18) 04:07:10 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2425.265938][T10832] gfs2: can't find protocol [ 2425.265938][T10832] ock_nolock 04:07:10 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x8100, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x80000, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x101000, 0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000140)={r1, 0x1, 0x2, r2}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1000000000000000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:07:10 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) [ 2425.344249][T10832] gfs2: can't find protocol [ 2425.344249][T10832] ock_nolock 04:07:10 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',groupOid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0xc6, 0x4, 0x0, {0xffff}}, 0xfffffffffffffe64) 04:07:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x8912c, 0x0) read(r1, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/6818], 0x1ab0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) fcntl$setflags(r3, 0x2, 0x1) 04:07:10 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:10 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000c80)='/dev/input/mouse#\x00', 0x5, 0x80000) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000cc0)='user_id', 0x7) r2 = open(&(0x7f0000000180)='./file0\x00', 0x600100, 0xc) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f00000001c0), 0x4) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x9, 0x450002) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000d00)='trusted.overlay.upper\x00', &(0x7f0000000d40)={0x0, 0xfb, 0x91, 0x1, 0xdb, "c75943b891f36697ec97c5bb83356325", "fa46a1f66eeaff4679638d08ac19daeeb5af5a743605ec9f022c3fbfdd839b71a65d5489ec80342e6a6ffe371293c0edbe6b8ec38f8adbfa7417defe450e04336cb92b7959145bc2131cc6a08373cbcbe4dea79ee0949de5cc90f6274a4e4f4238a50241a09f861979ae8fc167c617c56dc23a90f9a326028968d46d"}, 0x91, 0x3) setsockopt$ax25_SO_BINDTODEVICE(r3, 0x101, 0x19, &(0x7f00000000c0)=@bpq0='bpq0\x00', 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000880)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000980)=0xe8) fstat(r3, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a40)={0x0, 0x0}, &(0x7f0000000a80)=0xc) lstat(&(0x7f0000000ac0)='\x00', &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000240)='./file0\x00', 0xfffffffffffffffe, 0x9, &(0x7f0000000780)=[{&(0x7f0000000280)="6105c35a795ee860ae68217dbffce763e4d5097c8fbadb5605742f5a8181c625addc85f572e0cc1aea451295594f7856a19608d12a10aa1c952096e99a1f33345b3eebdedbdfbe03659d68fb19d6a49bd9eb2cd4d2a724d91557c9edf71b2a183313cc08", 0x64, 0x6}, {&(0x7f0000000340)="0453b18f8b96e6f39604e96ae74dbdf8d22d9ca02648a5c8dcca803a0bd7781eced8657722a5755b8ef2bddd4693ca33173338ca9ac02c48d306687cfcc0e295d454ceee6d2170ca636c4f13d0e8bf7ac6389c08b2a5ecdc64363cbb3d0f03086ab0daf54a9566ae1ae2b7e78f4866a690cbd3fa19a95add0ae02c484ff79e61e134a4f7ebd423f8bc9f10e5a4fc16027abaa2cb3ddf47a5cf2871daebb04e0525a97ad0112e45", 0xa7, 0x8}, {&(0x7f0000000400)="9a9403cba7d020462f8fd851702acd24287540e619ad59f1f16b34570153a82e320643ceaf3e450a3a5ac0fcf6f8d3f2bc19d389c69630ce8a0afbab05c65efc766e18327157063ba93ccb3e609740c5acb271fe4b8a6f672260ce70ba43c7199b40363ce89fc1b46df62981c9895e2861e339c1f499e42264eb6befaecff25c769b55fc29a3f6e5", 0x88, 0x80}, {&(0x7f00000004c0)="405e2fea6892b78438b216c6e38fe2969b7e9398f52e2182308a58a333a01e2befc880e2fffb294cae5e2edb6d9172b9ef729794c78d1a8a1b2c000110c0b05d5cf1afff9e8de05c3bee477075bfcb4b97f0e00aeee24de52bc236a48536cc2f00dda2bb32fde6cf904eeb76032d77d01aa6758b0ae1a24dcb5675491892e069e79f2c98db59a44698dea8607895599be003fcb803c855614a9f1a847f91f715dde698c4c01f1e7c0e552ac46e7abbd2a1ad342e2bf83692e4835a936675c61df42e151ad43cdb4525cb861ab79db4f40634f3c571374bed18d3af3cd42d0d2b319985b53f4058bd3f20392be61e7fbe4a7e58f5", 0xf4, 0x7}, {&(0x7f00000005c0)="adb1358fc472b42ba0c57de211ffd785c69c791579e2387959029ba5848c1c2db1e9ad10899aef3023238c1515193573c28a815e17fd1d65210948a0f22879df69e7450a9187c7d80eb66c", 0x4b}, {&(0x7f0000000640)="a48be3758f2a7a9a5fba29304256c46c35a16120ecbece780f52174997114a746df647f53879aa6ed8eac234c78ba6b41331803aca806bd59f485168ad0e5dd961f887f9b37227b2", 0x48, 0x10000}, {&(0x7f00000006c0)="34bb7c14a7f4a3d8eb4d1eeaaf00297ca7f98f98886402a067c34c36c705af1fc9c0f84b27043f5a3eee0780e79c34ef0f5b20bfd5e63a1b6b6a1d773cb0e7dcc52a35ed4ea01e6329b6216fd402e40260146fff49c4fa4a7bb27d3b1732ffd8db9892d345ef26f7802d09eecd110cad", 0x70, 0x3}, {&(0x7f0000000740)="1edd3e381d066226c8ebe18403c96abd0552fcd77079024850c0d7d8cfe4d8f90b3f9afefd20b3", 0x27, 0x3c4}, {&(0x7f0000001440)="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", 0x1000, 0x2e}], 0x20000, &(0x7f0000000b80)={[{@overriderock='overriderockperm'}, {@unhide='unhide'}, {@map_normal='map=normal'}, {@uid={'uid', 0x3d, r4}}, {@cruft='cruft'}], [{@fsuuid={'fsuuid', 0x3d, {[0x79, 0x7d, 0x61, 0x77, 0x37, 0x37, 0x34, 0x65], 0x2d, [0x76, 0x77, 0x7c, 0x65], 0x2d, [0x38, 0x37, 0x38, 0x77], 0x2d, [0x77, 0x61, 0x33, 0x61], 0x2d, [0x77, 0x32, 0x75, 0x77, 0x39, 0x64, 0x77]}}}, {@hash='hash'}, {@fowner_gt={'fowner>', r5}}, {@measure='measure'}, {@uid_gt={'uid>', r6}}, {@euid_eq={'euid', 0x3d, r7}}]}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:10 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:07:10 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x1) [ 2425.532138][T10949] gfs2: can't find protocol [ 2425.532138][T10949] ock_nolock 04:07:10 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x9, 0x40) ioctl$TIOCSIG(r0, 0x40045436, 0xb) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r2, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r3) 04:07:10 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 04:07:10 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ftruncate(r0, 0xffffffffffffffbc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8000, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x6, 0x0, "ac2962659af92a442e176d840202448825eae6e614181725b15f1124f3e9a813dbf8412d48c8cca3dff9220ba262ea6280a2d24dde5df9a97a841156e1fb600c4145e38166465697ef3aad6db28273af"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) r3 = getegid() fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000300)={0x81, 0x7d, 0x2, {{0x0, 0x5e, 0x5, 0x7f, {0x41, 0x3, 0x3}, 0x80000000, 0xdc7d, 0x8, 0xff, 0x1, '.', 0xe, '/dev/snapshot\x00', 0xe, '/dev/snapshot\x00', 0xe, '/dev/snapshot\x00'}, 0xe, '/dev/snapshot\x00', r2, r3, r4}}, 0x81) [ 2425.601969][T10949] gfs2: can't find protocol [ 2425.601969][T10949] ock_nolock 04:07:10 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x1) 04:07:10 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:10 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$VT_ACTIVATE(r2, 0x5606, 0x1) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000080)) dup2(r1, r0) 04:07:10 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$tipc(0x1e, 0xffffffffffffffff, 0x0, &(0x7f0000000080)) r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000200)={0x800100f, 0x4, 0x1}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="26ac6f94763eb4f4e811", @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:10 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x1) 04:07:10 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000080)=""/169, 0xa9, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) [ 2425.797214][T11172] gfs2: can't find protocol [ 2425.797214][T11172] ock_nolock [ 2425.882914][T11172] gfs2: can't find protocol [ 2425.882914][T11172] ock_nolock 04:07:10 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) 04:07:10 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x4f97048a, 0x12000) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000100)="c996260f78d371b59bcf25d5ed7b6e57a3d30f86635f08e0364f4f336ade63c47a53aee0e047fd6e8ae6413b2018ffc9c43b26c9de267675cc1d9e91422887100479803322f6875f7a21", 0x4a}, {&(0x7f0000000180)="4be20a027b77b041c0e272060a0caf3c7a99902efc5203251ec0da347031c3439b5422cbc0c8f9a76a4efc987efab00158b04e7e4035d7c5a8ce45d60e8495cf4d04f056b6f144274cc4741a1ee21e8c2fb8b9a980752e8b33cc954f9bbbeecd671a2dfc8f0792dea1e20df2fd495f8a88af07d8f98eba37596aed8bf81fd7752e27e95c7b206ba27b5e732a38c864f1f4464191d15cacdc", 0x98}], 0x2, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x78e281e, 0x8000) dup2(r1, r2) 04:07:10 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) connect$vsock_dgram(r0, &(0x7f00000000c0)={0x28, 0x0, 0x2711}, 0x10) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = geteuid() syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000000200)="40207c8d6b8f048cfbb440abe5b341cc17e48026c7f9a77cd9b24ccf13b7cbc42eb4605a9497987fb22941aa4a77f0b321e25ec74d395947c07b737dd4269796523fe2fa5e2fcb269e67732ce04c933743e95a9a6e1490866186d99c5c721a0ff328a7c16e9817de591f875670858d99205ed786163fc2efd14a22c7c8ddbd", 0x7f, 0x7}, {&(0x7f0000000340)="82050bc42756b5d5e4d962cdfa508c3aaee3a4a998e671a50c8e222b8ec646968c5a443a6bf0c9d2e830bcb943e7669331d5551c20b5db244c418c5e6528fd7ee995b1cf5885902e54e9857546e7575e382f48351254a158a6b7f8ea45605fc6a56a665e3ce04924b6137287cae4b064299e2d96124507854528a2af0a9f590d61559d5899f7cb25bcdeb07004b610079bad4044e8beaecc962a2f", 0x9b, 0x42}, {&(0x7f0000000400)="a1e69291aa1921a94e01afd97340fba35f6fc2b13b180f426023c7d998250c68d3a133250e9bed9a997cd02a9f26aed7bd66a20388e96e86933c679d6f8db2675d1a6086d3300db6eca030cd49d406da5f92a33813cd4ff972c73015da3fc8442eed4659bc9bba6c83501ca0cf6651b29588852fb8bbdd42df18a7753d348813f49c49c8af12bd466cd99cf07bc9c7", 0x8f, 0x816}], 0x0, &(0x7f0000000580)={[{@barrier='barrier'}, {@nogrpid='nogrpid'}, {@wsync='wsync'}, {@lazytime='lazytime'}, {@allocsize={'allocsize', 0x3d, [0x39, 0x79, 0x71, 0x65, 0x33, 0x6d, 0x0]}}, {@quota='quota'}, {@filestreams='filestreams'}, {@lazytime='lazytime'}, {@lazytime='lazytime'}], [{@dont_hash='dont_hash'}, {@fowner_lt={'fowner<', r1}}, {@euid_lt={'euid<', r2}}]}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000640)=0x10001) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:10 executing program 2: syz_open_dev$video4linux(&(0x7f0000003600)='/dev/v4l-subdev#\x00', 0x210, 0x20000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000035c0)='/dev/snapshot\x00', 0x0, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="7ce48c294b7130b0a9f8560e898de0ee29032cf627084415b6bbfe94df7a023999a31cdf0a7173995ec631388a43148ec300efd6fa3d9b3ae6ea776ba1f52b363fd591ba9ed67a7ac9f155e08820043146b74d0c1fa6b952dde36237da7bb0b9878b4bfd09a46a8b4c6880e6d12fdfca3d565bd223b08bab71fcc91f4471fb3d57b503721854538dca4616", 0x8b, 0x0) r3 = add_key$user(&(0x7f0000002540)='user\x00', &(0x7f0000002580)={'syz', 0x3}, &(0x7f00000025c0)="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", 0x1000, 0xfffffffffffffffa) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x4c5b) keyctl$instantiate_iov(0x14, r2, &(0x7f00000024c0)=[{&(0x7f0000000280)="f5a19e67a7abeaa64dfd3151a8b123d21a871ee08f9b015be7e0ff0e559ef4da3f9fde8d0d58c1b295c6", 0x2a}, {&(0x7f00000002c0)="34b108836cc94419da4519d644de1eb5d7aa4833b57fc35b0ed01db1612f6984a7e64cc911eb3288e264c7db2173bfe6eab48d239e9ce72ac65a9cc33c3b44d520a11a910850ced1a058802751e3bb731fb8d45f90cc90867a4788b875435a0db60498db6881286fc4ef136bcf5bc4bb3202c1f720076c3b74c0e375eec0b7256589cf2581c952536e796ee57e502026bca5d2b6fb2bd9da1549c93034df2988e496d5eb49994b", 0xa7}, {&(0x7f0000000380)="99c5dd315c5ad92a5a034ee50f5dbe61e1313b210f21d7c1187a477ae51f6a7ba2b8212d9be2a81f35492f361c11748c305d6b5d2df3c7bf91d5889f675057d65299bf6d293d5320b1af42d7a67f2985006341149c49cac55167bcdc065d4a84c35c3f2febe0cc4b41df904cc8383d4a97c16ab9695f56cb5d461720b107e6426ecdc6e7a10231e8fcde9799ac8489aafc894491869d6bd791afeab645d180e05990ff190692d76321b4bc67c10cedb7a899dd6dd5fd2861cf1781dfdc1fd41bb40b0ad7c8d10d2678d9eb910f45f416329e6f5946ec41f14b12975ed258fc35cfadc881cbcdc1123eeadb32fc641abd691471fa35ac4f07170267a52330e99fd7aa1e5de3567f0c9e190000554a94ce7f9bff77d5783ae39bce9dadac419649a4f5c0ff21fef7d1feb3b42d655c8a0b71cdee60032c9d47f5afc4f82872f2fcac348eb2147b00e7654a276682c9883252035247f9743a5dc51b3a8e402765fab5df2d7f6af71bee75dd132ed8d07d8ff5bf9a96e4ef53e49f946c5b93df2e6fc2be4cae06b42981c1ffe57fc85df18c8f6cfe17905326040384fc78294886e492dd8852e725924517308d77c39e9333761ff185c03a44dfe68d7d00809b51068eec77fc22aca871948596453beaeff1cd163a735c70b85aef8ac41e19f1aabcf154122f4031a0cf14eaaf7e8998b298f90be80c56ec6fdca3473aa9039dbd9ae4baf82c6e54652467a8cff82b9e7871574dee796a995b17e7069b296f1939a8394ff7c432077bfbdbbbd60ae9210179be93b678248788c7f7807c0681d3d6f8f1ef1e0f87c0d270fdf1db9ed33ebbbc2ce014b83af811d5d2afe4726672ce21f83034aea2d29e956114014aecfe88472cf0003ca042b93369bd57f84d434b204716ed35798d0f882ececb896c076b5ecd2e1c79a2cd73ba56499f4ccf1f3344254fd92754e474d7b3455ca3f752cd8647d3f2249bb1eae4acd30d94d50e225790b54edc668c8585bf77da4639bee6e8c8f8a6e05b797806b8aca5484d212d5ebf93fddc758e59b538872471a3a29ca64535e598cdab08317effa0f5500a790c29f824ee9f2d4f90915faefcb5f1546533c227cd2a96b6343be987ab1700b92d7c6225b74b78bfd3f0d397aa6f64306c46a8a83db074f9c70e721aa862e556d12686148146e699c7b1d2b3796b9b903f0d62ea53bbd6c7e9736597ffcfbcdd92664b3df70fb904b0efd3af39bcfb414ebdf8a70927dcb53a63fec1ad8b82482d3decf0223b9814b7e61debbc55d74fbcee3577f16216d40537f2c7f3fb5f0418935be030f4a2b5d9057daf2216575286477897d29c8f4139f3eed49cca5d4d826674525c1cb6a060c1bf02e664539d18162a4b33ccba70241a2cd26d25672ea8a714a7ac9584fa39059d2b6da53eaebdcabdab8d309b925c3a35ff4db929862e83cd88cdbd5ff01f620b766493e33def2b1a7ee528e30c351e0e602f9707f7e252abbe4a7ad2084bbad12fc29607f28743b7d5812703d2af5db5f1b19c192022c058d8e86e51430db1bdf0a340157e50dd0e936b6eb5c33c0eec7cb616293575fa058f58a821fa2f91425dc29d472d35e055c5a7916ad1ecb78afd1f53f5a37a9db4bcda11a2d790f53909abcf8dfc06c1f36514a9c35f0b3863246c902cd040ab0c44feb13486d2f712909a31b61b30f8a8141b2806788889e9f01694e4794bb67b2739a53b24a34df438c09b53a47a7367b1f39fd5e9091d19b84f29b073e52e0360c4c0dc429ef3e5b53f7591c6fbd6c38e497a093f5183a5eafb8dd882d40ca4e50071a47246a296d9f7a087b0ce0275f2237fa8449df36fa04b72b63acea479f7e571ae69cbadf85499ed7defc0dbf88b19c3f2d8c0f75f197ce4c465b11a41934a0f80b90a368226945338c06558a6f1a5947783c20d52b240aeba21a74802fd3298bd46549cbde832a86b8f693721d3baef5f56361818ee75c25775aa97050c1020513dc1bf4f346c838361ea2345f26d4f0a69e50210e26b90265f228dd675abfb438a11ddebdc9007216cdda3956000d5781df9378e115f570e49827c35a023d42db6675b3923ac11d53237435e854e155a7588a20fa2c443e381e1676389ec8bb38cd02708d60e27786d611ba6f4c2db95e27a91bad8b09e79a95957b6f382ec2fe244cf33c70053e05fc94ca3778290b3dd66357633a454ee09164354d20eda1f08055df555059e10ce51f9f0adc49fe2d284f780657a011b2596d483a4219ebe2cde5d23cdbfba9381306fc6cfc3e6a2ddf34036cfe0beda674433e073af048597e5ce83b64624eba94cc1c6e72516a5f36463fcec8039a04ee114f56b4d8cf7aa100747db857cb5deb8626c863314f2009b76b100d085a4a52243fb2e61be93181aa3f3b323810f763c312041e361bf7f99fd5aa2f3b93d9666e333ee0921d0a7ae3c9551afa685442ad741dd318da6196ef1585976a2b550cfeb003997f0edeb6ac1abba71523fea42d4cc7833b0ebbec5334c74663af7b9196e60a4a6f76167d98c21550a67baaaa1026bd11c8864b76c2dbf495be4cd2b154574dd1cbdb4572b5b6e36cff7f8687c7df44772e3c328251f16457fb512f5fd5559b56ea0e181c669adc0da0bc716fc5a63cc1e2add10af83481f5b983d678dd555c7416759e97f8a192d70676ea969ba2503f25749228b556ecf29fc5fba4ec6b9ac59d38071a05db796d9fe29602ad9a00f2e3f65b7a27021c3c049e266f9f9f6b796b4cdfd371d9d4554094609fdc934a1c3d84255256d553462dda3b6be3f2e53daa0a8131c56e68d4a5e48a6ce87b7edde687706c0c72a0a14061c30db2fe451fe82cb67d9bd26c5dcf9049f7415de6d88a25ad3ee7aa4174b97b1627718497873763bfc9cb110dc7c87a6d55cafcf607a1e145b9f689e80ac19b13c26d7a28ea64a3fcc13a5506c5b3117046f74cbc3f277323cf93afd327ab279dacfe007e1d3257094502df5246cf7227411a34a1c9003825b1280425d5f54b5216eb24ee5b84e0d21dfe24a48723bf707b4314cd757f545bf1ef5bebd825e7184ecbe8d34dd125f4e8080ab736e3acbb0b33e747d4b3ba6046920c23297f524c035ad7ec1aded6c4315c53ee17e53ca13d5bfc9b99e3891c13d6eed7e042e708a3ddd3de3a548702823a9249b584d86f078852754697f930c77184266c6eaac29bac3f30479d513880e07a3af87c9e4d49248b61766f08367de8abef74a819f27e270433f2c1cba7576e12ec7995a0eee94985a2cd933f5d5faf7530396b91e0db88f9dd9824ac6c39834b94e27325ddb1368b5d31c4c63adbd6cfec70f1081e6f070ad63b4e0639dfea5f56f85b99dbbaf9b583a92bee435c79ca25c5f64b03be37148f013f26a5ce834d64cc419fe5723d9846b6e1c05794f9f2ca62d3f670c4d280e69940c4c701a8c2c8db57bc6ed02e005ff17a13b846e96c62a298030c8050cf3e21d2cbd6c6d16e19d3d5e0c201a98799deb8afd1bc75de49979bcba58e82a870a21f722114c579b5de672d7d94563e1303bee6bfb7d91784d98b808d5b731318028e9f134692eae1c64f04bd6035ad32244de8cb5f830cb63f96a2fddce88004ccc33edba857ccf1200918a9cf0171107186f71e0e2cc1690a43c11cd2ec3eb34cd8147122be0849e62df60ec946f7c7b41fa51878bc23ecd544362380af7bab356e8b43d6be431dbc014b0f6fbcede36050eb35118a3bc4107371c15d3f814ccb0cebb81e7d8791ee406390deab2d1c30e284e0ac487b482657655242fc5682bb5ade8191fa00b87d74544d78019eb01e0c74946ab18bfa6402e5595ce09c2d92588368bb263bb33224bf5416c4f2984e5a088d0edb07340f1f2807ad3697e32ebf9acddfe11a657d570c46e893502dfff67b741060a151ebb57f7c497d297bf429a3deb7c2905e7886368bb132baf7dbccfee5a552c60461188b08084811c800fb022a27a36114ab6c37d059d97429e855ef52b2873fad441711cc87a2efbb74f8897948906676fde2b2c8a53551855b4608ebe2a6e474b890e091ab08774f65154835f8e2e72c5963818f481c10f20a4d95093c729db7c5c603b92663f0d0b52c0832a33466a569c1626b0ad2d25edffa6a3b5783adb0fd80213f19d888b540dd5ebe63e7dd5dcb4c351698de5988478195ba6851e671b98592b34482e7c9fe2436447eba1884460ddea04312643549809befe2755c01a97d387d8b2b53f3c7650fd7004c3fd3859f04aa35358d4ec4ef173fc7c2ab8d4973c7d1197989f97eb4bd8d2cd3397ca998145faa49dd2af617d1fac8242532e67b82c6ec8070dcca9793b5c7036ca9ea41da9cb18fd1e080b0dcce9ff5fd08a06701c663024a26496a86f4182c4d0e147184b612b5c5e36a6ba8315260254ff27e700e3bc84d5403fa595f8ecd98bac3bd4e50c7583a9b8d5de097b8f5a916c2fc616e77d810ddc539294d50f963bdc0de7fd2caa7746257ac4a066f649d70f92ade354749962f36f46b8cf96fcd93dee38eea8611a04cd4f5f5c76a97d4b2a2017fb5c614798ef6d2d56c68bb6fa282f484f2702266481ae95957ceaa8e2907c7df2befd45f2f322538aa5d6a173a421d0e0728a84784e65c55ac1f8b94662aeae157969bc84899a370a929c88b29019db14fd2b829a7f5e349283ea8ddad7f9ef1713036777f7379708d20f3d75757a5cf999bdf28cf36d3249290ce476bc9124987c34972f0a01b7eacafba6b7a5fbcadfa69c3203a1cb4de9764b98e28c383edde334c21ba0d1e3a6ff3e2ceadc628fa2140e6b01910f2dffea254d1f9c35ec55698e9203b969f78084b2a1a44730adcbb37ec020933a48bdbd480a6b7c4e29af775aa52f96ad12592a6c5eb9b63abe3836a98cee1654fe04e33edd47624cf7539e30d5105522d2beeba41b42e263390c7d1d70673dc8bdc01def673256896bdbb6671031b74232c0c9c355fe7ea6a22da0ec2333f29ac50902e0b2b04ca634c27dfb16d8862450ab993fcd95fb26ff18a25e0240fda3f6de8fb004a34bea450f5c2ca8227cc3c37c7d2473d23bb5e3f3483947bb1000f6953027d0580c490235ab4efd2e03436aa34dec091ccfacdbc8ebd408837efb74b366f5b37a4ee278dc763f3bc9efeda31fb6a9e3627c0e7d38828106727c1ef1902941925b51948ffd6b1b1c38ab0b4b896f21f0ecc4badeb76e67ac9a0ec635e180e4822cabb84c14fbd82024b63ba98a408219ebb295998adbd3b8dcd5513127802dc15de09d3ba2f4bb7fcd2ebbe9f7f1bcc98983363204c822da8ee6332c4e4e46368872a8792089fe2a4dbbcf5c93cfb42b443f3e8697852eae36ac7be298b6139b64902c89f7a2394e16a33852959fffb9f09f8495dc2397ffe427e581c754168bf7b612215c79e9f7f1ae2af9bc6946aa2dd393396c1283912ad112593f672607034eb8a7a1f18d2c3bde638b9b6cd19b7479dd2975c02fc74c94c89e2c9b07336ccb7ec15431a759921eb6060750efa8449429f77608f9d9bb28247f270a4484bb5c6b25903ce9f8fda91426c39f67b708d6ae8d28bb5da80fa5dd5575955397ac7de9525bec0597b69cc6b100dc269b28277698f2b02edcc2f003241fd5d965a623f1727dbe9def59aeb9f73065ac179dc070404fb15fbd11dd5bbad41d3fdb66bf6f8c9c925b2593f7deb3b000efea7eb820742d9e491fbe87038d1adcda1fa89269eefdf22b5d44e4bed50d0414cc519f4f64bfa02e28646aa13d35d37d461b3d97d7330cf9", 0x1000}, {&(0x7f0000001380)="faa46d6b7059", 0x6}, {&(0x7f00000013c0)}, {&(0x7f0000001400)="ea5034b96cea17acd17901b63e6ef0d422b5486c03d22303bd2486aaf1e6488d14c01ed5a46d8e7c1e82e71aae9fa770d6084e70e473376c699d2e92cb9664b333e85635149595b85592f32ed93853a2b01c567feba0fd4c7d16c070405f6eca83a508fea0aa57ea70bfc451d9e33977b98cab531081a2619f", 0x79}, {&(0x7f0000001480)="59b13e30f48815b2117917f590a0e90a9f530e32ebf8ccaf9423dbc9b83be1b4a12af4fec50f6c779f492072f70869314f6eab6bcd97681c28e42af50d2ba0209d26fa033ef5345a2dbf3395831c953705347006bf6dd5f9318ece9cf6c5d23d2cf4c9d1ab08329515e5553ac572acefdaf2587b20fb561f54992ff19c07ca526f9ba055e6888e883248f2b3a2f8cc16d40fa89ea4370b0416ffbaccd815b9403dd5f41e825961c44e9b89369e21b5b233e88882dc2b645727390d8d350e226caf8ac33e70bb3034f2abc74ef7615341b427104daa2497802fd1ffdc6383658668464ad633daed69d92b08235481657818e150fcf7be836c893c162986e439a17a4ea3683e052073f13d1caa950c3be61baee3e68987a7ccb818ca069dd5351201155b070ba720f02fbc2d1f4e73984cda3266def6c3b9809e62e98829ffde18bf78290813dd3d46719e7a7d8cbaa98973f812ff9bf592fa0b2d9c5a30ab430bcff8e59fe2815ed91e5063a7019ce9c3b0a9b367c004b6eb8d454b025263331d2f29a3b83831d8b1da28b66ecd02c639de0c2dfb7b7a806c3ce348e29d20b1ec8b01aef1bd62be0f9130dc94eb80a7222e3bc81f7bc63d209a5ca09e02f0c00517f389b7aa409505955c0c8bd4514bb943e397bde7c5c12ad85f1738a765bc435f53a0fa9edede036b477ed0556439a4f5581a6d8c7c47f03cfc2fc548da2b565f606f65bd169428da17b834ac6dfee84021be7a708d7604e629a98547c39e067d806116cfdfbdbb614ed11f9991030e4b55b70c2362260b902c08aa350ee4d8ab48fdea83ffc15a2af54d5948ed50b8fcf8efe294be304dc814001aedf414023bb2280788b0a8a37423222dfb1ab6e35fdd2ad097af31f2fcf91a1ce3e2508beda5a778762c7c5535adb8430abb95828bdb95714fa14d0196041dc49a6e236460d8106cf1b0d4ad2c7078ccfe3357b621fb086e5f925cef9d60cdd25abdbed416f70c7327ae5c5305ef966610afe09bf7706ea9b20060ea9fc44ea9929ea4bb54e4397e45754df472cb12b931737b905307f14431aae3f403251356e50ea4777ae9769dc7ed41958cc532cde6fe8c5f3ee8e24b90216dbb62e7a5ed43ced9ae7204602f35a0c168b0ae78a1e69a04532e8dcd0b3b665fec8d602a34a2ff176c54962cebe711cbff37994f5c2c9a87fcbafc44f4a9076c4b96411fd33d818fcb06a0612de8b531228ae4be952629da30b11e99b18e2f7d60bc3e29c002302db8f8bae53678b79f60ae291868907b2f2abd53839e3b30ad1ab81e36e143e9d454fbb5e4a84e8ce8bf9f1182aa7e43f7975c72d8ab6283abdfdac8caa978423f26ae069aebefbd6c7a400107ce6e43806e7dc95ecd77de99e99951f1e9c943cd10c59b28a7da8bb23a1255331cac58d783c781dfb5f8c5e28ad7bbaeafd9e260069201f9afa7f0ba7425dfbaffd68d31d3b24209f264040ddbf22c6435bea703a453c79f8c8c262603186f72793f8e871d910ac147f4f7cb9ac7c7e71f07a2de64a7ce876cea1a6acb340b308098dca30dc46f04b8672e0207fb665e983658f1e75c2a61010a3d2f46634e75cb413c69d0edc51ad2bb5eb9184c34690558c53058b0123568914cebdeaf8d5ec351063e780db0c609989fc3308cb7d44e777454db72ba3e069efd8ad81005777ecf94a1d04dea9778677fdab0d39f2c6f9f9346324a857a605c0a271f02fdf6c5c42e259e04d8d7329a21b068735b1eebb1bfce6d132442d5faf333cf975195fca55ec658eb5a0c7848288c493f2f1acd8acfbc375bd7eed065cd720efb5087ade3309882029a6f594203e058d5f3b214bc956147cbbeb531a0c05813ca899375e59f42fb14c271528dec10c5c767180517e349dc01cb8906bd42eb3d65d98118938233316c9913b816cd0f6df04761168e3d531df63b0ccba6a8c48ecd2e344596c3b72fcf3f76f22278f9922e083cb9991beadcd44df450737cc66ac7c4d650a05d195ee57d1e70cff039783ed9c100c26972930f3a9bae1a649efac9dc1300e9ff710fd7b7afe70e0a4820192fd9b5ff5e5fa870af187f2d99a265949234539979c3f750e337098fd96be45e2cbef8f6f2e61e59e90e4fe939815e928cc4af67e1ea8cc197c27e06a70eecedcd32d8e679b3c20dcf025b0430e72c5bc1da9910826719aa3482505411ad4dd7c5faffef225746889d855f17ae7d205adcc121583d03df112a8c2d0f3aa9f165bc725cb9b2af07963c694cdd4027231bfa84c45def66115ee08082cc9fccc3f814895afaf489c5326648baa9d142344dab4638a4c011055f002d70d0b483b6bb3263f3ec9a670bf76fcc0219497b1101a1827b4721387ce79594e8483e178d31aee4ddf37ec2c02c6cea098a3abb6d836f5a5add6676360213f303dc1c6c9a6127744a59dae6cd3939b8b9253e51ac6f8efa1bf1692e4c6d8b82d3dee7b1ef9afe978d19c9d2730a864cc8557bb71a72bdf010ff346bf4ce20f2a6eead690d1666db3b23bbbc5d46009e607b917f1ef2654b026d884900aca5486adbdfe1bbcc8831792c57b5b19f2594de5a7c31b04bcd8bbf2e15c05b1f60cf1f80c716f17c78c873e027ab17035400862143094142fab917ba800a9b62a3b4b2746a8a665236c80e941a27c2e84cb1e64f3eaec71480c16c8b92768c60a2bf8abd89291827ffc003cd0608dcc41531cd3128c74e3f4ea748922f967bce69c15aef2a0f437919a69a5e91fd3947709c512b337c7d67b3c6786026af2e59402500d79aa8acb4e486e99831836d720fde99aca0ab3ac9956c0b0e100ab60daf2bda321ed07fb5ab489436dc46029a62dcf550a45279b4704f38eb3227b7f129f71cb98ef3f6f434beb27971c87a2f6ace0d0a8da732ea2967c43b94ca9314f6e7ac6bc4b2984dcc1a4b60cd30bab0c42576037d44754d00dbcaf3ef4f0594d62f24b8c6608fdc09c681b1153319452dafb9590126a87d40272f54cab36daec6d2062d2f2ff60e75d39f916e42186a65feb9e35b97e6272dcfd891fb34d2f66b9c06f7fc8c858d0e7fb18fe3d9ff2ae601d6383aaa83f5e9211840d1e5190750424107db192d0bb1aa60fa41372db837b59f9b164d2a3dfdde0489c4a35b1ac7f268f1f7f77591f00dc16deaebe294a1fbced11acef558fb1c2aa9a937e36d9f80ae4d2f56666c2c8859a6751c0225d9b24523ae2fd12137268fb66e582e982f4a243467328428984d42b7adf35424db32825674fc76664e8e9b19f0a8cb8d226daa2a7728085a5f74c09f216204cdccb00ceabc70212748e70cb58e1a9e463297035eb56cde74e58ef493c562598ce19e849f6fe0d24dcc19c6b61c09013938d49e66c20f3c0f587c4beb1028fa6d4d274d98ad4d225c59774028da6feebdb3cfd998c417636e58a6fb3046add3f78a49f78228add75319ceaec6503ef85ff905829d4f2b26fbbd5d013fece8e96e07d66384101c5c27c4c965e005dc99d06dea290a257ca061060c731fb1868ba8ccad42a79fbf0bf5525d9954e3764c85542cb857fb32f6f518feea31b186fbf89f6db2d6157e95b513751a893cf1ea6be733a16f32f1a8ebc7d18521b3a8a09e35817658b1e49937ef11ae6867dc4c9449dc0a1cfe21b05bec3727cc9c5e1ada6cbb1a4ad5b1f19ec76a82d1aad770b4f8a7e22abb3c25cd6fdc1de8fb91b4002228e8a7b02e214ec31d7926ba7c548383fd57139266d4060b7f93377f97396c0745df2c0ef5fa66761db7e0b6a43cf055f993114a459bee76a5d80d59951fb3e229d257dc3964644a2399eb7f4c42a926af01bde3b88ae11a9b7fc3f96a83260fb35f84c4f8a96723ecb2ccf35997af400e0492b4072bd2fb645ad3231d47fecf26cd85a10ca4cd30df9d6f53837df644d3a53f33244d197504ed7c2de3a032872a64f3017e27e016313fbb16cb8d4c3ae0758df04289475f74705cc16aaa222186ceb7bc5d2fa6cacb5b49c40fc368919d726e4f26758a44b07e98544971ee8f18ad24eaf479ab7817e0d10480ccba5b1a0949a03c1d1e262010f8edacfc49663ecb905a8d5d5df3ff938c41292ae34b465d4fda3456ba9c05d426190fa02fb50553cc0f09cc2295a69884e04a245bdab2705654174f59db37bcd943ba7208a061e44f826c6de3d5835a6727f7db524be68887c4bbae49f23eb65e4ed9d82348ab4e719db50557fbe0529ccdfba3bbfaad192193000702e36ed7c3f4edc7e4d78ea6b1e0d66384493b8c354312dbfbcea9bf919c047bfd732b0fe31c267b08403c55cdec0b7866e823ca3dbb26429a3809c8b41f287ae43e18702ba4003995239e6586a94d6a4d10c55575395a3a170c4a91f4345dbe35b23dea0cd050b79015d445112d5a1bc8e8de04620fa0cfc51a4870a957e1e992aa62489157ff796b270df11ec836f1319341aa4dead818e47d08adfd820378252e78214635e1c86065c19f0e33736b45cb4b6d3b0266a3ea0bc02152eec065b95abc7335e2fa259016f4fc460746b516c35e0866b0b36f6ab0838c9f8ca739ddc0f36c55f8dcf7fe7a338d38b6e50a71666b6571dba25c5b20a0bee1d872bc10d68e18d1330667ab01d9da28168e677e1f9b4e8d6730dd1cde6aa0f1f77bc4da2a2249e5ca62c5bd24a0009bcb0168c5210d168f305ed0a2b742fa388576ec920267e7c3a73f4c514d978d8dacc98f9dd1f0e563853caf7aa32730198dd51f66b26a99789380590a3edad03201d92aef144fac3e904d47fc63bb1379367b7491ccd55b3246afd256f07f3c72277ec200c3e91e5f5de54cb44b9c9ae260517d51a6039d6bb795fa396b4cc06a5bb1a943f089c2e556f9495afdd72fee34a9feb0f64ae3c18573553303b9e40c46676cddd03a8e78b6aeb580ab1f3e9d822564dc37d456f613adfcd6a97b14e72ce9042ddc537fae7f23bf4345d882686d0d9fa7763b927f807cd11261746cceeba59552b76f13f81b5861415e71302e3f66e742b5dc749148d9397e7ec2ba225e655e9a5e848971dda6b410a3ad28c557794a5b04d76c64680881184d05b498ee8acde7725404b4be4bfb47ff66b9218eb4cb720ca9b3d9514d2087084ad910f0f15969a13ea0dc8a6e7c28b3fd6b6d377cd79e1a2333c8650b568739b9880084afe25cb49712175988490b60b9345b9aa16300183414c25f967b6f52b022442fcb9f8e16fb79d7c5f2ad0784fc40f5c71ae75b80db9693360e895f2e43e95d485072e68ffbadf2625439707c73623bee30f9164018cce6772f1adc8d9c3e06d47456f71de12241ce2c917ade567996eaa50e33a6fd9ab58f48832505e4e6b6dbd8526bf2e47695e62467dcd282c75a8e505eef0f2ba5f6f340e978355bb73775f57daba0bd432445b744e9010b6246ca98421e8dcada824dd5a42f4431e6dfaa61eab0c66a494807c564a2b80ce78d0aab9aa4768b2537ba26f7fd20d98fd0aff532eb0d5a361b0a2e69fff1a93cd18cb4cb848beb246a3f502ca0c9b499366ea042f8ac31b3642735ad0dca33f10d767141e4c49b5bb956a6da97a2ee46e025293f35f1fd979afe0f101e9783cab0194f3151f9b0740d581ffdebe1552f42cff209fbab2d1a26e17d0aed1a42bc20d8bce23fbcea2ef3a235aa29f0b8e589bab131bdff5e7829ccc4e36579287f9f5752c5fcfbbb4cdad6c965fcc69ec1d44894e8ffbd69e3f0aed9a281fc34d21b5fda8949b5d6a6fb093b586a96b78f0dc2fa2e2e299da35ca5a8c1949873f83a5cd9d1b47ff7b456d2418d", 0x1000}, {&(0x7f0000002480)="f28e30cfc61f720c7859a50d18ea07c69953ec4a0861", 0x16}], 0x8, r3) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x100000000, 0x80000001}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000013c0)={r4, 0x2}, 0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r4, 0x0, 0x66d, 0x3, 0xfffffffffffffffb, 0xffff}, &(0x7f0000000100)=0x14) r5 = getuid() ioprio_get$uid(0x0, r5) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000003640)={r1, 0x0, 0x6, 0x1, 0x10001}) 04:07:10 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) write$P9_RUNLINKAT(r0, &(0x7f00000000c0)={0x7, 0x4d, 0x1}, 0x7) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2426.065498][T11388] gfs2: can't find protocol [ 2426.065498][T11388] ock_nolock 04:07:10 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x5b2, 0x4200) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f00000001c0)='.#bdevsystem\x05%user\x00', 0x13) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='@\x00\x00\x00\x00\x00\x00\x00\x00=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x4}, 0x18) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="0412b79bdbee83a21ae3cf9fceb0adc0bf018a5d"], 0x14, 0x3) 04:07:10 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x101100, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000540)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000580)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) r6 = getpgid(0xffffffffffffffff) r7 = getuid() stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r2, &(0x7f0000000880)=[{&(0x7f0000000280)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000300)="0d1f2aa4d7aa653fddc273df45ecc7cd5292ed5f0ef51fdd2887fce71270f350ab7e2db5ca9452e0773efa0b1d02a4035419ffe881f91cfb97d776dbe8d0442deac4ac0383c8aa76275a23aa7d7f3b521d00a5752674f8a64534a26e90acb8b176d9a735667eccf5ca68b843a8ce3eae5ed5e09dfa5ea09cc92297cd11cb4fa1ab793b86481684d3ab275366503cece68751c47b6edbcc46bbc7b03901c5375b6810e8c5e43fa90e293aa0184abbb2b81e8f63dee330c2a90d0279a0df7528692141cf92c3f931cf17853945ced09bf3b1cb1a97ddb4", 0xd6}, {&(0x7f0000000400)="40ad3cf4dbb15dba05dcb356038864d84107412a84b6ea8948c5761c52ab19043f482e001b7e583769dc85b0fba3b000e83b431e9d4e066aa32858714155a5dd4958445af96b611127222efbdfa5b36980cd491cb71540db2be762924083af6180cda03bb7e8e22456e9de1b77d999d3162aa22e11ce2982fe546e38420767ed3ad678be879cccbbc874f6de47c91682553af3a772d8cdd10291e08d275796ada07507ec4a8e18fb1d13267e77e485ca36fdfc789ce54f33c425b2552d4c8407be1396d8b1a1c02fdcea90ac22d3a424e8bf0d7f45a458d854ee4e0da512f5b231bd77085d70993c20d1", 0xea}], 0x2, &(0x7f0000000800)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x30, 0x1, 0x1, [r1, r1, r0, r0, r1, r0, r1]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}], 0x70, 0x40044}], 0x1, 0x404c014) write$P9_RLERRORu(r1, &(0x7f0000000080)={0x1c, 0x7, 0x1, {{0xf, '(/cpusettrusted'}, 0x7ff}}, 0x1c) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r10 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0x100812, r0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r9, 0x84, 0x77, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="8d000300cc0071080000"], &(0x7f0000000100)=0xe) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r10, 0x84, 0x9, &(0x7f0000000140)={r11, @in6={{0xa, 0x4e21, 0xff, @local, 0xffffffffffff0fd7}}, 0xffffffff, 0x2, 0x3, 0x5680e94e, 0x2}, 0x98) [ 2426.149576][T11388] gfs2: can't find protocol [ 2426.149576][T11388] ock_nolock 04:07:10 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) 04:07:10 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x800, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:11 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x4802, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x6, 0x10000) read(r1, &(0x7f0000000100)=""/254, 0xfe) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:07:11 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x2, 0xffffffffffffff00, 0x8}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000100)="a22b199e81e42a60191b658554ef5ea82882ecfe24f19e7f3c4d639ac2844bfeb85b74e008cfd5a8ab9309914de231fb0595209a737b5c4012e5ccbcc9d014e0c7a87b00a373de2b6890161303bec1d4511004a4c819d9c75650b937f61a31808955cdda9adc5d6a756545470bcf6f1dbdccd2d9bebaa72e2fcc00e030fcb597cd4679db3e5b646db74ac9517221ab76cf976ccf5f867ac194b95f7d1288750da3c8d1b0f7f2c3fb67687c859a", 0xad) 04:07:11 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x1000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x480000, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000180)=0x3) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syz_tun\x00', 0x43732e5398416f1b}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2426.310601][T11588] gfs2: can't find protocol [ 2426.310601][T11588] ock_nolock 04:07:11 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) [ 2426.406957][T11588] gfs2: can't find protocol [ 2426.406957][T11588] ock_nolock 04:07:11 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) dup2(r0, r0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:11 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x7ffffffffffe, 0x0) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000000)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:07:11 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x4c00, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000080)={0x0, 0xaa8}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000140)={r3, 0xad, "88ed547882ca224946e02ca6547b13ca318ea9da995341daff7f0ce611cfe41739f36d7a38ede6fa5c1ca97355583ff9c2e01b2b9bfdf55d3aee5cbfb6d7620932f0bf9e853468570d411e958a6129aff4d4de02e703b4ca5810e9c895e5bf3c697740f3f6473788241897068c43c39cbc7378d5fdc71c64f9f528736745ba28097402574eb05753ef0e6d1f74294e0313e3564037cebb11ccc3f2a7749db5e0283ad0985eef311c1f6d11762e"}, &(0x7f0000000200)=0xb5) dup2(r1, r2) 04:07:11 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) socket$netlink(0x10, 0x3, 0x9) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x8, {0x8}}, 0x18) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmo\x00e=0000w0000000000040000,user_id=\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',gRoup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:11 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) [ 2426.589713][T11829] gfs2: can't find protocol [ 2426.589713][T11829] ock_nolock 04:07:11 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x4, 0x80140) ioctl$KDSETLED(r0, 0x4b32, 0x200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x200000, 0x0) 04:07:11 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) r1 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000280), 0x4) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)={0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f0000000340)={0x0, 0x0}) r4 = accept$netrom(r1, &(0x7f0000000380)={{}, [@bcast, @bcast, @remote, @bcast, @bcast, @default, @default, @rose]}, &(0x7f0000000400)=0x48) kcmp(r2, r3, 0x2, r4, r0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000200)=""/106) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f00000001c0)=r5) 04:07:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) setfsuid(r2) read(r1, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x402, 0x0) sendmsg$nl_netfilter(r3, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1b4, 0xe, 0xb, 0x1, 0x70bd2b, 0x25dfdbfd, {0x5, 0x0, 0x6}, [@typed={0x4, 0x22}, @typed={0xc, 0x58, @u64=0x101}, @nested={0x190, 0x41, [@generic="485622dff69832431f1929bcca6b57c45e2097fc21363987f7306a026dd61e0d5d03b297e580b58980a8bddc3d177790df1d459715be842036534fff8eec9cffad621265404626801edb7d4a00a584b222b54794598f68e25c96a8e806c10bb7b81cc1e83b60ec2477050d8052feb1b0033e8cae544beff6d158b964c4cc9e0915bc1aa999b9c402a49d54ef7b7c7b61d4d81791ec5cac87270432ebdead8ab2652baab1bb4c2daa555791c816b56801d9fe88d2368304245cb09649e6", @typed={0x8, 0x5b, @fd=r1}, @generic="1b6e80c655190ec24f3e027f6506108243cf95a3379db8880214ea91ed3ce7573cc1f2b5826200d1b5a650a739d393628433a680c36061c78bfcf74076a05d8203c5e131f33edc83c0e1ab26af9232c7957619552bf2eafb72be2ad935ab67444906a3681f74a3fecbae2e3e76d42140a75f61bd710cc499132988b6aee02ee953cfc69c7eb9482434245e60738c55b637e6a0e0cfcb289dec99892ac277c143e6fb1f45a614db78bf9e691f1536a492b5ba56bef121d4160f7efbe3cbaf5ba1687897f619"]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x8040}, 0x0) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000100)=0x1, 0x4) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r4) [ 2426.685553][T11829] gfs2: can't find protocol [ 2426.685553][T11829] ock_nolock 04:07:11 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x6000, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:11 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) 04:07:11 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x2000, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev={[], 0x23}, 'vxcan1\x00'}}, 0x1e) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:07:11 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200, 0x0) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x103, 0x1, "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"}, &(0x7f00000002c0), 0x400) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:11 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f527b22d2da1755f53030305d3002d830303030303030303034303030302c757365725f69643dbf694ea393fafa06c074b5a451e59322051f525684b11e120c4f954070e80c96eb2339facb17c358f29b180a96867e51716d30d3d776de8a919bbc177acb30f09de6c853f0c4f33af7de9a9d8a969de1abdf0fb3a7fb34424bd45db28650feb2ee62092547f9a834db1e94a73bb1c52d1d6e4a1fb3ce19670a2ac2c9f7dc9062ff912072dcb0781f6596f40227503b31701bf43e7f2b6daab399bfbad4dffb28c1f03433b9de7e4fcb70371895083e4b50c5a202fea1a940fd5a6cde", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000180)='/dev/fuse\x00', 0xffffffffffffffff) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fremovexattr(r0, &(0x7f0000000080)=@random={'trusted.', '*&)\x00'}) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2426.851707][T11952] gfs2: can't find protocol [ 2426.851707][T11952] ock_nolock 04:07:11 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)) [ 2426.937192][T11952] gfs2: can't find protocol [ 2426.937192][T11952] ock_nolock 04:07:11 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x6087, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:11 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0xe3, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:07:11 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c7230303030303030303030303034303030302c757365725f69643d00000000000000000000000000000d889a7eb5669885ec31bbe439f98d5aa667d4f35f4829a745331bb002451d8c654679f69017ca3a41b24a6f9139743388f1ab04efb482ec4489a225d6e4d2bfda171cdc2d4325753cba910a9700309a3d2888851fa33452ea875175f22f4830b7ab046474b156efc3ed6483b4bc67af940d7c687f045eed689ea2ea7dcfe7159052347294d713ff9d320a7de0b7249563cfe2d40054a8173aca54404abbcbb5", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 04:07:11 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000340)={{0x2c, @empty, 0x4e20, 0x2, 'nq\x00', 0xa, 0x2, 0xf}, {@local, 0x4e23, 0x0, 0xf2dd, 0x2, 0x2}}, 0x44) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) open$dir(&(0x7f0000000200)='./file0\x00', 0x40000, 0x41) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x400200, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f00000000c0)=0xa42b, 0x4) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x4}, 0x18) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x800000, &(0x7f0000000240)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[], [{@obj_role={'obj_role', 0x3d, 'group_id'}}, {@permit_directio='permit_directio'}, {@audit='audit'}, {@dont_appraise='dont_appraise'}]}}) 04:07:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x5, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80, 0x1) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000140), 0xd0e9cd49197a95f3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x40) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) read(r2, 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r4) [ 2427.100627][T12155] gfs2: can't find protocol [ 2427.100627][T12155] ock_nolock 04:07:11 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user='access=user'}, {@dfltuid={'dfltuid', 0x3d, r1}}, {@mmap='mmap'}, {@cache_loose='cache=loose'}, {@aname={'aname', 0x3d, '/dev/snapshot\x00'}}, {@cache_none='cache=none'}, {@cache_mmap='cache=mmap'}, {@fscache='fscache'}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@dont_hash='dont_hash'}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/snapshot\x00'}}]}}) mount$fuse(0x0, &(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='fuse\x00', 0x800, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x7000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8}}, {@default_permissions='default_permissions'}], [{@uid_lt={'uid<', r1}}]}}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x7fff}}}, &(0x7f0000000000)=0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r3, @in={{0x2, 0x4e22, @local}}, 0x5, 0x7, 0x6, 0x2, 0x2}, 0x98) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) [ 2427.206541][T12155] gfs2: can't find protocol [ 2427.206541][T12155] ock_nolock 04:07:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [{0x8fa, 0x0, 0x88}, {0x0, 0x0, 0x4c2}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:07:12 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB="70e4e0", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c63726f6a155d6719b1", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2427.246765][T12180] IPVS: set_ctl: invalid protocol: 44 0.0.0.0:20000 04:07:12 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x6800, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:12 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x3ffffc, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) [ 2427.430450][T12266] gfs2: can't find protocol [ 2427.430450][T12266] ock_nolock 04:07:12 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@known='security.apparmor\x00', &(0x7f0000000180)='\x00', 0x1, 0x3) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c3b000000008919c63d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x7, 0x1010, r0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x200000, 0x0) r2 = getpid() write$cgroup_pid(r1, &(0x7f0000000200)=r2, 0x8) 04:07:12 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x104) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2427.500214][T12266] gfs2: can't find protocol [ 2427.500214][T12266] ock_nolock 04:07:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f0000000100)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r2, 0x0, 0x0) fgetxattr(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7472c12e00"], &(0x7f0000000180)=""/32, 0x20) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r3) 04:07:12 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x6802, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:12 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffcbe) accept$netrom(r0, &(0x7f0000000100)={{}, [@bcast, @remote, @bcast, @bcast, @remote, @default, @netrom, @netrom]}, &(0x7f0000000080)=0x48) lseek(r1, 0x0, 0x5) fremovexattr(r0, &(0x7f0000000180)=@random={'osx.', 'memory.events\x00'}) mq_timedsend(r1, &(0x7f00000001c0)="0eb26c6670eeaddc12245e0afcc442ab4581924a7d84ac94876e488ca8e7f216a91fce84bcaf09417efed8dbcdca6005c24c1b50bc3ccacb7e", 0x39, 0x4, &(0x7f0000000240)={0x0, 0x1c9c380}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 04:07:12 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) dup3(r2, r1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) [ 2427.705819][T12550] gfs2: can't find protocol [ 2427.705819][T12550] ock_nolock 04:07:12 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0100cc992dcaefaa8414b979034557ddb92133f6660a87cb90bb9bab11fb9df782908faec12c04e70b3e57e5d57be43023256708af6626c970364db7d94745c2653606d9ac87e85cfe5ad3bb7286d0c6e4be9e68427e8202c66055edbd0e6f4adffd729cbece4fe987e8d9ff4441ccdd0bed7f16da359381c6d4582861d63b1eef9ece633c42b3c2c600"/153]) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) r1 = semget(0x0, 0x2, 0x20) semctl$GETVAL(r1, 0x1, 0xc, &(0x7f0000000180)=""/125) [ 2427.781214][T12550] gfs2: can't find protocol [ 2427.781214][T12550] ock_nolock 04:07:12 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x6c00, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000080)={0x3, 0x0, 0x0, 0x8}, 0x10) dup2(r1, r2) 04:07:12 executing program 1: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto(r0, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) 04:07:12 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000401}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r1, 0x200, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x40004) 04:07:12 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) socketpair(0x0, 0x4, 0x1, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x10000) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x2) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000340)) ioctl$SIOCRSACCEPT(r1, 0x89e3) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x1d2, 0x3}, 0x18) [ 2427.971311][T12841] gfs2: can't find protocol [ 2427.971311][T12841] ock_nolock 04:07:12 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair(0x0, 0x80800, 0xf9d, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0)={0xd11c, 0xa536, 0x4, 0x7}, 0x6) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000180)={0x1482ca99f65d6f10, 0x4}, 0x18) [ 2428.071914][T12841] gfs2: can't find protocol [ 2428.071914][T12841] ock_nolock 04:07:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xfe4, &(0x7f0000000140)="0adcc432289677478cd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) socket$inet_udplite(0x2, 0x2, 0x88) read(r1, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) dup2(r1, r3) 04:07:12 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x7000, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:12 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)) ppoll(&(0x7f0000000180)=[{r1}], 0x1, 0x0, 0x0, 0x0) 04:07:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2428.252101][T13143] gfs2: can't find protocol [ 2428.252101][T13143] ock_nolock 04:07:13 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000080)={0x3920, 0x3}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x104) ioctl$TIOCCONS(r1, 0x541d) 04:07:13 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="3ead4dc13dddd17ad578a347fe0066643d", @ANYRESHEX=r0, @ANYBLOB="2c726f6f74056f64653d303002f9ffec477c364ba835ed22f63030303030303400fb1953b60161c0ea5c02265fb26ea1e7c6c8dce52746f1b8584aebf1815a50a648b0482ca952bd813d02f5330257a06b0dd836c40bbd7a96ad761a0de3379df869846d3dfd471f07c4206319e152bdbb4be67207b16a6ab55b18", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:13 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) epoll_create(0x7) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) [ 2428.315551][T13143] gfs2: can't find protocol [ 2428.315551][T13143] ock_nolock 04:07:13 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x7400, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:13 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3ff800000000000, 0x8c481) accept$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x5) bind$inet(r0, &(0x7f0000000180)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) sendmsg(r0, &(0x7f0000000740)={&(0x7f0000000380)=@xdp={0x2c, 0x3, r3, 0x28}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="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", 0xff}, {&(0x7f0000000500)="ed6ebf2d71c9346c8ea7428cc00ca78439267363b0b0067e0ba66a7a5afa3f0d44382a5e3bc971effbfc897b55f658575a4f7b968a", 0x35}, {&(0x7f0000000900)="05449ebc8a0751ad46d0b0757154890b4fbb7d581cf51055f0415228300b0eae45af109a6a6bce082b51a25b1795c290e38c1afaa375ed046f9906cf73a2c788fdfaa3b9810abe30a7411ceda618c6fc8b43f2baeed44da7af2453d562b6e965bd734f86f63f5cdd00c5dc5fe68f863e8faeb9e62a8142cd05c467791b7fe0ce66b4d9eff2ef0326b9bff52e979b19594ad8126b83c1cb3d05e635907571e8d38a5cd8f8ed2d17282812058e238a9606cdc93d3df6fb9bcb046d8ce1c171bd30abb3e075579eee466df62b4cccc413df66e6be7cf79326309de568a58e7c43a962cea46867702c4133fb46c8ef21742addcda017f5f230d783065c862f6d6af400e59d0138983999bc994f682bce13edb52de1bb2dfbb11527f2ae302c5a369bc56d33fc57b93c201e34237f72ff0c749ac2312f0bae4f01703c711c10cac6f29b27931402bef8b8846f965b09e297d3dfff47bc10b82fa7c69780d3a97fcdd01efbfadd2cfb89c7718caf31f57427207769f5236d5ce317529b49485dd2e934ea88f7af1e48d898376d87a22a58f215e93c843b8100c451f953ff1952aa2c4409eae6f6005ae3a1ce08d6bbb24bb982718f21c1617055e9ec65d45fe974b373a1889900f9883d62400d4b799d4931877ba9757dd065d95f0249f9032ee96de99ea122e54d9f8d107bd75f6c92227f5e1edd0f7a710fb762721ea242b14f4af88d0fa9e4a379bc2c03fe2d185623658f9e32890c01e21f66132f8abbbd30ff68a4647adce49b309e84e71f20fa60c7c44208f9f308ff3e76469297d330787e171a053d8c2a4bbc933a9b9bade581b9c2ee25a3e90b5b165307ff0521c61bfb9c177ebbd1c362657677760df227328a1d8b9c5416d23c507909c4b5e03c04236ccf8803608f3c650f69f5f661de1f63cdc104839b250b4c48313d3dfb45f2e0ef0f8df606463f316c921540a53118a7b887fba4d5cb4e0192c621dd39729bb177f6c0151801be4e55afc8c5bbef70b243225a6fc4823c554327a78667f97d18983b5598676dd38b931ef778909f4842b8c2b00da5a618dd92f7b067d4de7bf60abbf6d5fda88938e07477acc5cc485517c1ca4ca0e03f45c19a8fe0ee89135411437fa7e1abf0298d5c3e7c5780d10f664f63e0716f0acbcd84ec8dad9c3d0a2993e7706164344171718c5b87f4a4a35be4bb1c327f5a23409a9722ca1a5076baa78c26db8144f5d2ed576830efd909b1caf839e8cc75788d6826a7394c5ecd508abf99abd00f5c6fad2c4427df4978bd2f01b80f0fde3dd64cdb12072ba412fef55418865a1ec3d0b7c89846dddcc5c0ee564a07be75e7f80413e8e925ffe8c6b482d9d0d15415731f7652d3ae99bc28e0ece48274e5d5a1f1f811228ed9a59dcc1a0a8d0c5ad48cb0ae4ab1bfeb9302d4c0911968322585e61d11cb3acc8c4ca2a8a60eff8abaab9bcd6c192097fe6799ddb8376dfd72254649d7963980bbf7a05acb46281da285cee5097e38bb9bcfbab8fc7847854f2bd75542aa40eebbad0871482d10fd1a47a4e3581fd01c9c2807a262e1711c96b39013ce0cd73f9c306b8ea0c0ac3b87263ec8af78ee80e015ed319927bea1ab080277132660ef42ad1544d51e84fd14fc748747a19a14230f5884b2a2ab0f85a202450074a05d6193c26c8de25acb727872e788f788e5670124993d23e17072cbcfbce95f62d979dd3eaa280d6924ec5e6e1105101bb01c74620899ac0d22ce1f37d4568fd8d1068cb1e44d73bedaf43e97e759ef41f1a666a14fb5309958a205caeda98fa3a0dba28fcbc6d759999eb79a27c243e4e2841448477d715c001c80cd7807dfb5d10ef527aef5b9f5bb5222ee0b05c606ecc3dd520f1e4d827d61c92d554d03fc5153d7255320694cd3196d234fe6e2f383a67d5e1616ef46ee9011f80cb7369bc626581fdd9f0a6baafc0b2b3dd89a542c575dfab72e80fff1fc21b61fb7398c4291239494124517e72f07477ece93f770569111f6b5452850ca98e90135e3dfa43eb6f7c9e517d6ec80f62f5dcdf51843b9464fdf9e0c3d7e0b0d0f94b1a248ffa00f8d4a74bf68d6435f2238ecd8386b8a43d57892f583e2b15485164b526ee900a633fbb36abb69917c4b7cfb35d9518e368d6af45c52fcb04019a9ee859454f09cbabad50f4e5d295acd6334876c6961caf9d9d2844d4091a3ca8310e842cca8389722184ec672743cf6204cb57972faefe10c316a9ecb5c441aff2d939fab898ff75d9d2aa7570a117778060def8f532797b66c889b7158ff8a341a20ae7fd0492604241679009a2bdf6526d7ce992dbf36d7140d07decf425503d3121a0f24f7b8c5fd569ea276cb06bf9deff427124cdc900d5aca6713065c89290f81b21e5e035924c64243976f7b422105007ccd455859ab56336da0110afd69a434b57324d4ef9f4b48c4a44ad5bf0da02328148d402771336113df46d6365e4dc77a19a087aa9616f297de25dbccb7e56691f9592be69d5f79410b94c14cf09b933ae451a21b4d4f28c4752227a2a1776bfb551435f8ddb780c128f917b7c29660e547a07521e73ca8399f00b5d0932c985e410a4031ce25709491ac104caf248680ffacd42f80ef44930af42b74ef6f8546112adfac8d36834a5dd4ff2007aaadca32e3f35d8dc5223a29f3264d78fe0333941990a3768017968167a4e644dca9dc8e556d2c900ac95a00bd4e5ac9d9fedeed7607d61380d4ff6ba42053c29a4147fe379ffcfa592de3d43756426c1c9228307c741a496ab4d3548f7b3379bccc26d4ec22f86316003079cc4ee398bed08c136edc036f9f3c44e55a6a8cf89ae2b44ca922536c891b901b26c4a5c956be1e0c2a963df0bf66bc2fc82611b09689a447f02210fd744cfa383bf18f4109df4c80333041278acd34d185b7d944e9770c0ae35ea9b8468dc3204b31048ffa01eb291d1907166a1e598d24170023021598057506f49b8a8e0211dd280c82887515b68c16c88cd2ecf5d4249d1afa83c476e2cce5b4bcdc93aca42b3833a774140f952bbcc5e2da06b4ddf3763735bacbab6b2b3ba8f23df28bd27887f09cbd4ea3cc70619f962fd5269e1abd7cee6984886de4d3a401bad7df11e21c2661b229956f96ed0c8595ca85e35f6c70631a9c637156819930c26b4eff34f4a20a4756fae60bc337066bf4d072cecf21f5b3cdf584cb34da5a0e41b310ec1a087cedc2f501283a30ad37f12e9777b0eeb54b08dc7c0f84bb033202fe2cab0a4716b01257eaa04acd6730e2ed0b42385b3376bf52715423d08c6f4e717fa744c47967118c994b0bd0dc1a5a6d09f7818f5157751a8bb1c8b01e0901fd7f69f0cee589940ff2305ca45415cb9a97d32918a815c35a6658a86318b4976117fcc63e92657f198b17c5c36b3c9dbca6bbe2fac9085a5baf0a4da4018b13a5b593c40a63ce190db6ac5c09ce63d28437e3c53715223d4d4fa0a0e18edbc3e01aca8faceb74b096b34c9161db840534b4100324d10e7d5b7862f37bd2a7d0f3780aade46f664d307c01faf8194758edb6a31b397eb424e55053375442cfc5f48dc12999fbf491ba6b8ca2475b2e0dac573040dda2bd34c12da0253489db1bc665edba1c0b48733959f129cd25b806578ea8de8304e3d7e7430d99ade368615bb95a25d1190403d2c04e579370c8b434cce9333c5f5c1c5d35bc9f785af7ab7593ce9d4be61075814522eeb86f85c631c5a57aa1646f2edcff14415918a00f03d588626b228762438e9799d0ede5e968e6cfd50b270a718afdeac17d09f900be08d7bf71f4cbf48378c912640e20e5a1c9cc93e70c79671f82bca0f8945d66e36160ef47c08b37f3da66682cb47bd09704b7e58930b0eb936298014d3d6f31aa5fec44ab98e51e12873528d555d85caee7ef42e39f3b12b95cb7aaed350cd22b653d94b7f7cd57f055b1f3ce8418f5630f4a3d18037f7cff9f3f30a301320e1f8f7457a18fcb52a4571bacabca5460ff25d25e1e37a8abe58fdb8a59909107058b834ae9ca5addbdf207459f18d838d42a897b1b84e6f9879ef429b1a1b17bc520e6f1af2a21521d866fec4daf4b2642ed43bd5296eeedf291caddf2ea7184f2dccfed915177c6197d49e2a98afb8d1b460ee395e1e1dad498b268263f3c5768102b944f7339960bd608bb9e97646609b58a6711c96ae680354079316d101d640aba9a7971a0885950de60f50d5ff7fdb68a79985d83e69e4c82c980e04bdde894caf577efafc976ab275b6c8adb2bd76541e60eb3f340ce1dd4d92961697d1141abf9a5b1b848c865b8c1785007900a0e2b74aad9351aa790f69381a947f80f2d9ef7298db3162f4c30a10c280767c230929828b00c27ca064b967f539a48d909d3b6cd8584d827e68ad3a4a1e97ebda9a6bcc99dee402d112a5b876fdeccc6955423770f16a16513403b84e0af5ed3f661c3936c5ee27fbeaba47628cb128c30a760c99a0a2847e3bb9703abf1c8129abb52f274295f0a2616f7c511eb5647756cdffc9ae5b39b23ef45d8eff47123524368f3ac8f97cbc87580169642d9f9d852d54d223fec2ba223f8e8b73342e20a845bffe9a07c886d913879951d63cd8619f59b1fc0c67536e652b766cab4c4b76ad61d826039c7616ca565668a9934af25b3dbd9a876b8973039e74a460b47ddd593051f18d8cb8406b155d6b7ebf26afd7234361129f50df92248fd7adffcc6132827d9784678c74d7ede7b5ab1c7ae743d310ece1faeff2e20ec57af482fc84bb65509973e34df917709b07314e4fb3e5eb496f5de96df04f8e09f6441dc11d26c26f78b1641a544e43db6eeceed474d02525fbf03399b6b576eca88ca375e8ec6977145efb7226e152894b2f65495e5a51d4d51e651116bb6109e4abf81d0f18864e3936c528f4ca1e68a6ab9910944f29214fead1d3bb5c23061bd85c63d96a56c3c0f317df58015e35a3b251fb1f816ad77b0b9f9d14f3ac2742339aadc69aed77dfa945e279e0c92f3bd33c4ef4bb94957186c0fcf1c0b3dc9cc944fbe16377d45c028abf81061a6f867aa1502784f04a6a87228aae5fbbeb5ceb4a27ce395d0b81db07578d67a0393da6373c7bc8a17d6a2eff1a022ba09baa73117089483f1244e9c3c83d8588256d5c189dbc1f1680e515fa4eda10ac811417e220f70e938e9b19c6f8c7386a22898736f7a08fbf9da0dbb627246500c441eb1fe80e076b25f878a098431eaaa081262d40b155c4b1c4a6dd641f612b6111370a0fb52ae420c8d7ff77b6df325ee6a1054d6f468977a85f97f92cbd08295e83eb0f3cdd85ff1f77e6cc9df2bebfb7349b56e9d5f3f76645615398d83c0d4234ec0da04ea8ad6d6bbdf10c9154caecb6aae17bc6649bc3095b84e6c77fb8765e18507573f66d9eee434854f32a280a2c66da2936459bc32ebcacff1f919da3a4ab49a5d7839a42330dfbae25e91dc199b3bbb727fb5907f92e65ccb8ee0cd479f1bde9dda0d781069505e4587209453dbe03cbc705c999b07346dbcc0a2c8611d9f5f6ec71181e71de4ab9ef6e07ffc33e81f82a51f4a12a6aa68aebb831c08953a82a330d572218682b0f124cc66f6e55f73bd1185817e368a38a51e425950422a1fc26b65e25a7e4c67b9ffc32a25f86cde59074438ea235ffc744d928a30462227421a602391c69ec47609877164d685fdf520371ef43119d7204df574c5aba8443434d085661c78834eb51873cb77e4a57f2238dcbd28cc4bc6d9b3966e4d3ba09f204adc29822404f0", 0x1000}], 0x3, &(0x7f0000000580)=[{0x98, 0x101, 0x5, "0c20e94880945f056903034700a069eeafe14be5d45454005afcacb00befe95d1d022ff4a5d3b415c478a46949fcaf25ddba85695d819e000c8e6797e73225e420396d6a8250ed29a299f7743ab61dc2470044ce63b90a72771f17ae736db9f30fc7c9a75dacae349fb0ccb5535d3cfa881e81e2b14f5e807c5cf70dba0678611326a56bfadf"}, {0xd0, 0x11e, 0x0, "b963912874181ada1deb112a7ab741ff6ced72811104a84707dcc791f0f5d55ab0d28216752afda0c12b233cf56ddef339e414834ea52262576574a87fbfa8feb64bc2ca5608d699b7bda07f501af23d5e6e9604c72ce46b733653c22ec55cb4a43a3eecc81ea7c2233009379bd0d5a815f0d572e8eaa4f1eab8a259db4be4f2d6ff15337b08a9bbd8a162867705bf03e86fcea6a877a3c03400973be1c6a43d2dcc4541549f1fc4db340bb2062d44dd2c26fc65e5e67f8613e5a6"}, {0x40, 0x19f, 0x5, "5bcef6e8098d16f13ee73ef45427117d90e71890ead3c9aa283839c64a6f5a224b6be3dccfe0e4e90fc37f96fd"}], 0x1a8}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={0x0, r4, 0x9}, 0x14) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180), 0x1, &(0x7f0000000200)=""/20, 0x1b2}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:07:13 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fcntl$getflags(r0, 0xb) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x100000001, 0x204001) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x2, @empty, 0xff}, @in6={0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x40}, @in6={0xa, 0x4e22, 0x3ff, @rand_addr="0beabd42a1d1cd125c4a4e12650402b9", 0xf9}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e20, 0x20, @local, 0x100000000}, @in6={0xa, 0x4e23, 0x7fff, @remote, 0xffff}, @in6={0xa, 0x4e22, 0x20, @mcast1}], 0xb8) read(r1, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r3) 04:07:13 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2428.530539][T13350] gfs2: can't find protocol [ 2428.530539][T13350] ock_nolock 04:07:13 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x10) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2428.631834][T13350] gfs2: can't find protocol [ 2428.631834][T13350] ock_nolock 04:07:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8, &(0x7f0000000100)="0adc1f123c123f319bd070ea0e5c0b0282343cd4353ba2fb8ffbf7c60a04e929c5d3bbaba7b415ec236e6b696eefec6764f583d57f759c7e5b6033d19064f88a23471bfa1b682f03415cd5c6dacb11b7cc0a10f7b459afdbc9c0b090e4622802967abd4c1ad8ae2b3e6e784d268fcd4ca386ec168a56626d32c8f374657e3ecc7121a0dc577f1e11b1df18cb2eb059546f15118ca304d7483a3bb3cabb5128b16ac591893d08e357e3146238d81132ced52220e7276c") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:07:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000000)={0x20, 0x0, 0x8}, 0x20) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:07:13 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x88000) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000080)) 04:07:13 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x7a00, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:13 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="d3fed22e60"]) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:13 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="4967726f74705f69643d298dc5df5c0614", @ANYRESDEC=0x0, @ANYBLOB="2c009f896fcb6daa4ae952d29ac149cbf985cb49f0cf871a1aed13adaade0eb12e5a1726f1d1e3c6271beb0c20ba9f4979e81f62d1b6823cf6fcb8444e3fa0f200a8078b2f8f8b4e1385fe156300479b4d2958da7a0119218e83cee4d19d6023af28a0484ad5f28dd9a5184a4145c223f13a7c40d6428c80edc78fe38e939b0acfac28b07747"]) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x438b, 0x4000) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x6) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_mr_vif\x00') ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f00000000c0)='syz1\x00') write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f00000002c0)={0x0, 0x0, r2}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000340)={r3, 0x80000, r2}) 04:07:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x82, 0x0) dup2(r1, r2) 04:07:14 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0xffffffffffffff9b, 0x3}, 0x18) [ 2429.234486][T13789] gfs2: can't find protocol [ 2429.234486][T13789] ock_nolock 04:07:14 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) getgroups(0x8, &(0x7f0000000040)=[0xee00, 0xee01, 0xee01, 0xee01, 0xee01, 0xee00, 0xee00, 0xffffffffffffffff]) prctl$PR_SET_UNALIGN(0x6, 0x3) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="2702"]) writev(r0, &(0x7f00000015c0)=[{&(0x7f0000000200)="a0cd09e9a9ca290bc1e6e6e022cf204e01f7fde655386d68257eba044024bf636e632597818461a2184f27bfbdf8f4932bf8a878e4624418b8487fcd04699bd1389a61c2421a21012121d0c0d2950b71583158c58e", 0x55}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="e4453982a09af238864a8b16e9be0957e7effd00719c6c505211cedfbc5a5d1795c2015a480c968e65b8a602adf3ba33ac81cd7699d6facf768fdefde029e2d98a437d4c001c40d04c6e4b0c36e7bd48a7e3bce302161b5ca126fe9bd51f133f699b4566ab9531914fa021000c4150a956b8bcbc47a92843f9b075c3943374cb26ff4972941045696544ff2f571659d8f8796fa6da772d7dd727a2eee58f026a254a2b4e4cdbe829c9c1209658ee466f1cad76c17dd2baa340b3d8b4092d5dfce431edff1c37bfed6af7483d54db1bb1810a936c305d17", 0xd7}, {&(0x7f0000001440)="5e34e6dbe9887c3162123c1ba73116b0443f4c8ef703572e9dcf038301764b2ee41a9b71d493dda8a7f4443f9150cfdebfb009114df943b7f3396db335f2ab00ab2cce455b5c0b541892e2760c20bcac0cc523b62fc0dbca01af799b9489614aee026cb38b39ae556059e964ecbaa0687d0731ab00e7ddeac4fd3a468ec798108c60fa8bd5979cf93038116c1208d4fe981893523b0f3ccf49c89db2694bccdbed551a712b50fe84e95d8d68ff60e3e354300ed85fae7237b5", 0xb9}, {&(0x7f0000000280)="fa63c8a51127ce458378e9607a4ec8ae76f9e49185d99d25bd9effba64d79355b6c44ee797b48c7bbc284ef66937129fa0f7bc9534f876d49d28bde32a3dcfd5280d8bea5077eb400825410c8d0d385aeae45bd4", 0x54}, {&(0x7f0000001500)="4aaa383b72adc0b08522952c193445048b0c6a3a97db98b6994192f2cf5d420b90ac7a781fa82b77a43d58cf3d7119eab4a20c471ecd4e18bc0e0d15088787385423e080f918ee4ada5daa247427416065e6cf35b5dc666d6fcbd9ea1b2efaa216f321cde847014ec6c66906c829246d6b82e52d176d65982d7e15122326761e04e2bc8699faa2d47dbd6419a2de5573f069d0d23e2992d53440cf0373de9b48d4a4d8d1cbfb8234873875f0c1e0345af1b2eaf2ef84b57e512447d213", 0xbd}, {&(0x7f00000000c0)="8b8e2a5ba6447c65e40a181fe32c5b", 0xf}], 0x7) 04:07:14 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x480001, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x14000400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8001}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040000}, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x10000, 0x0) [ 2429.330984][T13789] gfs2: can't find protocol [ 2429.330984][T13789] ock_nolock 04:07:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f0000000080)=""/60, &(0x7f0000000100)=0x3c) 04:07:14 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB="e6763d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:14 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x3, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x80000001, @mcast1, 0xfffffffffffff608}}, [0x7, 0x4, 0x4, 0x7ae8d661, 0x3, 0x4, 0x6f3, 0x100, 0xca8, 0x10001, 0x7fff, 0x6, 0x29, 0x0, 0x9]}, &(0x7f0000000000)=0x100) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r1, 0x195a5355, 0x10}, 0xc) 04:07:14 executing program 1: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000340)='./file0\x00', 0x4) openat$smack_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpgid(0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) umount2(&(0x7f0000000380)='./file0\x00', 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 04:07:14 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:14 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0x8203, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:14 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x100, 0x0) 04:07:14 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='f=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x20000, 0x104) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000180)=0x9fb) getegid() [ 2429.614902][T14163] gfs2: can't find protocol [ 2429.614902][T14163] ock_nolock 04:07:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @remote}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x552c182b9ddfe8f2, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}, 'netdevsim0\x00'}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x21841c445ae575f3, 0x0) epoll_wait(r2, &(0x7f0000000100)=[{}], 0x1, 0xfcb) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r3) 04:07:14 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000080)={r1, 0x23}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:07:14 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$VIDIOC_S_MODULATOR(0xffffffffffffffff, 0x40445637, &(0x7f0000000180)={0x5, "dfc7980a07a52ca24a7e9d3e0e12e71e6d35da838d12654cdc4ec971394a11a0", 0x2, 0x5, 0x80000001, 0x8}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) [ 2429.737808][T14163] gfs2: can't find protocol [ 2429.737808][T14163] ock_nolock 04:07:14 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) listen(r0, 0x6) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10500, 0x40) 04:07:14 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xa000, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:14 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) r1 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x50b000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) getresuid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='9p\x00', 0x4, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client='access=client'}], [{@smackfsdef={'smackfsdef', 0x3d, '.ppp1\\-trusted&}]%'}}, {@obj_user={'obj_user', 0x3d, '{.,'}}, {@euid_gt={'euid>', r3}}, {@subj_role={'subj_role', 0x3d, '$!user'}}, {@dont_appraise='dont_appraise'}, {@pcr={'pcr', 0x3d, 0x39}}, {@seclabel='seclabel'}, {@fowner_gt={'fowner>', r4}}, {@seclabel='seclabel'}]}}) 04:07:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x200000, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000100)={0x2}) r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r2, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r3) 04:07:14 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) readahead(r0, 0x7, 0x1f) [ 2429.924765][T14533] gfs2: can't find protocol [ 2429.924765][T14533] ock_nolock 04:07:14 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x155, 0x3, 0x0, {0x20}}, 0xffffffffffffff3a) 04:07:14 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x5, 0x4, 0x20}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2430.006416][T14533] gfs2: can't find protocol [ 2430.006416][T14533] ock_nolock 04:07:14 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000004000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:14 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x1, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x100, 0x0) 04:07:14 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x800000000000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:14 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xa403, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r0, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:07:15 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x41) ioctl$SIOCRSACCEPT(r0, 0x89e3) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x1f, 0x6, &(0x7f00000015c0)=[{&(0x7f00000001c0)="79c4fa3c0d914b75d6a3ee9b8b451d939f8e6605fd2ba7", 0x17, 0xb54f}, {&(0x7f0000000340)="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", 0x1000, 0x2a}, {&(0x7f0000000200)="e4e3db9dcc02240787fab70063db209cf6dbcc31491e8686d57079052c8d5b6c2478ab9fdd60967ddcb7c40a06f471e643cb16689a2d0353378e806dea58bcd8cabb41251c338395322e845c0a263e0b1d10dda140d99f7c51ee8924a44c9a9aac26d9f898141765d2f94b5698ce5df423a92b4024619c1f642bdf226e366c15c20501e7586649846eade76f0d4e358b91", 0x91, 0xffff}, {&(0x7f00000002c0)="23e2946f5bfb77f47f1546cbba42c171b246ee7389", 0x15, 0xfffffffffffffff8}, {&(0x7f0000001440)="c697be09d48615d0a4f44ca01ae28bc20a75559131e7f66b72e7e27747cebb84c8d79d7010ea7d6ca5a505b5f217506cc664bcda9347730a66c61bc94686878aedc6e72afd36ac5a996d3710e6596d3ac1b25dca6f6c5287c7369388c55345f0657565a12596aac8b4c44ce5cb00ef4d491b18f993c344a1dd81b681afc0905f076d289b333c6535bd0356afb6c6447a1e8bc54e9e510638421c8a9ed557f2151957ec9fb455724c50e20f4eb2", 0xad, 0x3}, {&(0x7f0000001500)="94a193d1fccabb4ab09b89cc5f52eca5f2bc64adeb6e9c19bd0201df1dce9847ecd124ca651bb121b34284442f443b7d01e6935ec36526ab7dcf4f402199108a6cdc5018495199bec39da9d5f41b8bd65ebf25bcc889f8eaa039d5163982a7eac05e7e2bd462b0922add71058347f615396ae21f66569627e3f00c776b36cc8d5e022f903947fbafbb4c414d2d11ca0a2a225a91eb559d", 0x97}], 0x80020, &(0x7f0000001700)={[{@noinline_xattr='noinline_xattr'}, {@whint_mode_user='whint_mode=user-based'}, {@four_active_logs='active_logs=4'}, {@inline_data='inline_data'}, {@whint_mode_user='whint_mode=user-based'}, {@usrquota={'usrquota', 0x3d, '(bdevselfself'}}], [{@fowner_eq={'fowner', 0x3d, r2}}, {@seclabel='seclabel'}, {@subj_user={'subj_user'}}, {@seclabel='seclabel'}, {@smackfstransmute={'smackfstransmute'}}]}) dup3(r0, r0, 0x80000) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2430.254564][T14732] gfs2: can't find protocol [ 2430.254564][T14732] ock_nolock 04:07:15 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x7, 0x3}, 0x18) 04:07:15 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x5, 0x4, 0x20}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) 04:07:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) bind$bt_rfcomm(r2, &(0x7f0000000200)={0x1f, {0x100000000, 0x8000, 0xff, 0x6, 0xfa, 0x2}, 0x1}, 0xa) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000100)={{{@in=@dev, @in6=@dev}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f0000000080)=0xe8) dup2(r1, r2) [ 2430.379018][T14732] gfs2: can't find protocol [ 2430.379018][T14732] ock_nolock 04:07:15 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:15 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f00000001c0)={0xb6, "06b772a8f0a2254b30dca4bfe9f2712c4e1a16cc8cdb0379982eccd5df18d193", 0x1, 0x1}) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r1, 0x0, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x9, @link='syz1\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x4040) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:07:15 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xd603, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:15 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) ioctl$TIOCSETD(r1, 0x5437, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') 04:07:15 executing program 3 (fault-call:4 fault-nth:0): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) [ 2430.570188][T15107] gfs2: can't find protocol [ 2430.570188][T15107] ock_nolock 04:07:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x40000, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000300)={{0x0, 0x6000000000000000}, 0x1}, 0x11a9e254) r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r2, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) setitimer(0x3, &(0x7f0000000240)={{0x0, 0x2710}, {r3, r4/1000+30000}}, &(0x7f0000000280)) ppoll(&(0x7f0000000140)=[{r2, 0x2000}], 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)={0xfffffffffffffff8}, 0x8) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r5) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f00000002c0)) 04:07:15 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) times(&(0x7f0000000040)) 04:07:15 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80, 0x0) 04:07:15 executing program 2: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000080)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xfffffffffffffffc, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) [ 2430.666178][T15107] gfs2: can't find protocol [ 2430.666178][T15107] ock_nolock [ 2430.692944][T15187] FAULT_INJECTION: forcing a failure. [ 2430.692944][T15187] name failslab, interval 1, probability 0, space 0, times 0 [ 2430.756287][T15187] CPU: 0 PID: 15187 Comm: syz-executor.3 Not tainted 5.1.0-rc5+ #70 [ 2430.764316][T15187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2430.774377][T15187] Call Trace: [ 2430.777684][T15187] dump_stack+0x172/0x1f0 [ 2430.782028][T15187] should_fail.cold+0xa/0x15 [ 2430.786629][T15187] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2430.792454][T15187] ? ___might_sleep+0x163/0x280 [ 2430.797321][T15187] __should_failslab+0x121/0x190 [ 2430.802267][T15187] should_failslab+0x9/0x14 [ 2430.806795][T15187] kmem_cache_alloc_node_trace+0x270/0x720 [ 2430.812634][T15187] ? mutex_trylock+0x1e0/0x1e0 [ 2430.817414][T15187] __kmalloc_node+0x3d/0x70 [ 2430.821947][T15187] kvmalloc_node+0x68/0x100 [ 2430.826459][T15187] alloc_netdev_mqs+0x98/0xd30 [ 2430.831233][T15187] ? sl_free_netdev+0x70/0x70 [ 2430.835919][T15187] slip_open+0x38e/0x1138 [ 2430.840262][T15187] ? sl_uninit+0x20/0x20 [ 2430.844514][T15187] ? lock_downgrade+0x880/0x880 [ 2430.849376][T15187] ? sl_uninit+0x20/0x20 [ 2430.853625][T15187] tty_ldisc_open.isra.0+0x8b/0xe0 [ 2430.858745][T15187] tty_set_ldisc+0x2d7/0x690 [ 2430.863346][T15187] tty_ioctl+0x5dc/0x15c0 [ 2430.867683][T15187] ? tty_register_device+0x40/0x40 [ 2430.872804][T15187] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2430.879087][T15187] ? tomoyo_init_request_info+0x105/0x1d0 [ 2430.884825][T15187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2430.891069][T15187] ? tomoyo_path_number_perm+0x263/0x520 [ 2430.896718][T15187] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2430.902539][T15187] ? __fget+0x35a/0x550 [ 2430.906712][T15187] ? tty_register_device+0x40/0x40 [ 2430.911828][T15187] do_vfs_ioctl+0xd6e/0x1390 [ 2430.916434][T15187] ? ioctl_preallocate+0x210/0x210 [ 2430.921551][T15187] ? __fget+0x381/0x550 [ 2430.925719][T15187] ? ksys_dup3+0x3e0/0x3e0 [ 2430.930165][T15187] ? tomoyo_file_ioctl+0x23/0x30 [ 2430.935125][T15187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2430.941375][T15187] ? security_file_ioctl+0x93/0xc0 [ 2430.946497][T15187] ksys_ioctl+0xab/0xd0 [ 2430.950666][T15187] __x64_sys_ioctl+0x73/0xb0 [ 2430.955271][T15187] do_syscall_64+0x103/0x610 [ 2430.959876][T15187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2430.965803][T15187] RIP: 0033:0x458c29 [ 2430.970224][T15187] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2430.989833][T15187] RSP: 002b:00007f80ebef8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2430.998248][T15187] RAX: ffffffffffffffda RBX: 00007f80ebef8c90 RCX: 0000000000458c29 04:07:15 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xda01, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) [ 2431.006243][T15187] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 [ 2431.014214][T15187] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2431.022646][T15187] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80ebef96d4 [ 2431.030619][T15187] R13: 00000000004c3082 R14: 00000000004d6428 R15: 0000000000000005 04:07:15 executing program 0 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) [ 2431.122317][T15396] gfs2: can't find protocol [ 2431.122317][T15396] ock_nolock [ 2431.150400][T15403] FAULT_INJECTION: forcing a failure. [ 2431.150400][T15403] name failslab, interval 1, probability 0, space 0, times 0 [ 2431.169306][T15403] CPU: 0 PID: 15403 Comm: syz-executor.0 Not tainted 5.1.0-rc5+ #70 [ 2431.177305][T15403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2431.187356][T15403] Call Trace: [ 2431.187382][T15403] dump_stack+0x172/0x1f0 [ 2431.187406][T15403] should_fail.cold+0xa/0x15 [ 2431.187427][T15403] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2431.187451][T15403] ? ___might_sleep+0x163/0x280 [ 2431.187475][T15403] __should_failslab+0x121/0x190 [ 2431.199674][T15403] should_failslab+0x9/0x14 [ 2431.199692][T15403] kmem_cache_alloc_trace+0x2d1/0x760 [ 2431.199710][T15403] ? is_bpf_text_address+0xac/0x170 [ 2431.199726][T15403] ? find_held_lock+0x35/0x130 [ 2431.199748][T15403] fuse_dev_do_write+0xca2/0x24c0 [ 2431.219798][T15403] ? fuse_dev_read+0x200/0x200 [ 2431.219815][T15403] ? __lock_acquire+0x548/0x3fb0 [ 2431.219838][T15403] ? aa_file_perm+0x40b/0xeb0 [ 2431.240159][T15403] ? find_held_lock+0x35/0x130 [ 2431.240185][T15403] ? aa_file_perm+0x40b/0xeb0 [ 2431.240204][T15403] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2431.240226][T15403] ? memset+0x32/0x40 [ 2431.249911][T15403] fuse_dev_write+0x15c/0x1f0 [ 2431.249929][T15403] ? fuse_dev_splice_write+0xaf0/0xaf0 [ 2431.249944][T15403] ? aa_file_perm+0x432/0xeb0 [ 2431.249968][T15403] ? aa_path_link+0x460/0x460 [ 2431.249981][T15403] ? find_held_lock+0x35/0x130 [ 2431.249995][T15403] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2431.250009][T15403] ? iov_iter_init+0xee/0x220 [ 2431.250030][T15403] new_sync_write+0x4c7/0x760 [ 2431.250049][T15403] ? default_llseek+0x2e0/0x2e0 [ 2431.270362][T15403] ? common_file_perm+0x238/0x720 [ 2431.270379][T15403] ? __fget+0x381/0x550 [ 2431.270405][T15403] ? apparmor_file_permission+0x25/0x30 [ 2431.333689][T15403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2431.339942][T15403] ? security_file_permission+0x94/0x380 [ 2431.345587][T15403] __vfs_write+0xe4/0x110 [ 2431.349932][T15403] vfs_write+0x20c/0x580 [ 2431.354192][T15403] ksys_write+0x14f/0x2d0 [ 2431.358531][T15403] ? __ia32_sys_read+0xb0/0xb0 [ 2431.363329][T15403] ? do_syscall_64+0x26/0x610 04:07:16 executing program 3 (fault-call:4 fault-nth:1): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) [ 2431.368025][T15403] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2431.374091][T15403] ? do_syscall_64+0x26/0x610 [ 2431.378787][T15403] __x64_sys_write+0x73/0xb0 [ 2431.383384][T15403] do_syscall_64+0x103/0x610 [ 2431.388032][T15403] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2431.393945][T15403] RIP: 0033:0x458c29 [ 2431.397841][T15403] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:07:16 executing program 5: r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f0000000080)=0x6e, 0x80000) fstat(r0, &(0x7f0000000180)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0xfffffffffffffe08) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r3) 04:07:16 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x101102, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000001580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="6f73322e66757365003d075db2568e53058fb390e64a5d7e94e538a6efd2e73dbf9715766ad8374e282efb525f6a7f2f04ab339757667d486f75d6d80c1ebdd9453c55147301009bc5f167c3432d301f83232f70b87f8ebce1f9666637743b150935e73bcf5f41d76687e04d7506a324caca0429607e53564c56c541a354e9537534caaef455fb"], 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:07:16 executing program 0 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:07:16 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) ioctl$TIOCSETD(r1, 0x5437, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') [ 2431.417451][T15403] RSP: 002b:00007f4c02fd5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2431.425877][T15403] RAX: ffffffffffffffda RBX: 00007f4c02fd5c90 RCX: 0000000000458c29 [ 2431.433854][T15403] RDX: 0000000000000018 RSI: 0000000020000000 RDI: 0000000000000003 [ 2431.441826][T15403] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2431.441836][T15403] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c02fd66d4 [ 2431.441845][T15403] R13: 00000000004c8003 R14: 00000000004de408 R15: 0000000000000004 [ 2431.539211][T15396] gfs2: can't find protocol [ 2431.539211][T15396] ock_nolock [ 2431.575444][T15409] FAULT_INJECTION: forcing a failure. [ 2431.575444][T15409] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2431.588681][T15409] CPU: 0 PID: 15409 Comm: syz-executor.3 Not tainted 5.1.0-rc5+ #70 [ 2431.596663][T15409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2431.606719][T15409] Call Trace: [ 2431.610021][T15409] dump_stack+0x172/0x1f0 [ 2431.614365][T15409] should_fail.cold+0xa/0x15 [ 2431.618970][T15409] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2431.624783][T15409] ? __lock_acquire+0x548/0x3fb0 [ 2431.624808][T15409] should_fail_alloc_page+0x50/0x60 [ 2431.624824][T15409] __alloc_pages_nodemask+0x1a1/0x7e0 [ 2431.624845][T15409] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 2431.640316][T15409] ? find_held_lock+0x35/0x130 [ 2431.640342][T15409] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2431.640363][T15409] cache_grow_begin+0x9c/0x860 [ 2431.640384][T15409] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2431.640404][T15409] kmem_cache_alloc_node_trace+0x658/0x720 [ 2431.640421][T15409] ? mutex_trylock+0x1e0/0x1e0 [ 2431.640452][T15409] __kmalloc_node+0x3d/0x70 [ 2431.682814][T15409] kvmalloc_node+0x68/0x100 04:07:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f0000000100)={0x2, 0x100000001, {0x53, 0xffff, 0x5, {0x4, 0x7}, {0x2, 0x1}, @rumble={0xb7, 0x7}}, {0x55, 0x3, 0xffff, {0x80000000, 0x9}, {0x6, 0x3}, @cond=[{0x7fff, 0x6, 0x7, 0x7fff, 0x8, 0x4}, {0x9, 0x7ff, 0x2, 0x100000001, 0x199a2999}]}}) read(r1, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r3) [ 2431.687329][T15409] alloc_netdev_mqs+0x98/0xd30 [ 2431.692105][T15409] ? sl_free_netdev+0x70/0x70 [ 2431.696803][T15409] slip_open+0x38e/0x1138 [ 2431.701184][T15409] ? sl_uninit+0x20/0x20 [ 2431.705438][T15409] ? lock_downgrade+0x880/0x880 [ 2431.710322][T15409] ? sl_uninit+0x20/0x20 [ 2431.714571][T15409] tty_ldisc_open.isra.0+0x8b/0xe0 [ 2431.719696][T15409] tty_set_ldisc+0x2d7/0x690 [ 2431.724301][T15409] tty_ioctl+0x5dc/0x15c0 [ 2431.728641][T15409] ? tty_register_device+0x40/0x40 [ 2431.733758][T15409] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2431.740010][T15409] ? tomoyo_init_request_info+0x105/0x1d0 [ 2431.745738][T15409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2431.751985][T15409] ? tomoyo_path_number_perm+0x263/0x520 [ 2431.757635][T15409] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2431.763459][T15409] ? __fget+0x35a/0x550 [ 2431.767633][T15409] ? tty_register_device+0x40/0x40 [ 2431.772751][T15409] do_vfs_ioctl+0xd6e/0x1390 [ 2431.777354][T15409] ? ioctl_preallocate+0x210/0x210 [ 2431.782468][T15409] ? __fget+0x381/0x550 [ 2431.786641][T15409] ? ksys_dup3+0x3e0/0x3e0 [ 2431.791068][T15409] ? tomoyo_file_ioctl+0x23/0x30 [ 2431.796026][T15409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2431.802305][T15409] ? security_file_ioctl+0x93/0xc0 [ 2431.807427][T15409] ksys_ioctl+0xab/0xd0 [ 2431.811591][T15409] __x64_sys_ioctl+0x73/0xb0 [ 2431.816205][T15409] do_syscall_64+0x103/0x610 [ 2431.820814][T15409] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2431.826718][T15409] RIP: 0033:0x458c29 [ 2431.830620][T15409] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2431.850250][T15409] RSP: 002b:00007f80ebef8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2431.858672][T15409] RAX: ffffffffffffffda RBX: 00007f80ebef8c90 RCX: 0000000000458c29 [ 2431.866648][T15409] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 [ 2431.874622][T15409] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2431.882595][T15409] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80ebef96d4 04:07:16 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) [ 2431.890570][T15409] R13: 00000000004c3082 R14: 00000000004d6428 R15: 0000000000000005 04:07:16 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) ioctl$TIOCSETD(r1, 0x5437, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') 04:07:16 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xe000, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:16 executing program 3 (fault-call:4 fault-nth:2): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:16 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0xf, 0x6}, 0x18) [ 2432.072945][T15677] gfs2: can't find protocol [ 2432.072945][T15677] ock_nolock 04:07:16 executing program 1 (fault-call:3 fault-nth:0): r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x408c5333, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 04:07:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2432.129580][T15727] FAULT_INJECTION: forcing a failure. [ 2432.129580][T15727] name failslab, interval 1, probability 0, space 0, times 0 [ 2432.155449][T15727] CPU: 1 PID: 15727 Comm: syz-executor.3 Not tainted 5.1.0-rc5+ #70 [ 2432.163453][T15727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2432.173511][T15727] Call Trace: [ 2432.176821][T15727] dump_stack+0x172/0x1f0 [ 2432.181167][T15727] should_fail.cold+0xa/0x15 [ 2432.185771][T15727] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2432.191682][T15727] ? ___might_sleep+0x163/0x280 [ 2432.196540][T15727] __should_failslab+0x121/0x190 [ 2432.201486][T15727] should_failslab+0x9/0x14 [ 2432.206002][T15727] kmem_cache_alloc_node_trace+0x270/0x720 [ 2432.211844][T15727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2432.218095][T15727] ? dev_addr_init+0x17f/0x200 [ 2432.222902][T15727] __kmalloc_node+0x3d/0x70 [ 2432.227422][T15727] kvmalloc_node+0x68/0x100 [ 2432.231937][T15727] alloc_netdev_mqs+0x67f/0xd30 [ 2432.236798][T15727] ? sl_free_netdev+0x70/0x70 [ 2432.241484][T15727] slip_open+0x38e/0x1138 [ 2432.245829][T15727] ? sl_uninit+0x20/0x20 [ 2432.250080][T15727] ? lock_downgrade+0x880/0x880 [ 2432.254955][T15727] ? sl_uninit+0x20/0x20 [ 2432.259209][T15727] tty_ldisc_open.isra.0+0x8b/0xe0 [ 2432.264328][T15727] tty_set_ldisc+0x2d7/0x690 [ 2432.268932][T15727] tty_ioctl+0x5dc/0x15c0 [ 2432.273276][T15727] ? tty_register_device+0x40/0x40 [ 2432.278392][T15727] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2432.284639][T15727] ? tomoyo_init_request_info+0x105/0x1d0 [ 2432.290378][T15727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2432.296620][T15727] ? tomoyo_path_number_perm+0x263/0x520 [ 2432.302263][T15727] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2432.308083][T15727] ? __fget+0x35a/0x550 [ 2432.312270][T15727] ? tty_register_device+0x40/0x40 [ 2432.317387][T15727] do_vfs_ioctl+0xd6e/0x1390 [ 2432.321993][T15727] ? ioctl_preallocate+0x210/0x210 [ 2432.327123][T15727] ? __fget+0x381/0x550 [ 2432.331300][T15727] ? ksys_dup3+0x3e0/0x3e0 [ 2432.335732][T15727] ? tomoyo_file_ioctl+0x23/0x30 [ 2432.340687][T15727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2432.346930][T15727] ? security_file_ioctl+0x93/0xc0 [ 2432.346950][T15727] ksys_ioctl+0xab/0xd0 [ 2432.346973][T15727] __x64_sys_ioctl+0x73/0xb0 [ 2432.360809][T15727] do_syscall_64+0x103/0x610 [ 2432.365409][T15727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2432.371298][T15727] RIP: 0033:0x458c29 [ 2432.371314][T15727] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2432.371323][T15727] RSP: 002b:00007f80ebef8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2432.371337][T15727] RAX: ffffffffffffffda RBX: 00007f80ebef8c90 RCX: 0000000000458c29 [ 2432.371346][T15727] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 [ 2432.371354][T15727] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 04:07:17 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x20000018, 0x6}, 0x18) [ 2432.371369][T15727] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80ebef96d4 [ 2432.435122][T15727] R13: 00000000004c3082 R14: 00000000004d6428 R15: 0000000000000005 04:07:17 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000080)=0x4) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) 04:07:17 executing program 3 (fault-call:4 fault-nth:3): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) [ 2432.503234][T15677] gfs2: can't find protocol [ 2432.503234][T15677] ock_nolock 04:07:17 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xe302, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:17 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) accept$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) [ 2432.626453][T15818] FAULT_INJECTION: forcing a failure. [ 2432.626453][T15818] name failslab, interval 1, probability 0, space 0, times 0 [ 2432.668821][T15818] CPU: 0 PID: 15818 Comm: syz-executor.3 Not tainted 5.1.0-rc5+ #70 [ 2432.676849][T15818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2432.686909][T15818] Call Trace: [ 2432.690224][T15818] dump_stack+0x172/0x1f0 [ 2432.694572][T15818] should_fail.cold+0xa/0x15 [ 2432.699191][T15818] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2432.705015][T15818] ? ___might_sleep+0x163/0x280 [ 2432.709887][T15818] __should_failslab+0x121/0x190 [ 2432.714831][T15818] should_failslab+0x9/0x14 04:07:17 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x2}, 0x18) [ 2432.719344][T15818] kmem_cache_alloc_node_trace+0x270/0x720 [ 2432.725160][T15818] ? kasan_unpoison_shadow+0x35/0x50 [ 2432.730466][T15818] __kmalloc_node+0x3d/0x70 [ 2432.730488][T15818] kvmalloc_node+0x68/0x100 [ 2432.730510][T15818] alloc_netdev_mqs+0x821/0xd30 [ 2432.744337][T15818] slip_open+0x38e/0x1138 [ 2432.744360][T15818] ? sl_uninit+0x20/0x20 [ 2432.744382][T15818] ? lock_downgrade+0x880/0x880 [ 2432.757798][T15818] ? sl_uninit+0x20/0x20 [ 2432.762083][T15818] tty_ldisc_open.isra.0+0x8b/0xe0 [ 2432.767228][T15818] tty_set_ldisc+0x2d7/0x690 [ 2432.771828][T15818] tty_ioctl+0x5dc/0x15c0 [ 2432.776169][T15818] ? tty_register_device+0x40/0x40 [ 2432.781292][T15818] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2432.787539][T15818] ? tomoyo_init_request_info+0x105/0x1d0 [ 2432.793271][T15818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2432.799519][T15818] ? tomoyo_path_number_perm+0x263/0x520 [ 2432.805159][T15818] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2432.810991][T15818] ? __fget+0x35a/0x550 [ 2432.815196][T15818] ? tty_register_device+0x40/0x40 [ 2432.820319][T15818] do_vfs_ioctl+0xd6e/0x1390 [ 2432.824924][T15818] ? ioctl_preallocate+0x210/0x210 [ 2432.830048][T15818] ? __fget+0x381/0x550 [ 2432.834222][T15818] ? ksys_dup3+0x3e0/0x3e0 [ 2432.838652][T15818] ? tomoyo_file_ioctl+0x23/0x30 [ 2432.843628][T15818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2432.849879][T15818] ? security_file_ioctl+0x93/0xc0 [ 2432.855002][T15818] ksys_ioctl+0xab/0xd0 [ 2432.859170][T15818] __x64_sys_ioctl+0x73/0xb0 [ 2432.863778][T15818] do_syscall_64+0x103/0x610 [ 2432.868381][T15818] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2432.874274][T15818] RIP: 0033:0x458c29 [ 2432.878175][T15818] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2432.897785][T15818] RSP: 002b:00007f80ebef8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2432.906205][T15818] RAX: ffffffffffffffda RBX: 00007f80ebef8c90 RCX: 0000000000458c29 04:07:17 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x408c5333, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 04:07:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x7fffffff}) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000100)={r3}) dup2(r1, r2) [ 2432.914198][T15818] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 [ 2432.922174][T15818] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2432.930188][T15818] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80ebef96d4 [ 2432.938164][T15818] R13: 00000000004c3082 R14: 00000000004d6428 R15: 0000000000000005 04:07:17 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) [ 2432.968143][T15947] gfs2: can't find protocol [ 2432.968143][T15947] ock_nolock 04:07:17 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x3}, 0x18) 04:07:17 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x42, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000240)={0x7, 0x79, 0x2}, 0x7) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) io_setup(0x4, &(0x7f0000000380)=0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000280)={0x8000005, 0x6, 0x3}) io_cancel(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x2, r1, &(0x7f0000000080)="ecaab2766281e4a1d41f49b77cdf07fe51f1b52bfb0f3ee9cd1492ad24ccc46a6088db63927dee6bd73095d4410c647b3a8d2ae042dd19bd38da3193cbfea43d7d1817af463e8d31c7619e17795ec22b6b3055650048f69090bc1a3645a15d7763d0547e1d9ea3d68df46ba1bac05b2420afc5d1895cc89302b0cc5855eb96f5e6923e9c6b7bea2482948c49ef6b1e71482dece89c23579f4deb33316abf053be6bae9cabbaa1cbd17ccff72fb56a235c91fc5271642396dbcf83aae85054707da42eb6402b25e2c7f721818ab15ce61f9369c2cd7998d13a261692241", 0xdd, 0x28, 0x0, 0x1, r1}, &(0x7f00000001c0)) [ 2433.063793][T15947] gfs2: can't find protocol [ 2433.063793][T15947] ock_nolock 04:07:17 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x408c5333, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x16, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 04:07:17 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xea03, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0670000000000000000000") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) connect$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x2710, @host}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r3, r1) 04:07:17 executing program 3 (fault-call:4 fault-nth:4): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:18 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000080), &(0x7f00000000c0)) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000000100)={0x3, @default, r1}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffa, 0x8040) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000180)=0x1, 0x4) 04:07:18 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x4}, 0x18) [ 2433.262057][T16186] gfs2: can't find protocol [ 2433.262057][T16186] ock_nolock [ 2433.305464][T16214] FAULT_INJECTION: forcing a failure. [ 2433.305464][T16214] name failslab, interval 1, probability 0, space 0, times 0 [ 2433.356099][T16214] CPU: 0 PID: 16214 Comm: syz-executor.3 Not tainted 5.1.0-rc5+ #70 [ 2433.364156][T16214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2433.364163][T16214] Call Trace: [ 2433.364196][T16214] dump_stack+0x172/0x1f0 [ 2433.364220][T16214] should_fail.cold+0xa/0x15 [ 2433.386459][T16214] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2433.392281][T16214] ? ___might_sleep+0x163/0x280 [ 2433.397148][T16214] __should_failslab+0x121/0x190 [ 2433.402094][T16214] should_failslab+0x9/0x14 [ 2433.406706][T16214] kmem_cache_alloc_trace+0x2d1/0x760 [ 2433.406727][T16214] ? init_timer_key+0x122/0x370 [ 2433.406750][T16214] slip_open+0x8ed/0x1138 [ 2433.406772][T16214] ? sl_uninit+0x20/0x20 [ 2433.406787][T16214] ? lock_downgrade+0x880/0x880 [ 2433.406810][T16214] ? sl_uninit+0x20/0x20 [ 2433.430414][T16214] tty_ldisc_open.isra.0+0x8b/0xe0 [ 2433.430434][T16214] tty_set_ldisc+0x2d7/0x690 [ 2433.430453][T16214] tty_ioctl+0x5dc/0x15c0 [ 2433.430472][T16214] ? tty_register_device+0x40/0x40 [ 2433.453792][T16214] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2433.460037][T16214] ? tomoyo_init_request_info+0x105/0x1d0 [ 2433.465762][T16214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2433.472015][T16214] ? tomoyo_path_number_perm+0x263/0x520 [ 2433.477656][T16214] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2433.483478][T16214] ? __fget+0x35a/0x550 [ 2433.487649][T16214] ? tty_register_device+0x40/0x40 [ 2433.492768][T16214] do_vfs_ioctl+0xd6e/0x1390 [ 2433.497374][T16214] ? ioctl_preallocate+0x210/0x210 [ 2433.502488][T16214] ? __fget+0x381/0x550 [ 2433.506653][T16214] ? ksys_dup3+0x3e0/0x3e0 [ 2433.511084][T16214] ? tomoyo_file_ioctl+0x23/0x30 [ 2433.516038][T16214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2433.522283][T16214] ? security_file_ioctl+0x93/0xc0 [ 2433.527402][T16214] ksys_ioctl+0xab/0xd0 [ 2433.531569][T16214] __x64_sys_ioctl+0x73/0xb0 [ 2433.536167][T16214] do_syscall_64+0x103/0x610 [ 2433.540777][T16214] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2433.546671][T16214] RIP: 0033:0x458c29 04:07:18 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xc0, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000040)) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x408c5333, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue0\x00'}) r2 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) bind$ax25(r1, &(0x7f0000000280)={{0x3, @default, 0x3}, [@null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}, 0x48) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, 0x0, 0x0) tkill(r2, 0x1000000000013) [ 2433.550569][T16214] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2433.570182][T16214] RSP: 002b:00007f80ebef8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2433.578595][T16214] RAX: ffffffffffffffda RBX: 00007f80ebef8c90 RCX: 0000000000458c29 [ 2433.586570][T16214] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 [ 2433.594549][T16214] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 04:07:18 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000080)={0x9b0000, 0x4, 0x6, [], &(0x7f0000000000)={0x9c0907, 0xdf, [], @ptr=0x4}}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x412000, 0x0) 04:07:18 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x5}, 0x18) [ 2433.602550][T16214] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80ebef96d4 [ 2433.610525][T16214] R13: 00000000004c3082 R14: 00000000004d6428 R15: 0000000000000005 04:07:18 executing program 3 (fault-call:4 fault-nth:5): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) [ 2433.688420][T16186] gfs2: can't find protocol [ 2433.688420][T16186] ock_nolock 04:07:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x40, 0x0) r3 = dup2(r1, r2) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000080)=0x3) 04:07:18 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xfffffffffffffffe, 0x0) 04:07:18 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xec03, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:18 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0xf) [ 2433.834103][T16410] FAULT_INJECTION: forcing a failure. [ 2433.834103][T16410] name failslab, interval 1, probability 0, space 0, times 0 04:07:18 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000840)=""/28, 0x1c) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f00000005c0)={{0x80, 0x265}, 'port1\x00', 0x5, 0x80000, 0x9, 0x20, 0x5, 0x1000, 0x1f, 0x0, 0x1, 0x80000000}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x408c5333, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue0\x00'}) r2 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000013) write(r1, &(0x7f00000004c0)="9db77dec5a59e7213b9b82b7eeb84a1f9c898b829d872f2415f5ed990e30ae19edde4f3a41a76af08e94ac7f03d44078b46aee14e3d96cd4f69b4ca123f9e8e870ce59bbe6b2b870ac9d721327d66ca52eeb0aa80f57f1be40bcc558a324232c1c41818e7a783febb62e1dfa15ed72ea04e099dc8007c2b773d156b33400c2560f38db8faab1c4da80d77f7f9d280dd9b812a6a9f49d26e4d85e1543fa46aa65845105c3c1feedb718d58577fa8c6bd32b7d8837e749216beddaba41a36fb68d18d18d56920233ab293464bdc0faabd55c1a3a3138d67cc6f8cbf4bf0ba8bf4e271f8235e5fd585f6de4a89af589ca7c10197f777217d94d00", 0xf9) tkill(r2, 0x5) 04:07:18 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x4000, 0x0) socket(0x3, 0x3, 0x401) [ 2433.885878][T16410] CPU: 0 PID: 16410 Comm: syz-executor.3 Not tainted 5.1.0-rc5+ #70 [ 2433.893900][T16410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2433.903959][T16410] Call Trace: [ 2433.907269][T16410] dump_stack+0x172/0x1f0 [ 2433.911616][T16410] should_fail.cold+0xa/0x15 [ 2433.916225][T16410] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2433.922046][T16410] ? ___might_sleep+0x163/0x280 [ 2433.926909][T16410] __should_failslab+0x121/0x190 [ 2433.931860][T16410] should_failslab+0x9/0x14 [ 2433.936375][T16410] kmem_cache_alloc_trace+0x2d1/0x760 [ 2433.941758][T16410] ? init_timer_key+0x122/0x370 [ 2433.946626][T16410] slip_open+0x933/0x1138 [ 2433.950969][T16410] ? sl_uninit+0x20/0x20 [ 2433.955215][T16410] ? lock_downgrade+0x880/0x880 [ 2433.960081][T16410] ? sl_uninit+0x20/0x20 [ 2433.964344][T16410] tty_ldisc_open.isra.0+0x8b/0xe0 [ 2433.969464][T16410] tty_set_ldisc+0x2d7/0x690 [ 2433.974070][T16410] tty_ioctl+0x5dc/0x15c0 [ 2433.978425][T16410] ? tty_register_device+0x40/0x40 [ 2433.983541][T16410] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2433.989789][T16410] ? tomoyo_init_request_info+0x105/0x1d0 [ 2433.995517][T16410] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2434.001763][T16410] ? tomoyo_path_number_perm+0x263/0x520 [ 2434.007404][T16410] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2434.013229][T16410] ? __fget+0x35a/0x550 [ 2434.017401][T16410] ? tty_register_device+0x40/0x40 [ 2434.022521][T16410] do_vfs_ioctl+0xd6e/0x1390 [ 2434.027156][T16410] ? ioctl_preallocate+0x210/0x210 [ 2434.032276][T16410] ? __fget+0x381/0x550 [ 2434.036474][T16410] ? ksys_dup3+0x3e0/0x3e0 [ 2434.040903][T16410] ? tomoyo_file_ioctl+0x23/0x30 [ 2434.045851][T16410] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2434.052103][T16410] ? security_file_ioctl+0x93/0xc0 [ 2434.057239][T16410] ksys_ioctl+0xab/0xd0 [ 2434.061429][T16410] __x64_sys_ioctl+0x73/0xb0 [ 2434.066030][T16410] do_syscall_64+0x103/0x610 [ 2434.070627][T16410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2434.076518][T16410] RIP: 0033:0x458c29 [ 2434.080414][T16410] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2434.100024][T16410] RSP: 002b:00007f80ebef8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2434.108437][T16410] RAX: ffffffffffffffda RBX: 00007f80ebef8c90 RCX: 0000000000458c29 [ 2434.116408][T16410] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 [ 2434.124375][T16410] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 04:07:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x80) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) [ 2434.124391][T16410] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80ebef96d4 [ 2434.140795][T16410] R13: 00000000004c3082 R14: 00000000004d6428 R15: 0000000000000005 [ 2434.167293][T16572] gfs2: can't find protocol [ 2434.167293][T16572] ock_nolock 04:07:18 executing program 3 (fault-call:4 fault-nth:6): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) 04:07:19 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) 04:07:19 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x20000018) [ 2434.257430][T16572] gfs2: can't find protocol [ 2434.257430][T16572] ock_nolock 04:07:19 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) [ 2434.314819][T16733] FAULT_INJECTION: forcing a failure. [ 2434.314819][T16733] name failslab, interval 1, probability 0, space 0, times 0 04:07:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) r3 = dup2(r1, r2) ioctl$SG_EMULATED_HOST(r3, 0x2203, &(0x7f0000000080)) 04:07:19 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x408c5333, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x90080, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r2, 0x28, 0x6, &(0x7f0000000280)={r3, r4/1000+10000}, 0x10) r5 = dup(r0) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000040)=0x9d28b06245c589b7, 0x4) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) [ 2434.410072][T16733] CPU: 0 PID: 16733 Comm: syz-executor.3 Not tainted 5.1.0-rc5+ #70 [ 2434.418140][T16733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2434.428211][T16733] Call Trace: [ 2434.431516][T16733] dump_stack+0x172/0x1f0 [ 2434.435858][T16733] should_fail.cold+0xa/0x15 [ 2434.440459][T16733] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2434.446276][T16733] ? ___might_sleep+0x163/0x280 [ 2434.451144][T16733] __should_failslab+0x121/0x190 [ 2434.456101][T16733] should_failslab+0x9/0x14 [ 2434.460624][T16733] kmem_cache_alloc_trace+0x2d1/0x760 [ 2434.466005][T16733] ? init_timer_key+0x122/0x370 [ 2434.466028][T16733] slip_open+0x976/0x1138 [ 2434.466051][T16733] ? sl_uninit+0x20/0x20 [ 2434.466065][T16733] ? lock_downgrade+0x880/0x880 [ 2434.466087][T16733] ? sl_uninit+0x20/0x20 [ 2434.466106][T16733] tty_ldisc_open.isra.0+0x8b/0xe0 [ 2434.466138][T16733] tty_set_ldisc+0x2d7/0x690 [ 2434.484389][T16733] tty_ioctl+0x5dc/0x15c0 [ 2434.502639][T16733] ? tty_register_device+0x40/0x40 [ 2434.507759][T16733] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2434.514006][T16733] ? tomoyo_init_request_info+0x105/0x1d0 [ 2434.519740][T16733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2434.525985][T16733] ? tomoyo_path_number_perm+0x263/0x520 [ 2434.531620][T16733] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2434.537446][T16733] ? __fget+0x35a/0x550 [ 2434.541619][T16733] ? tty_register_device+0x40/0x40 [ 2434.546765][T16733] do_vfs_ioctl+0xd6e/0x1390 [ 2434.551374][T16733] ? ioctl_preallocate+0x210/0x210 [ 2434.556491][T16733] ? __fget+0x381/0x550 [ 2434.560656][T16733] ? ksys_dup3+0x3e0/0x3e0 [ 2434.565090][T16733] ? tomoyo_file_ioctl+0x23/0x30 [ 2434.570052][T16733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2434.576306][T16733] ? security_file_ioctl+0x93/0xc0 [ 2434.581431][T16733] ksys_ioctl+0xab/0xd0 [ 2434.585599][T16733] __x64_sys_ioctl+0x73/0xb0 [ 2434.590207][T16733] do_syscall_64+0x103/0x610 [ 2434.594843][T16733] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2434.600742][T16733] RIP: 0033:0x458c29 04:07:19 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x408c5333, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80, 0x1) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000280)=0x6, 0x4) [ 2434.604652][T16733] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2434.624267][T16733] RSP: 002b:00007f80ebef8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2434.632684][T16733] RAX: ffffffffffffffda RBX: 00007f80ebef8c90 RCX: 0000000000458c29 [ 2434.640662][T16733] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 [ 2434.648640][T16733] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 04:07:19 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f00000014c0)='/dev/admmidi#\x00', 0x200, 0x1) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000001500), &(0x7f0000001540)=0x18) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x101000, 0x0) 04:07:19 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) [ 2434.656609][T16733] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80ebef96d4 [ 2434.664579][T16733] R13: 00000000004c3082 R14: 00000000004d6428 R15: 0000000000000005 [ 2434.684721][T16819] gfs2: can't find protocol [ 2434.684721][T16819] ock_nolock 04:07:19 executing program 3 (fault-call:4 fault-nth:7): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x1) [ 2434.798087][T16819] gfs2: can't find protocol [ 2434.798087][T16819] ock_nolock 04:07:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) read(r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) 04:07:19 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030fd188728806a9530303030303030303030303034303030302c759c10cefd35d3bac326ceb6c794e0e6cea005716db86477506f0cce4e43fa8fbca0d302d195283648c2502b6e3ef731b03880117bdf30b53127e75481fad249a31a7e6e9fa04b23996185b514976048fb1fe214fdcace131fb19d9b7a591b7d5a35de7770970db4938546fa10445091f2bea7e4fbeecd45ff81f37a85f7c34f583ce7b76205eeb1b283bbb054bc0c5c5086002e26acbf2176d76d2c23c8730d282109c10f2aae0d5f5ea0c1c07694feacdf7699ed4b26ccc9b0f544865d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000001840)={&(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000000040)=""/49, 0x31}, {&(0x7f00000003c0)=""/201, 0xc9}, {&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/251, 0xfb}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f00000002c0)=""/61, 0x3d}, {&(0x7f0000000640)=""/27, 0x1b}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/144, 0x90}, {&(0x7f0000001740)=""/43, 0x2b}], 0xa}, 0x1) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000001880)={&(0x7f0000fff000/0x1000)=nil, 0x1000}, &(0x7f00000018c0)=0x10) 04:07:19 executing program 4: syz_mount_image$gfs2(&(0x7f0000000380)='gfs2\x00', &(0x7f00000003c0)='./file1\x00', 0xee02, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@lockproto_nolock='lockproto=\nock_nolock'}, {@locktable={'locktable', 0x3d, '127.0.0.1\x00'}}]}) 04:07:19 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x408c5333, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x60002, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000001a40)={0x0, 0x5}, &(0x7f0000001a80)=0x8) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000001ac0)={r3, 0x7}, 0x8) tkill(r1, 0x1000000000013) 04:07:19 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000100)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x3, 0x3fffe) [ 2434.931766][T17135] FAULT_INJECTION: forcing a failure. [ 2434.931766][T17135] name failslab, interval 1, probability 0, space 0, times 0 [ 2434.969375][T17142] gfs2: can't find protocol [ 2434.969375][T17142] ock_nolock [ 2434.996999][T17135] CPU: 1 PID: 17135 Comm: syz-executor.3 Not tainted 5.1.0-rc5+ #70 [ 2435.005013][T17135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2435.005020][T17135] Call Trace: [ 2435.005045][T17135] dump_stack+0x172/0x1f0 [ 2435.005071][T17135] should_fail.cold+0xa/0x15 [ 2435.005105][T17135] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2435.027801][T17135] ? ___might_sleep+0x163/0x280 [ 2435.027822][T17135] __should_failslab+0x121/0x190 [ 2435.027839][T17135] should_failslab+0x9/0x14 [ 2435.027856][T17135] kmem_cache_alloc_trace+0x2d1/0x760 [ 2435.027873][T17135] ? slip_open+0x976/0x1138 [ 2435.027889][T17135] ? rcu_read_lock_sched_held+0x110/0x130 [ 2435.027910][T17135] ? kmem_cache_alloc_trace+0x354/0x760 [ 2435.043471][T17135] slhc_init+0xa2/0x52a [ 2435.043493][T17135] slip_open+0x99a/0x1138 [ 2435.043515][T17135] ? sl_uninit+0x20/0x20 [ 2435.043536][T17135] ? lock_downgrade+0x880/0x880 [ 2435.057900][T17135] ? sl_uninit+0x20/0x20 [ 2435.057921][T17135] tty_ldisc_open.isra.0+0x8b/0xe0 [ 2435.057940][T17135] tty_set_ldisc+0x2d7/0x690 [ 2435.057959][T17135] tty_ioctl+0x5dc/0x15c0 [ 2435.057976][T17135] ? tty_register_device+0x40/0x40 [ 2435.057998][T17135] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2435.073384][T17135] ? tomoyo_init_request_info+0x105/0x1d0 [ 2435.073405][T17135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2435.073419][T17135] ? tomoyo_path_number_perm+0x263/0x520 [ 2435.073439][T17135] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2435.091068][T17135] ? __fget+0x35a/0x550 [ 2435.091090][T17135] ? tty_register_device+0x40/0x40 [ 2435.091124][T17135] do_vfs_ioctl+0xd6e/0x1390 [ 2435.110915][T17135] ? ioctl_preallocate+0x210/0x210 [ 2435.110932][T17135] ? __fget+0x381/0x550 [ 2435.110955][T17135] ? ksys_dup3+0x3e0/0x3e0 [ 2435.110979][T17135] ? tomoyo_file_ioctl+0x23/0x30 [ 2435.111001][T17135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2435.179183][T17135] ? security_file_ioctl+0x93/0xc0 [ 2435.184307][T17135] ksys_ioctl+0xab/0xd0 [ 2435.188473][T17135] __x64_sys_ioctl+0x73/0xb0 [ 2435.193080][T17135] do_syscall_64+0x103/0x610 04:07:19 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:07:19 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r2 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x800, 0x282102) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) write$capi20_data(r2, &(0x7f0000000380)={{0x10, 0xfffffffffffffffd, 0x7, 0x83, 0x0, 0x1}, 0x75, "fdbd4593e49041630b8986069c62c5da855d8d9d0313e14e376a291ea7d672635473579aa248b7e355e80d36db7e0db33e3140257b4dfbf42d05631760c60d403cab9c6d9c2af2342d04c312c44274501fc8fe1b277132e5a3d9cf0f624c0ccd280cbf4ec4848ffa775072061296b00cdd42404442"}, 0x87) mount(&(0x7f0000000240)=@filename='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='sysv\x00', 0x0, &(0x7f0000000340)='user_id') 04:07:19 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',000000000000er_id=\x00'/42, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f00000000c0)={0x1, 0x400, 0x480000, 0xa8c9}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x6}, 0x18) 04:07:19 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x10001) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x200000200bd, @time={0x77359400}, 0x8811, {}, 0x0, 0x0, 0x2}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x408c5333, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) [ 2435.197790][T17135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2435.203687][T17135] RIP: 0033:0x458c29 [ 2435.203704][T17135] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2435.203713][T17135] RSP: 002b:00007f80ebef8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2435.203728][T17135] RAX: ffffffffffffffda RBX: 00007f80ebef8c90 RCX: 0000000000458c29 [ 2435.203737][T17135] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 [ 2435.203745][T17135] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2435.203761][T17135] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80ebef96d4 [ 2435.207844][ T3876] kobject: 'loop0' (00000000630ecc36): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2435.227246][T17135] R13: 00000000004c3082 R14: 00000000004d6428 R15: 0000000000000005 [ 2435.253613][T17135] BUG: unable to handle kernel paging request at fffffffffffffff4 [ 2435.293809][T17135] #PF error: [normal kernel read fault] [ 2435.299348][T17135] PGD 8874067 P4D 8874067 PUD 8876067 PMD 0 [ 2435.305337][T17135] Oops: 0000 [#1] PREEMPT SMP KASAN [ 2435.310534][T17135] CPU: 1 PID: 17135 Comm: syz-executor.3 Not tainted 5.1.0-rc5+ #70 [ 2435.318504][T17135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2435.328570][T17135] RIP: 0010:slhc_free+0x31/0xb0 [ 2435.333419][T17135] Code: 54 49 89 fc e8 f0 5c 1c fd 4d 85 e4 74 77 e8 e6 5c 1c fd 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 75 6d <4d> 8b 2c 24 4d 85 ed 74 0d e8 c1 5c 1c fd 4c 89 ef e8 c9 31 54 fd [ 2435.353205][T17135] RSP: 0018:ffff88804da379f0 EFLAGS: 00010246 [ 2435.359299][T17135] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc9000c41e000 [ 2435.367269][T17135] RDX: 1ffffffffffffffe RSI: ffffffff84542fca RDI: fffffffffffffff4 [ 2435.375247][T17135] RBP: ffff88804da37a00 R08: ffff8880941ac140 R09: ffff8880941aca30 [ 2435.383214][T17135] R10: 0000000000000000 R11: 0000000000000000 R12: fffffffffffffff4 [ 2435.391182][T17135] R13: ffff888060e02fc0 R14: 00000000ffffff97 R15: ffff8880607873c0 [ 2435.399161][T17135] FS: 00007f80ebef9700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2435.408085][T17135] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2435.414674][T17135] CR2: fffffffffffffff4 CR3: 000000008cf56000 CR4: 00000000001406e0 [ 2435.422669][T17135] Call Trace: [ 2435.425977][T17135] slip_open+0xe16/0x1138 [ 2435.430311][T17135] ? sl_uninit+0x20/0x20 [ 2435.434562][T17135] ? lock_downgrade+0x880/0x880 [ 2435.439414][T17135] ? sl_uninit+0x20/0x20 [ 2435.443657][T17135] tty_ldisc_open.isra.0+0x8b/0xe0 [ 2435.448777][T17135] tty_set_ldisc+0x2d7/0x690 [ 2435.453368][T17135] tty_ioctl+0x5dc/0x15c0 [ 2435.457706][T17135] ? tty_register_device+0x40/0x40 [ 2435.462820][T17135] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2435.469065][T17135] ? tomoyo_init_request_info+0x105/0x1d0 [ 2435.474788][T17135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2435.481032][T17135] ? tomoyo_path_number_perm+0x263/0x520 [ 2435.486667][T17135] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2435.492491][T17135] ? __fget+0x35a/0x550 [ 2435.496654][T17135] ? tty_register_device+0x40/0x40 [ 2435.501780][T17135] do_vfs_ioctl+0xd6e/0x1390 [ 2435.506375][T17135] ? ioctl_preallocate+0x210/0x210 [ 2435.511488][T17135] ? __fget+0x381/0x550 [ 2435.515645][T17135] ? ksys_dup3+0x3e0/0x3e0 [ 2435.520083][T17135] ? tomoyo_file_ioctl+0x23/0x30 [ 2435.525033][T17135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2435.531274][T17135] ? security_file_ioctl+0x93/0xc0 [ 2435.536390][T17135] ksys_ioctl+0xab/0xd0 [ 2435.540550][T17135] __x64_sys_ioctl+0x73/0xb0 [ 2435.545158][T17135] do_syscall_64+0x103/0x610 [ 2435.549756][T17135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2435.555647][T17135] RIP: 0033:0x458c29 [ 2435.559553][T17135] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2435.579159][T17135] RSP: 002b:00007f80ebef8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2435.587661][T17135] RAX: ffffffffffffffda RBX: 00007f80ebef8c90 RCX: 0000000000458c29 [ 2435.595657][T17135] RDX: 0000000020000080 RSI: 0000000000005423 RDI: 0000000000000004 [ 2435.603633][T17135] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2435.611605][T17135] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80ebef96d4 [ 2435.619607][T17135] R13: 00000000004c3082 R14: 00000000004d6428 R15: 0000000000000005 [ 2435.627582][T17135] Modules linked in: [ 2435.631474][T17135] CR2: fffffffffffffff4 [ 2435.635651][T17135] ---[ end trace 42ca26bb1c9d9dec ]--- [ 2435.641135][T17135] RIP: 0010:slhc_free+0x31/0xb0 [ 2435.646012][T17135] Code: 54 49 89 fc e8 f0 5c 1c fd 4d 85 e4 74 77 e8 e6 5c 1c fd 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 75 6d <4d> 8b 2c 24 4d 85 ed 74 0d e8 c1 5c 1c fd 4c 89 ef e8 c9 31 54 fd [ 2435.671002][T17135] RSP: 0018:ffff88804da379f0 EFLAGS: 00010246 [ 2435.677068][T17135] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc9000c41e000 [ 2435.685036][T17135] RDX: 1ffffffffffffffe RSI: ffffffff84542fca RDI: fffffffffffffff4 [ 2435.693012][T17135] RBP: ffff88804da37a00 R08: ffff8880941ac140 R09: ffff8880941aca30 [ 2435.700988][T17135] R10: 0000000000000000 R11: 0000000000000000 R12: fffffffffffffff4 [ 2435.708953][T17135] R13: ffff888060e02fc0 R14: 00000000ffffff97 R15: ffff8880607873c0 [ 2435.716928][T17135] FS: 00007f80ebef9700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2435.725850][T17135] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2435.732438][T17135] CR2: fffffffffffffff4 CR3: 000000008cf56000 CR4: 00000000001406e0 [ 2435.740412][T17135] Kernel panic - not syncing: Fatal exception [ 2435.747229][T17135] Kernel Offset: disabled [ 2435.751558][T17135] Rebooting in 86400 seconds..