sockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="50812719c67676d53769f06dd93a052b0ff64be65fb2c446011922bb21457cd435dc01e06b0000000000000000"]) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x100000}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_default\x00') 10:55:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x9700, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000000)=[@flags={0x3, 0x180080}, @cr4={0x1, 0x40100}], 0x2) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x6, 0x0, [0x4000000012, 0x800000000ffff]}) 10:55:36 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x4800, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:36 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00'}) 10:55:36 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f857140") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:37 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x3, &(0x7f0000000180), 0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x87, 0x80202) r2 = getpgrp(0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="ec010000050010042dbd7000fddbdf250c00000008005000ac1414bb14005900fe8000000000000000000000000000bb38a8799f8e30987adad456b1d0065d2c5be0c4ef4ad44d3bc967fd70d8ff09411715a664c67427a6b9e4634a48f7b53fe801340422621c56f6b59cdd6659be3e63fb6e12b29ae22dda9b9000588697b8d62cefedb25bde2d5b4139584228608747d0db5c05389263663b2ab0a12c8dd94c588881aa9034d6340c018700e6d51cae49867a4fba50a7bccf515aefb868e96993203c78b2dd956e21513b49b11a197ced0c449b2509ec4ad19ca720814896509f626df5019b8db0184e12a1eb3c5db361c095fb3f8133c24da863572fb99449aec528c448e1c693c1212f9a4bf5071b257cd82a546317d040cfdbf44cc6824bca33b255ead63414df76e129408022ccba18bf3d9d93a64cd201a11f3336b0fde27c931a4f5fdde81a5dfa700c7c72353963e6c088fff3508ffb790fdecdebf7f19949e85f2dde4d82b02522abf11f8ce16e6c349c43a197f40c2e9cded7d346dcb6c490ca747672f1c75a9900980604ff5ad9eb9daf357d05e55657edeb5f61f8469f1459dd6886741b28e20cb1ecc17cd4b7793400430014009200fe80000000000000000000000000", @ANYRES32=r2, @ANYBLOB='\b\x00y\x00', @ANYRES32=r3, @ANYBLOB="04007500080041000000000008006d00feffffff00"], 0x1ec}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000004) 10:55:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x10000, &(0x7f0000000100)="025cc80700145f8f764070") r1 = add_key$user(&(0x7f0000000600)='user\x00', &(0x7f0000000640), &(0x7f0000000680)='\t', 0x1, 0xfffffffffffffffc) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0xc7dd, 0x0, 0x0, 0x9c, 0x5, 0x1, 0x3, 0x0, 0x7a5, 0xb0f3, 0x7ff}, 0xb) keyctl$update(0x2, r1, &(0x7f0000000700)="9e", 0x1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) 10:55:37 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00'}) 10:55:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xa301, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x20c8c}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 241.374909] gfs2: invalid mount option: locktable= [ 241.379943] gfs2: can't parse mount arguments 10:55:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f857140") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 241.457287] gfs2: invalid mount option: locktable= [ 241.462302] gfs2: can't parse mount arguments 10:55:37 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80000080044dfc, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0xc2, "a227a30a199df4d411c07c65fa86a4dca1b5d7775f7134cd6f80afe3736236f075115225e70eebe7df1856b178969261fddcdce0ac938445073f356ad457f60c6cdc12c67ad5bf4c543b6550e789196e1d2858e08d943381d2e7de72d301b5f7e018f08fa1e2c94f67822ecb1247e71ab172a23724db37b834282c5802f85c2f42552f7deee5fdcb3ba4ff93e6c40e54671703fd3ea50bfe507f3b27a62dbdcabd0541ed18eb7b7d0b5ffeb5a6d32ae37dcc498c4fcf01c744bc377e19a693bbd967"}, &(0x7f0000000180)=0xca) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)={r1, 0x25, "74e1fdd277bb0752cbe587244417c4eabbf6880334e4960eb55b1f2f8efb51f1698e3a3011"}, &(0x7f0000000200)=0x2d) 10:55:37 executing program 4: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x4e20, 0x4, @remote, 0x10000}, {0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0xf}, 0x1}, 0x80000001, [0x8, 0x4, 0x800, 0x20, 0xfffffffffffffffa, 0x8, 0x400, 0xfffffffffffff800]}, 0x5c) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000400)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000480)=0xc) fstat(0xffffffffffffff9c, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r3, &(0x7f00000005c0)={&(0x7f0000000280)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000300)="6c2ad4743b009e1e60b10fe0e4ff2b89ae83c23db4c40d749c4baf3ed9a0608f39beb27c5d7326cd3248ae59bd562f4a3505f08f379f948b39ca024df98677c0830655fe6c54d6d9101be9f64b2cc131a4f90b1b0e4c7c7a685ca0993ab3c73c3fcb37365d9e1c4e125a35621b482701ddaacc62ad653270336a824a0c405a9032902f575ab792a7ca51a3f6e8948a3c7f9e3d20d0f85df33b2ae64247029ad6e97c786dfd74770d11", 0xa9}], 0x1, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r1, r2, r1]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x20, 0x1, 0x1, [r2, r0, r1]}], 0x60, 0x8054}, 0x40) r7 = creat(&(0x7f0000000140)='./file1\x00', 0x0) r8 = open(&(0x7f0000000000)='./file0\x00', 0x40002, 0x0) write$P9_RWRITE(r7, &(0x7f0000000100)={0xb}, 0xffffff21) write$P9_RWSTAT(r8, &(0x7f00000000c0)={0x7, 0x7f, 0x2}, 0x7) umount2(&(0x7f0000000200)='./file0\x00', 0xb) ioctl$FUSE_DEV_IOC_CLONE(r8, 0xc028660f, &(0x7f0000000040)) [ 241.682846] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.692242] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.698657] bridge0: port 1(bridge_slave_0) entered forwarding state 10:55:37 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000758e34df220000"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) r2 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x0, 0x101000) ioctl$TIOCNOTTY(r2, 0x5422) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000380)={r3, 0xda, "e6bfc0c7962a315948038725e0872440ae3a9414771a1a1ebcf6d6155773ba5a2708bd382cbd74157ac70ff525e1e0c4637c0de92b14d36d9cf385ce7788af7e9ccbaf62f807b06e7ebd5e0638f774d3c747ee1cabc92fcb6d6e645c2ad649f51ad9062f72c7e2c283f2ee5d3116f2c4a4b50e2c54c483649598f0b40e5c773608c2d6302465444fe130d89225ff19e5d3e887bee9a4ee90035109f6dc4861cae048171352c987d83b3f9a93045d44f270bda72a571accabfcbcfe9f5b043c48848e6498dd0172cafcb31797945e658ce2764964d968eadceff9"}, &(0x7f0000000100)=0xe2) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000480)=ANY=[@ANYRES32=r0, @ANYBLOB="0600000008003d0f5f16e2ba0a28bf346de61e3aeb68e05253c23c2ce1b0e20504f7e8c9d6110be85f79d8b0b92cce222d2940012602b609b1047da6d796e63668d7d6ec4b39655eb22042b853dee4af4ac1a98f9c5a1ef9eb454f1f6242391af1fd23ac9622997359b0d7d7413ff6aa46382723e84d3a8128401639b080781237ee5ace501fbf1b3779333cab1f3f0f00790b3e1687c7fb936e46323575b165932349d52c4e8fceba7cff614d3ff8fd9bf82eb46a5ea35577604913280b1ceb3292186f42cc68f5efa5c113cafb023fad3d1a"]) 10:55:37 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00'}) 10:55:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0xfffffff0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1500, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:37 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xc0ed0000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f857140") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:37 executing program 1: syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x101, 0x400) syz_emit_ethernet(0x7a, &(0x7f0000000500)={@broadcast, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "1513a6", 0x44, 0x3c, 0x0, @dev, @mcast2, {[], @gre}}}}}, 0x0) 10:55:37 executing program 4: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x4e20, 0x4, @remote, 0x10000}, {0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0xf}, 0x1}, 0x80000001, [0x8, 0x4, 0x800, 0x20, 0xfffffffffffffffa, 0x8, 0x400, 0xfffffffffffff800]}, 0x5c) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000400)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000480)=0xc) fstat(0xffffffffffffff9c, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r3, &(0x7f00000005c0)={&(0x7f0000000280)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000300)="6c2ad4743b009e1e60b10fe0e4ff2b89ae83c23db4c40d749c4baf3ed9a0608f39beb27c5d7326cd3248ae59bd562f4a3505f08f379f948b39ca024df98677c0830655fe6c54d6d9101be9f64b2cc131a4f90b1b0e4c7c7a685ca0993ab3c73c3fcb37365d9e1c4e125a35621b482701ddaacc62ad653270336a824a0c405a9032902f575ab792a7ca51a3f6e8948a3c7f9e3d20d0f85df33b2ae64247029ad6e97c786dfd74770d11", 0xa9}], 0x1, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r1, r2, r1]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x20, 0x1, 0x1, [r2, r0, r1]}], 0x60, 0x8054}, 0x40) r7 = creat(&(0x7f0000000140)='./file1\x00', 0x0) r8 = open(&(0x7f0000000000)='./file0\x00', 0x40002, 0x0) write$P9_RWRITE(r7, &(0x7f0000000100)={0xb}, 0xffffff21) write$P9_RWSTAT(r8, &(0x7f00000000c0)={0x7, 0x7f, 0x2}, 0x7) umount2(&(0x7f0000000200)='./file0\x00', 0xb) ioctl$FUSE_DEV_IOC_CLONE(r8, 0xc028660f, &(0x7f0000000040)) 10:55:37 executing program 1: r0 = memfd_create(&(0x7f0000000180)="74086e750000000000000000008c00", 0x0) r1 = inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x1000000) inotify_rm_watch(r0, r1) pwritev(r0, &(0x7f0000000100)=[{&(0x7f0000000440)="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", 0x7fa}], 0x1, 0x81806) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x200, 0x2, 0x0, 0x1}, 0x8) modify_ldt$read(0x0, &(0x7f0000000280)=""/185, 0xffffffffffffff4c) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000080)={0xa0000008}) 10:55:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x3301, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 242.213392] gfs2: invalid mount option: locktable= [ 242.218429] gfs2: can't parse mount arguments [ 242.256863] gfs2: invalid mount option: locktable= [ 242.261989] gfs2: can't parse mount arguments 10:55:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000340)=[@textreal={0x8, &(0x7f00000002c0)="0f011cf0f61f66b9130a00000f320f0177ccb808008ed82ef3adf30f5201f466b9450a00000f32baf80c66b8394b378b66efbafc0cec", 0x36}], 0x1, 0x10, &(0x7f0000000200)=[@cstype0={0x4, 0xf}, @cstype3={0x5, 0x7}], 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000280)='/dev/kvm\x00', 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000380)='trusted\x00', 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003480)=[{0x0, 0x0, &(0x7f0000001f80)=[{&(0x7f0000000ec0)="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", 0x1fe}], 0x1, &(0x7f0000002000)}], 0x1, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x20) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000080)=0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f00000000c0)={r5, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}, 0x7f, 0x7fff, 0x6, 0x3ff, 0x9}, &(0x7f0000000180)=0x98) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:55:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xffffffff00000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:38 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="4506b95933559f02beeab2e066294ac68c436de984795efe56e3ba849c2f2672b2501be33f7d07c6f8ed60b30811fdee91ed5db1ec33aff891b80a19bb65763d9bbe76d9b9f2ea97738481eb143a007e2317056c4991cb3f0ad92d00000000000000d4354350b9666503a37ea972033b92307838595048e5cd4b93ba3b6c0a0c1b64e28de86b44cce3851cec0caff3df1b01048b30fc595608443e1c393a2d92e881d4b84027aa05bdeadfac61de1845b1ae74d4ebebfcc512b651bac943181963f23f7dae1b773f49a9773ac34d05edd0a6726c9fd7158613b619e9366916bd0000"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000140)) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e23, 0x80000000, @mcast1}, {0xa, 0x4e22, 0x7fb, @mcast2, 0x7}, 0x100000003, [0x6, 0x0, 0x81, 0x1000, 0x8, 0x3, 0x9, 0x4]}, 0x5c) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TCSBRK(r2, 0x5409, 0x200) [ 242.387578] gfs2: invalid mount option: locktable= [ 242.392643] gfs2: can't parse mount arguments 10:55:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x97ffffff, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x4c00000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x3a00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 242.450708] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.476506] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.482932] bridge0: port 1(bridge_slave_0) entered forwarding state 10:55:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc80700145f8f764070") r1 = socket$inet(0x10, 0x3, 0xc) signalfd4(r0, &(0x7f0000000000)={0xffffffffffffff80}, 0x8, 0x800) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000070a07031dfffd946fa2830020200a0009000200021d85680c1baba20400ff7e28000000110affffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 242.511939] gfs2: invalid mount option: locktable= [ 242.517108] gfs2: can't parse mount arguments 10:55:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x1f000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:38 executing program 6 (fault-call:4 fault-nth:0): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x7301, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x300000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 242.641821] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. [ 242.657884] gfs2: invalid mount option: locktable= [ 242.662908] gfs2: can't parse mount arguments 10:55:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x74000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 242.684507] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. [ 242.734060] gfs2: invalid mount option: locktable= [ 242.739135] gfs2: can't parse mount arguments [ 242.819139] gfs2: invalid mount option: locktable= [ 242.819809] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.824130] gfs2: can't parse mount arguments [ 242.840281] FAULT_INJECTION: forcing a failure. [ 242.840281] name failslab, interval 1, probability 0, space 0, times 0 [ 242.851520] CPU: 1 PID: 19985 Comm: syz-executor6 Not tainted 4.18.0-rc7-next-20180802+ #30 [ 242.860005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.869353] Call Trace: [ 242.871951] dump_stack+0x1c9/0x2b4 [ 242.875593] ? dump_stack_print_info.cold.2+0x52/0x52 [ 242.880797] ? trace_hardirqs_on+0x10/0x10 [ 242.885047] should_fail.cold.4+0xa/0x11 [ 242.889115] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 242.894230] ? flush_rcu_work+0x90/0x90 [ 242.898216] ? lock_acquire+0x1e4/0x540 [ 242.902201] ? br_get_link_af_size_filtered+0x1e3/0xcf0 [ 242.907573] ? lock_downgrade+0x8f0/0x8f0 [ 242.911726] ? lock_release+0xa30/0xa30 [ 242.915705] ? lock_acquire+0x1e4/0x540 [ 242.919690] ? veth_get_iflink+0x1e2/0x340 [ 242.923931] ? lock_downgrade+0x8f0/0x8f0 [ 242.928090] ? lock_release+0xa30/0xa30 [ 242.932067] ? net_to_rxe+0xe1/0x110 [ 242.935788] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 242.941338] ? br_get_link_af_size_filtered+0x266/0xcf0 [ 242.946710] ? br_get_linkxstats_size+0x3a0/0x3a0 [ 242.951560] ? lock_acquire+0x1e4/0x540 [ 242.955541] __should_failslab+0x124/0x180 [ 242.959782] should_failslab+0x9/0x14 [ 242.963592] kmem_cache_alloc_node+0x56/0x780 10:55:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000e16ff0)={0x1, &(0x7f0000683ff0)=[{0x6}]}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) unlinkat(r3, &(0x7f00000000c0)='./file0\x00', 0x200) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000000)=0x6, 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) syz_emit_ethernet(0x3a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000080300000000000000000000009078ac1414aa800000004404000000000000d5c68622ae1bc941b31fe6603afbe5bcdf86b7e727", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000c410fb7079fc1898a07476e6598840e3d65be5f4915a238980fffabafe428caf138e0ae7d54957bd8536f85d6ae8be310cf6abdbf7a7b29caa813473e320f1c16e43e000b04f1bb47b7010ea6dca4c72832850586928e92013957a6442998671d76e56a4e707c0e13e7b56ff6027ff15cd80b7352635cc39ce834077a70eb7a97977cd6e2ead1063e11f40db8dbc181c537b3a3d0b"], &(0x7f00000002c0)) 10:55:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x701, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:38 executing program 1: r0 = socket(0xd, 0x5, 0x3) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x400, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='vlan0\x00', 0xfffffffffffffd53) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x4, 0x7, 0x323d, 0x800, 0x0, 0x9, 0x2, 0x7, 0x7fffffff, 0x40}, 0xb) ioctl(r2, 0x8912, &(0x7f0000000080)="00000000000000000000008ede") setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000000)=0x54d, 0x951d2c7) sendto$unix(r0, &(0x7f0000000080), 0x7272, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000440)=""/175, 0xaf}], 0x1) [ 242.968087] ? kasan_check_read+0x11/0x20 [ 242.972243] ? lock_release+0xa30/0xa30 [ 242.976245] __alloc_skb+0x119/0x770 [ 242.979965] ? skb_scrub_packet+0x490/0x490 [ 242.984296] ? if_nlmsg_size+0x5d9/0xbc0 [ 242.988364] ? nla_put_ifalias+0x170/0x170 [ 242.992602] ? rtnl_trylock+0x20/0x20 [ 242.996406] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 243.000996] rtmsg_ifinfo_build_skb+0x73/0x190 [ 243.005576] rtmsg_ifinfo_event.part.31+0x45/0xe0 [ 243.010422] rtmsg_ifinfo+0x8c/0xa0 [ 243.014054] __dev_notify_flags+0x2f1/0x480 10:55:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x13, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 243.018378] ? dev_change_name+0xba0/0xba0 [ 243.022614] ? dev_set_allmulti+0x30/0x30 [ 243.026767] ? dev_get_by_name_rcu+0x221/0x2c0 [ 243.031357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.036890] ? cap_capable+0x1f9/0x260 [ 243.040778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.046320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.051861] dev_change_flags+0xfd/0x150 [ 243.055934] devinet_ioctl+0xe4a/0x1d90 [ 243.059923] ? inet_ifa_byprefix+0x240/0x240 [ 243.064341] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 243.069893] inet_ioctl+0x18b/0x360 [ 243.073526] ? lock_acquire+0x1e4/0x540 [ 243.077490] ? inet_stream_connect+0xa0/0xa0 [ 243.081888] ? lock_release+0xa30/0xa30 [ 243.085873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.091399] ? _parse_integer+0x13b/0x190 [ 243.095532] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 243.101053] ? _kstrtoull+0x188/0x250 [ 243.104856] ? _parse_integer+0x190/0x190 [ 243.108995] packet_ioctl+0x242/0x370 [ 243.112783] ? tpacket_get_timestamp+0x1d0/0x1d0 [ 243.117526] sock_do_ioctl+0xe4/0x3e0 [ 243.121314] ? __fget+0x4ac/0x740 [ 243.124753] ? compat_ifr_data_ioctl+0x170/0x170 [ 243.129508] ? lock_release+0xa30/0xa30 [ 243.133469] ? pid_task+0x115/0x200 [ 243.137079] ? find_vpid+0xf0/0xf0 [ 243.140603] ? __f_unlock_pos+0x19/0x20 [ 243.144565] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 243.149755] sock_ioctl+0x30d/0x680 [ 243.153366] ? dlci_ioctl_set+0x40/0x40 [ 243.157320] ? ksys_dup3+0x690/0x690 [ 243.161021] ? kasan_check_write+0x14/0x20 [ 243.165254] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 243.170171] ? fsnotify+0xbac/0x14e0 [ 243.173875] ? vfs_write+0x2f3/0x560 [ 243.177574] ? dlci_ioctl_set+0x40/0x40 [ 243.181533] do_vfs_ioctl+0x1de/0x1720 [ 243.185405] ? fsnotify_first_mark+0x350/0x350 [ 243.189972] ? __fsnotify_parent+0xcc/0x420 [ 243.194290] ? ioctl_preallocate+0x300/0x300 [ 243.198683] ? __fget_light+0x2f7/0x440 [ 243.202638] ? fget_raw+0x20/0x20 [ 243.206076] ? __sb_end_write+0xac/0xe0 [ 243.210034] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 243.217028] ? fput+0x130/0x1a0 [ 243.220295] ? ksys_write+0x1ae/0x260 [ 243.224082] ? security_file_ioctl+0x94/0xc0 [ 243.228478] ksys_ioctl+0xa9/0xd0 [ 243.231917] __x64_sys_ioctl+0x73/0xb0 [ 243.235805] do_syscall_64+0x1b9/0x820 [ 243.239679] ? finish_task_switch+0x1d3/0x870 [ 243.244163] ? syscall_return_slowpath+0x5e0/0x5e0 [ 243.249077] ? syscall_return_slowpath+0x31d/0x5e0 [ 243.253993] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 243.258994] ? __switch_to_asm+0x34/0x70 [ 243.263037] ? __switch_to_asm+0x34/0x70 [ 243.267081] ? __switch_to_asm+0x40/0x70 [ 243.271135] ? __switch_to_asm+0x34/0x70 [ 243.275191] ? __switch_to_asm+0x40/0x70 [ 243.279237] ? __switch_to_asm+0x34/0x70 [ 243.283283] ? __switch_to_asm+0x40/0x70 [ 243.287327] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 243.292156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.297332] RIP: 0033:0x456a09 [ 243.300516] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 243.319399] RSP: 002b:00007fbba36f9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 243.327093] RAX: ffffffffffffffda RBX: 00007fbba36fa6d4 RCX: 0000000000456a09 [ 243.334344] RDX: 00000000200009c0 RSI: 0000000000008914 RDI: 0000000000000013 [ 243.341597] RBP: 00000000009301e0 R08: 0000000000000000 R09: 0000000000000000 [ 243.348850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 243.356103] R13: 00000000004d0e20 R14: 00000000004c689d R15: 0000000000000000 10:55:39 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x600, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 243.384211] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 243.396436] validate_nla: 11 callbacks suppressed [ 243.396452] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 243.417006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 10:55:39 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) r2 = dup3(r1, r0, 0x80000) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000080)={0x2, 0x0, 0xf7, 0x3, 0x1, 0x6}) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) getsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000380)=""/4096, &(0x7f00000000c0)=0x1000) 10:55:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00'}) 10:55:39 executing program 6 (fault-call:4 fault-nth:1): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 243.429836] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.436235] bridge0: port 1(bridge_slave_0) entered forwarding state 10:55:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x500000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 243.474789] gfs2: invalid mount option: locktable= [ 243.479840] gfs2: can't parse mount arguments 10:55:39 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x10000, 0x10000) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000100)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000040)=0xfffffffffffffffe, 0x4) getsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000000), &(0x7f0000000080)=0x34a) 10:55:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00'}) 10:55:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2101, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:39 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x8f0, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 243.525974] gfs2: invalid mount option: locktable= [ 243.529197] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 243.530995] gfs2: can't parse mount arguments 10:55:39 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x4}, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000340)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000280)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x0, 0x0) 10:55:39 executing program 1: r0 = timerfd_create(0x0, 0x80000) fcntl$setflags(r0, 0x2, 0x1) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x6, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc4c85512, &(0x7f0000000040)=ANY=[@ANYBLOB="30079e0605d0fdae65761fdd38a0e4cba7d57480cf7ecf00000000000000000000000000000000"]) 10:55:39 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00'}) 10:55:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2e00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 243.648246] gfs2: invalid mount option: locktable= [ 243.653257] gfs2: can't parse mount arguments 10:55:39 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1020000000000000, 0x802) recvmsg(r0, &(0x7f0000000180)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/116, 0x74}], 0x1, 0x0, 0x0, 0x7}, 0x100) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='attr\x00') mknodat(r1, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) 10:55:39 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x14802, 0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x134, r2, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x20}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x24, 0x2}}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x81}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x11}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x9}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xa6ae}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x3e}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x1a}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4008004}, 0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000040)=ANY=[@ANYBLOB="0800000002f96a7c170419051f00ff7ff4ff0100"], &(0x7f00000004c0)=0x1) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) [ 243.730327] gfs2: invalid mount option: locktable= [ 243.735331] gfs2: can't parse mount arguments [ 243.864879] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.872043] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 243.884428] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 243.893594] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.906110] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.912514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.940722] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:55:39 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000000080)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0xfffffffffffffee2, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:55:39 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x97ffffff00000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x80000001, 0x400000) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000040)=""/157) 10:55:39 executing program 4: clock_adjtime(0x0, &(0x7f0000000040)={0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}) delete_module(&(0x7f0000000000)='\x00', 0x800) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x200, 0x0) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000180)="268223e6f9f9bd8746b5a3dee637838908aad6050305a679890543e137916b01b17d9f8ed1ed55e4227d8022a4f4fa9c02aa9b5bdd283bf4cd258b92153586542193e1") 10:55:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xaa01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:39 executing program 2 (fault-call:4 fault-nth:0): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x7a000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:39 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890b, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xfb00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:42 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x2) ioctl(r0, 0x9912, &(0x7f0000000180)="0a5cc80700315f85714070a9ed894abd300caa658f0dc2caf415c0977e5c67e832a9131d62041fa667b45849f3188190e9e46baea028bb32d100000000000000") mount(&(0x7f0000000000)='[::]:2:\x00', &(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000300)='ubifs\x00', 0x200000, &(0x7f00000002c0)) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000100)=0x280419) 10:55:42 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000900)=@filter={'filter\x00', 0xe, 0x5, 0x780, [0x0, 0x20000080, 0x20000258, 0x20000650], 0x0, &(0x7f0000000000), &(0x7f0000000080)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x5, 0x8, 0x0, 'bcsf0\x00', 'bridge0\x00', 'ifb0\x00', 'vlan0\x00', @random="0174b51b8b4a", [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @random="741a2a5db3ca", [0x0, 0xff, 0x0, 0x0, 0xff], 0xc0, 0xc0, 0x108, [@nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x1ff}}}]}}, @common=@ERROR={'ERROR\x00', 0x20, {"f3beea2f74a35ec54a7d96d8a86db16d16ba4f9f387dae45fa2892680199"}}}, {{{0x9, 0xb, 0x2, 'veth1\x00', 'tunl0\x00', 'veth0_to_team\x00', 'bridge_slave_0\x00', @local, [0x0, 0x0, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa0}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x9, 0x73, 0x8863, 'ip6gre0\x00', 'syzkaller1\x00', 'team_slave_0\x00', 'team_slave_1\x00', @dev={[], 0x11}, [0xff, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xb0, 0xe0, 0x210, [@time={'time\x00', 0x18, {{0xbe, 0x7f, 0x11280, 0xf5a2, 0x9, 0x1, 0x1}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x9}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x1ff, 'system_u:object_r:xen_device_t:s0\x00'}}}}, {{{0x0, 0x73, 0x1a, 'ipddp0\x00', 'gretap0\x00', 'team0\x00', 'vlan0\x00', @local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x1b}, [0x0, 0xff, 0x0, 0xff], 0xc0, 0x140, 0x1b8, [@helper={'helper\x00', 0x28, {{0x0, 'amanda\x00'}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x2, 0x2}}}, @common=@STANDARD={'\x00', 0x8, {0xf10ebf4a948ec907}}]}, @common=@NFLOG={'NFLOG\x00', 0x50, {{0x3, 0x6, 0x5, 0x1, 0x0, "82c921c325da82c6618396bdb1fde44de68e7dae66ec5db1ff6898828b4f93d92ee1ca88d28b1502434bf641d5999fcf7da7d0c435990e13d0c777563da802a1"}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x11, 0x54, 0x883e, 'bridge_slave_1\x00', 'bpq0\x00', 'nr0\x00', 'teql0\x00', @local, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], @random="e104d7a10152", [0xff, 0xff, 0xff], 0xb0, 0x148, 0x180, [@time={'time\x00', 0x18, {{0xace, 0x8, 0x14db2, 0x50ed, 0xf3, 0x6, 0x5aee29a02e434094}}}]}, [@common=@log={'log\x00', 0x28, {{0x0, "ee1913b8e5ed6ce5459344b0530a6c02bafdae8abf0d3bd1311712e0d738", 0x1}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x0, 0x0, 0x7}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@remote, 0xffffffffffffffff}}}}]}]}, 0x7f8) setsockopt$sock_int(r0, 0x1, 0x33, &(0x7f0000000040), 0x171) [ 244.314992] gfs2: invalid mount option: locktable= [ 244.320017] gfs2: can't parse mount arguments 10:55:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x4000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:42 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) fsync(r0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1, r1}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0xc, 0x4, 0x81000000004, 0x8000000007, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000001440)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) 10:55:42 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0b0081f3750000000000476600fc3782c8dbb2ed0d0b24ba33cd5836bf36e9251d8c4d88ce32eb1ff2bb52835a2be8fe1b5b8ff169ed9442cf1df41dec89f8e1f19231a4e777e6ee081163cdca2590"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) r2 = dup3(r1, r0, 0x0) sync_file_range(r2, 0x3, 0x1, 0x6) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:55:42 executing program 4: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f00000002c0)=@in, 0x80) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") sendfile(r0, r1, &(0x7f0000000000), 0x2020000000000ff) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x2}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r3, 0x8, 0x5}, &(0x7f0000000140)=0x8) [ 244.423103] gfs2: invalid mount option: locktable= [ 244.428225] gfs2: can't parse mount arguments 10:55:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x3f00000000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:42 executing program 1: r0 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(r1, 0x401070cd, &(0x7f0000000440)) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x6, 0x4) [ 244.546801] gfs2: invalid mount option: locktable= [ 244.551894] gfs2: can't parse mount arguments [ 244.553525] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.564512] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 244.575717] FAULT_INJECTION: forcing a failure. [ 244.575717] name failslab, interval 1, probability 0, space 0, times 0 [ 244.586965] CPU: 1 PID: 20140 Comm: syz-executor2 Not tainted 4.18.0-rc7-next-20180802+ #30 [ 244.595450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.604798] Call Trace: [ 244.607386] dump_stack+0x1c9/0x2b4 [ 244.611024] ? dump_stack_print_info.cold.2+0x52/0x52 [ 244.616219] ? trace_hardirqs_on+0x10/0x10 [ 244.620449] should_fail.cold.4+0xa/0x11 [ 244.624498] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 244.629583] ? stub_timer+0x10/0x10 [ 244.633199] ? flush_rcu_work+0x90/0x90 [ 244.637163] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 244.642256] ? lock_acquire+0x1e4/0x540 [ 244.646218] ? br_get_link_af_size_filtered+0x1e3/0xcf0 [ 244.651567] ? lock_downgrade+0x8f0/0x8f0 [ 244.655701] ? lock_release+0xa30/0xa30 [ 244.659656] ? lock_acquire+0x1e4/0x540 [ 244.663614] ? veth_get_iflink+0x1e2/0x340 [ 244.667833] ? lock_downgrade+0x8f0/0x8f0 [ 244.671967] ? lock_release+0xa30/0xa30 [ 244.675925] ? net_to_rxe+0xe1/0x110 [ 244.679655] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 244.685182] ? br_get_link_af_size_filtered+0x266/0xcf0 [ 244.690550] ? br_get_linkxstats_size+0x3a0/0x3a0 [ 244.695380] ? lock_acquire+0x1e4/0x540 [ 244.699341] __should_failslab+0x124/0x180 [ 244.703562] should_failslab+0x9/0x14 [ 244.707347] kmem_cache_alloc_node+0x56/0x780 [ 244.711824] ? kasan_check_read+0x11/0x20 [ 244.715967] ? lock_release+0xa30/0xa30 [ 244.719928] __alloc_skb+0x119/0x770 [ 244.723626] ? skb_scrub_packet+0x490/0x490 [ 244.727930] ? if_nlmsg_size+0x5d9/0xbc0 [ 244.731975] ? nla_put_ifalias+0x170/0x170 [ 244.736192] ? rtnl_trylock+0x20/0x20 [ 244.739979] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 244.744550] rtmsg_ifinfo_build_skb+0x73/0x190 [ 244.749118] rtmsg_ifinfo_event.part.31+0x45/0xe0 [ 244.753945] rtmsg_ifinfo+0x8c/0xa0 [ 244.757555] __dev_notify_flags+0x2f1/0x480 [ 244.761859] ? dev_change_name+0xba0/0xba0 [ 244.766074] ? dev_set_allmulti+0x30/0x30 [ 244.770205] ? dev_get_by_name_rcu+0x221/0x2c0 [ 244.774793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.780312] ? cap_capable+0x1f9/0x260 [ 244.784191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.789722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.795242] dev_change_flags+0xfd/0x150 [ 244.799290] devinet_ioctl+0xe4a/0x1d90 [ 244.803250] ? inet_ifa_byprefix+0x240/0x240 [ 244.807644] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 244.813171] inet_ioctl+0x18b/0x360 [ 244.816781] ? lock_acquire+0x1e4/0x540 [ 244.820740] ? inet_stream_connect+0xa0/0xa0 [ 244.825144] ? lock_release+0xa30/0xa30 [ 244.829108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.834633] ? _parse_integer+0x13b/0x190 [ 244.838769] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 244.844289] ? _kstrtoull+0x188/0x250 [ 244.848072] ? _parse_integer+0x190/0x190 [ 244.852208] packet_ioctl+0x242/0x370 [ 244.855992] ? tpacket_get_timestamp+0x1d0/0x1d0 [ 244.860736] sock_do_ioctl+0xe4/0x3e0 [ 244.864523] ? __fget+0x4ac/0x740 [ 244.867959] ? compat_ifr_data_ioctl+0x170/0x170 [ 244.872710] ? lock_release+0xa30/0xa30 [ 244.876670] ? pid_task+0x115/0x200 [ 244.880279] ? find_vpid+0xf0/0xf0 [ 244.883815] ? __f_unlock_pos+0x19/0x20 [ 244.887781] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 244.892954] sock_ioctl+0x30d/0x680 [ 244.896563] ? dlci_ioctl_set+0x40/0x40 [ 244.900522] ? ksys_dup3+0x690/0x690 [ 244.904224] ? kasan_check_write+0x14/0x20 [ 244.908443] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 244.913355] ? fsnotify+0xbac/0x14e0 [ 244.917051] ? vfs_write+0x2f3/0x560 [ 244.920751] ? dlci_ioctl_set+0x40/0x40 [ 244.924711] do_vfs_ioctl+0x1de/0x1720 [ 244.928593] ? fsnotify_first_mark+0x350/0x350 [ 244.933162] ? __fsnotify_parent+0xcc/0x420 [ 244.937468] ? ioctl_preallocate+0x300/0x300 [ 244.941859] ? __fget_light+0x2f7/0x440 [ 244.945822] ? fget_raw+0x20/0x20 [ 244.949261] ? __sb_end_write+0xac/0xe0 [ 244.953224] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 244.958743] ? fput+0x130/0x1a0 [ 244.962009] ? ksys_write+0x1ae/0x260 [ 244.965799] ? security_file_ioctl+0x94/0xc0 [ 244.970192] ksys_ioctl+0xa9/0xd0 [ 244.973628] __x64_sys_ioctl+0x73/0xb0 [ 244.977514] do_syscall_64+0x1b9/0x820 [ 244.981396] ? finish_task_switch+0x1d3/0x870 [ 244.985876] ? syscall_return_slowpath+0x5e0/0x5e0 [ 244.990791] ? syscall_return_slowpath+0x31d/0x5e0 [ 244.995707] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 245.000706] ? __switch_to_asm+0x34/0x70 [ 245.004752] ? __switch_to_asm+0x34/0x70 [ 245.008798] ? __switch_to_asm+0x40/0x70 [ 245.012846] ? __switch_to_asm+0x34/0x70 [ 245.016890] ? __switch_to_asm+0x40/0x70 [ 245.020935] ? __switch_to_asm+0x34/0x70 [ 245.024989] ? __switch_to_asm+0x40/0x70 [ 245.029037] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 245.033878] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.039053] RIP: 0033:0x456a09 [ 245.042238] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.061122] RSP: 002b:00007f9214b22c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 245.068819] RAX: ffffffffffffffda RBX: 00007f9214b236d4 RCX: 0000000000456a09 [ 245.076070] RDX: 00000000200009c0 RSI: 0000000000008914 RDI: 0000000000000013 [ 245.083322] RBP: 00000000009301e0 R08: 0000000000000000 R09: 0000000000000000 [ 245.090575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 10:55:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x7700, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x40000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 245.097834] R13: 00000000004d0e20 R14: 00000000004c689d R15: 0000000000000000 [ 245.109018] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 245.117950] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 245.132299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 10:55:42 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5452, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x48}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 245.145875] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.152298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.157358] gfs2: invalid mount option: locktable= [ 245.163744] gfs2: can't parse mount arguments 10:55:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6100, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:42 executing program 4: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe, 0x0, &(0x7f0000000740), 0x0, &(0x7f0000000100)={[{@discard_size={'discard'}}]}) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f00000000c0)=0x80000, 0x4) write$P9_RLINK(r0, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x161) 10:55:42 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x2) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fallocate(r0, 0x1, 0x1, 0x5) statfs(&(0x7f0000000140)='./file0//ile0\x00', &(0x7f00000002c0)=""/48) close(r0) 10:55:42 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x800, 0x400000) ioctl$TIOCSBRK(r2, 0x40044591) [ 245.229281] gfs2: invalid mount option: locktable= [ 245.234311] gfs2: can't parse mount arguments [ 245.265871] JFS: discard option not supported on device 10:55:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xffffff97, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x3, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000100)=0x9) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000680)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @remote, 0x3}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000800)="cf", 0x1}], 0x1, &(0x7f00000004c0)}, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000040), 0x1) 10:55:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)={'syz1', "65c002ab1d41c65115c8d8eb4d898521879bccdcd75d6e0798428759e5046810210fd7a8dd9699c1b2e9ddc3"}, 0x30) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r1 = getpid() ioprio_set$pid(0x2, r1, 0x0) [ 245.380836] gfs2: invalid mount option: locktable= [ 245.385902] gfs2: can't parse mount arguments 10:55:43 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 245.433823] gfs2: invalid mount option: locktable= [ 245.438832] gfs2: can't parse mount arguments [ 245.473331] bridge0: port 1(bridge_slave_0) entered disabled state 10:55:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x801, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:43 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0045878, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 245.485474] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 245.509992] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.516409] bridge0: port 1(bridge_slave_0) entered forwarding state 10:55:43 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$void(r0, 0x5451) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") capset(&(0x7f0000000200)={0x20071026}, &(0x7f0000001fe8)) write$binfmt_elf64(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x101, 0x2, 0x7, 0x7, 0x9, 0x2, 0x6, 0x1, 0xc6, 0x40, 0x3b, 0x40, 0x7, 0x38, 0x2, 0x3, 0x7, 0x2}, [{0x3, 0x7, 0x92, 0x9, 0x1, 0x3, 0xffffffff, 0x200}], "9811a1710cb576d572b17272a60a335e1e397f6516f2246ce511bfe5bdcfe39e2cbb11387f6680557f0f3df088c57836c14f75463ccafa43bdcb27e37f4907bbacdc3b33f1a62adf3f9e0d5445362e0698ce580ed3cc755bf5105a48e2c1a97f25d728510a6b067a7dff19a0d8f3ab1f7172fbf7c68a6b40cdbc8fa3108bf32a345552f4d458b11f6215c0365263872eca676e70f9106f03d83afb5a8532a701ab34a875c898c76b8d1fbf10fa8146fdbd12284f5d48968020401838689ceac296fe4c89ae9649e276d6b80d36537d3cc35bd986083fc35df4bacfae7cb28d6b9e4da3de58b8ed8cc078bf0ede19ecfa4574"}, 0x16a) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r2) r3 = memfd_create(&(0x7f00000002c0)="bcf6", 0x0) write(r3, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000100), 0x4) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) [ 245.544718] gfs2: invalid mount option: locktable= [ 245.549740] gfs2: can't parse mount arguments [ 245.559390] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 245.583098] gfs2: invalid mount option: locktable= [ 245.588099] gfs2: can't parse mount arguments 10:55:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x100000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xbb00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 245.677999] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 245.732353] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:55:43 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8906, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8902, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:43 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x1000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:43 executing program 4: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xa2, 0x4242) write$tun(r0, &(0x7f0000000040)={@void, @val={0x0, 0x83, 0x8, 0x9, 0x1b56, 0x56a3}, @x25={0x3, 0x8001, 0xff, "6489abbdcdfc503e246181e6450d6b3ab316bd76f3fc114033ffa9c3b65103b429aefa02b5552381183047371075b1d5a8217b92bd91db5b0a6264f79939199e49de667ea79e21d24057a5640409f400d1d0"}}, 0x5f) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000580)) 10:55:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x4c00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0xfcffffff}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 245.824433] gfs2: invalid mount option: locktable= [ 245.829481] gfs2: can't parse mount arguments [ 245.844756] gfs2: invalid mount option: locktable= [ 245.849777] gfs2: can't parse mount arguments [ 245.966803] bridge0: port 1(bridge_slave_0) entered disabled state 10:55:43 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0xfffffffffffffef0) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:55:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xa400, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x101, &(0x7f0000000040)="025cc8074370090026a3cc60ce0000000000509f2019be136e196099d880e05ac2901d957eafa20d8333f9bce43f44") perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x9, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e21, @rand_addr=0x9}], 0x10) 10:55:43 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000040)={'ip6_vti0\x00', 0x4}) r1 = socket(0x100000000000010, 0x8000000000000003, 0x0) ioctl$sock_ifreq(r1, 0x8932, &(0x7f0000000140)={'gre0\x00', @ifru_ivalue}) socket$inet6_udplite(0xa, 0x2, 0x88) 10:55:43 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x7400000000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:43 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891a, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891c, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6901, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8981, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:43 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8940, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xc100, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") mmap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800"}) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x53, &(0x7f0000000000), &(0x7f0000000040)=0x8) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x43ff55686452d3a7, 0x0) setsockopt$bt_hci_HCI_FILTER(r3, 0x0, 0x2, &(0x7f0000000100)={0x6, 0x2, 0x20000000, 0x100}, 0x10) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f00000002c0)=""/4096, &(0x7f0000000080)=0x1000) close(r2) close(r1) [ 246.206871] gfs2: invalid mount option: locktable= [ 246.211898] gfs2: can't parse mount arguments [ 246.244983] gfs2: invalid mount option: locktable= [ 246.250078] gfs2: can't parse mount arguments 10:55:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x300}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:43 executing program 1: syz_mount_image$reiserfs(&(0x7f0000001c00)='reiserfs\x00', &(0x7f0000001c40)='./file0\x00', 0x0, 0x19d, &(0x7f0000001e00), 0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB='\b']) 10:55:44 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0189436, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 246.364600] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" [ 246.422309] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 10:55:44 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000071000000000100139a8484a6e836d36ce64d6b65ad36d3"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0)=0x2, 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002c80)={0x0, @dev, @multicast2}, &(0x7f0000002cc0)=0xc) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000300)=""/89, 0x691, 0x0, &(0x7f0000002d00)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0xffffff6f) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) 10:55:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x3f000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xf501, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x7a00}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8901, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:44 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x2, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") getsockopt$sock_int(r0, 0x1, 0x31, &(0x7f00000000c0), &(0x7f0000000040)=0x1) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x10000, 0x0, 0x3ff}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r1, 0x2}, &(0x7f0000000140)=0x8) 10:55:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x800, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040)}]) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_S390_UCAS_MAP(r2, 0x4018ae50, &(0x7f0000000140)={0x1, 0x101, 0xd73}) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7fffffff, 0x8000) ioctl$TCSETSF(r3, 0x5404, &(0x7f00000000c0)={0x3, 0x81, 0x7fffffff, 0x7ff, 0x3, 0x3ff, 0x2, 0x0, 0x3, 0x7, 0x5, 0x100000001}) io_getevents(r1, 0x0, 0x1000000, &(0x7f0000000040), &(0x7f0000000080)={0x77359400}) 10:55:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2e01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8983, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 246.976882] gfs2: invalid mount option: locktable= [ 246.981972] gfs2: can't parse mount arguments 10:55:44 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8982, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x4, &(0x7f00000001c0)=0x0) close(r0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x700000000000}]) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x401, 0x800) getsockopt$inet_udp_int(r2, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) 10:55:44 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x5, 0x24080) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000006c0)={0x6, 0x4, 0x1, 0xffffffffffffff9c}) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000240), 0x1) io_setup(0x10001, &(0x7f0000000280)=0x0) io_submit(r2, 0x7, &(0x7f0000000900)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x9db, r0, &(0x7f00000002c0)="5f91bcf780e5417df5e1c15bddaaa7", 0xf, 0x2, 0x0, 0x0, r1}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x3, 0x80000000, r1, &(0x7f0000000340)="4ab7dd7d8647f72a968d2471d2276e825f67b24910583775df94a3605f468ea11420eeed310152d5d350b08593d6563a3cee93fec87195f22ea710939ff3e44caa27e4639a4c3a2ebf51b7a7407a6d9bd541dd294fa780d7f206d508c975c359789ecfe200302cf7659af9d8c68a9e1a1a586eb10ae482d8d549a718a31b0d0009fca794668ca3b1b48119a0826f15adbeb964b7031995e94f18540064c338a9eebf542f68f180d9ff2ed4649930b85d232684c2b265f79c2c00cec3b0dfcdb391e5", 0xc2, 0x7f, 0x0, 0x0, r1}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x6, 0x1, r1, &(0x7f0000000480)="6e1ad467ab0b1aacc84055ec18686e8fd92de930cdec83f49bc81a1cd587c923fd6e95aa937b5fdc3e0bcb8d6a326ed4e8f37c7e9ae4ad9f6fccb1580349970ac2db4fd8385d4d3879d784e56a7b883f930d937241c03e234cbd6f4a805dceb27da4cfb48a688ab502bd1919ce8314d8c9f9a93d9a1acaa24472ff538585f8cf9b83ded11cd13542fb4e50b7fd74220d99933d6f797ccaf7acaecb18e617b39f5f29088d9a4c5b9814d14a81631eaeeb9ff0e67f87814dca", 0xb8, 0x6, 0x0, 0x0, r1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0xf, 0x7, r1, &(0x7f0000000580)="0964be72ff0cba2650d558d360fa641d608eda4ff74f925e0ac578296cf80a61d15ee491b6bde309fd5484b5cd58ac8052b1c2bd799da7879752d3f489c79616c459d9a8dce72e972039d2cf5d14636bd6aac23fa49bac466a6ac09ed6220a80ca26fdedb983231a4bc244115ebd2f5ee70c448c5dd2306136fe289f521faa8362e65814d9305d980b937c664fbc063474cfee4feb68caafac189a5fc764d02468c0e90645772aa4df992fb67294b51871aafea25d64827fc2f8464bb01b86f40d5506409e309cf4455ea9ee7253b6b1f9f283fd1a90ebe699e0cc6bbceb044fe4bddee4d4894a2b139abb16564d56fc3390da63", 0xf4, 0x8fd, 0x0, 0x0, r1}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x1, 0x9, r1, &(0x7f00000006c0), 0x0, 0x8cb, 0x0, 0x1, r1}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x8, 0x3ff, r1, &(0x7f0000000740)="747af192bfb98a9d63e1276681d9c620d421d76b38560b3e9a6c69ded8e0eb16291d1251caa682c6892a52a95c4238d06fdb7b9dc8c131091ccfb73a0222d9437a05cba14a6946e2a17a3cbefba0e0245861004f0dc12b2f5ece56910a8dc457c991642e85f99dedf7ace5d4df96331ea59cdbd3e00493c9c8ed", 0x7a, 0x9, 0x0, 0x1, r1}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x2, 0x2, r0, &(0x7f0000000800)="95ef44e24ffcd44e301afb90e2bade6143e58d648ed6aa73782bc82477b1e7c3446b34443c3ddca855e4612a396e68a81f9948466f8a8b08442c693f2b2f164fa5702bf42d766fe6ad626ef334d3c2892346d4dcacc6b00b7dd3f8c7d5540ea14d6c4c554bc3235a5521371d386b26bf6684c165d40226794b9078c8a9ede23298f9fcfb3f5c6b08ab9f3949dcf44e51572abd0153bb2b02b77009ef7018cde94fd59b1c1f0cf1f758", 0xa9, 0x0, 0x0, 0x0, r1}]) finit_module(r0, &(0x7f0000000000)='&md5sum!\x00', 0x2) io_setup(0x101, &(0x7f0000000040)=0x0) r4 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x42240) io_cancel(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x4, r0, &(0x7f0000000080)="32b975b6c697343ae340b57707016e35d18f21e0d6ef2f781830bc601460", 0x1e, 0x8ba, 0x0, 0x0, r4}, &(0x7f0000000140)) 10:55:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x74}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8916, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 247.122080] gfs2: invalid mount option: locktable= [ 247.127139] gfs2: can't parse mount arguments [ 247.221283] gfs2: invalid mount option: locktable= [ 247.226301] gfs2: can't parse mount arguments 10:55:45 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB='u \x00\x00'], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2000, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x9) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:55:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="0300"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:55:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x201, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:45 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8983, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x6}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5460, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:45 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) rt_sigsuspend(&(0x7f0000000040), 0x8) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000400)={0x0, 0x3, 0x30}, &(0x7f0000000440)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000480)={r2, 0x1}, 0x8) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="65000000b7000de8883c01f7b47e6220544c59b94eaf8d3d33d89cf96695eb6fc007f59118e17d205b06ed89c1ef43288a0a92d1680838dfcfc12e6aa174e2dbd4e14787faa3138859aff632dff4a91e0ebbc7cfdf29867300"], &(0x7f0000000200)=0x6d) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000240)={r4, 0x3}, 0x8) r5 = dup(r3) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r5, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x404000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x44, r6, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffff}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000080}, 0x8004) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0x7, &(0x7f00000004c0)={0x1c, 0x6, 0x5, 0x569fb267}, 0x10) clock_nanosleep(0x0, 0x0, &(0x7f0000000100), &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x8031, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) 10:55:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xffffff8c, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x3b01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 247.828507] gfs2: invalid mount option: locktable= [ 247.833531] gfs2: can't parse mount arguments 10:55:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000080)=ANY=[], 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) 10:55:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0xf}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x4000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x8e01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8905, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:45 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8903, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x7a00000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 247.997298] gfs2: invalid mount option: locktable= [ 248.002323] gfs2: can't parse mount arguments [ 248.031440] gfs2: invalid mount option: locktable= [ 248.036474] gfs2: can't parse mount arguments 10:55:46 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x101100, 0x0) ioctl$TIOCSBRK(r2, 0x40044591) 10:55:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6c01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8946, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:46 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8918, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000340), 0xc, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="180000001d00fdff0000000000000000b19d9fe66fd3cbdd43cc000000000000000000000000"], 0x18}}, 0x0) 10:55:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x60000, 0x0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f00000000c0)=0x7fff) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000280), 0xc, &(0x7f0000000380)={&(0x7f0000000300)=@ipv4_newaddr={0x34, 0x14, 0x109, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x3, 0x6}}]}, 0x34}}, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000008c0)=ANY=[@ANYBLOB="66696c7465720000000000000017c212feefa2cc87b208ac0b41813f000000000000000000000000000000000000000e00000004000000380400004001000000000000780200007802000078020000680300006803000068030000680300006803000004000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x498) 10:55:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0xfffff000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8908, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:46 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x10000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r1 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000040)='./control\x00', 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat(r1, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000023ff8)='./control\x00', r2, &(0x7f0000012ff6)='./control\x00') renameat2(r2, &(0x7f0000bee000)='./control\x00', r1, &(0x7f000003a000)='./control\x00', 0x2) getsockopt$inet_udp_int(r1, 0x11, 0x66, &(0x7f0000000100), &(0x7f0000000140)=0x4) futimesat(r2, &(0x7f0000000080)='./control\x00', &(0x7f00000000c0)={{0x0, 0x2710}, {0x0, 0x2710}}) 10:55:46 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5460, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1a00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 248.757553] QAT: Invalid ioctl 10:55:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x8a00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:46 executing program 1: r0 = socket$inet(0x2, 0x40000000000003, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) write$FUSE_GETXATTR(r1, &(0x7f0000000140)={0x18, 0xfffffffffffffffe, 0x4, {0x7}}, 0x18) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@random="b100485caa2a", @random="43333e128ef5", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @broadcast}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, &(0x7f00003b5000)) [ 248.807395] gfs2: invalid mount option: locktable= [ 248.812421] gfs2: can't parse mount arguments [ 248.820277] validate_nla: 13 callbacks suppressed [ 248.820286] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 248.844286] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:55:46 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc020660b, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") socketpair(0x0, 0x3, 0xd400, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000740)=0x0) fcntl$getownex(r0, 0x10, &(0x7f0000001a80)={0x0, 0x0}) r4 = gettid() lstat(&(0x7f0000002c80)='./file0\x00', &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000002d80)=0x0, &(0x7f0000002dc0), &(0x7f0000002e00)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000002d40)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002e80)={{{@in=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000002f80)=0xe8) r9 = getgid() r10 = getpgid(0x0) stat(&(0x7f0000002fc0)='./file0\x00', &(0x7f0000003000)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003080)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000030c0)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f00000031c0)=0xe8) getresgid(&(0x7f0000003200)=0x0, &(0x7f0000003240), &(0x7f0000003280)) r16 = fcntl$getown(r0, 0x9) r17 = getuid() r18 = getgid() sendmsg$netlink(r1, &(0x7f0000003400)={&(0x7f00000001c0)=@kern={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002c40)=[{&(0x7f0000000200)={0x18, 0x37, 0x200, 0x70bd27, 0x25dfdbfd, "", [@typed={0x8, 0x8a, @u32=0x1000}]}, 0x18}, {&(0x7f0000000780)={0x12d8, 0x26, 0x200, 0x70bd2c, 0x25dfdbfe, "", [@generic="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", @nested={0x60, 0x28, [@typed={0x14, 0x7f, @ipv6}, @generic="292fbd670681d7926d5cd5634c171684c2ea5177d44352aa40ba7d740f4d00a9db7ef8e5f4b5cad6320129733f261055f62317d6b4d1a2c350e16ddc", @typed={0x4, 0x54}, @typed={0x8, 0xd, @pid=r2}]}, @nested={0x268, 0x84, [@generic="d4cf6ee0de25378c73cb9f43c3a4db44309bf9e37fbdf7762d6b9030ee920227601f4910cb1ed3b0922e6a954403aeb66e20cba39049fbdbad1b442d2b97df9f5c49b4cb694d340f2e8772d100f00dbeabe86e09063aad932c8cfa57ca37484cfc505809f4d35d012e5244cd22be14acfdc6bfb504e370fde2f2be4b3bf9fe8514bca10829c433cf3892495bd329d81cac3dc4f39940f14e4b2fa2025b75438473f7608e507e052766231523a39ad5ef", @generic="d8db284cd798c3ee38bb48973729cc224a55d77c1d64279a38ed1bab145cc5e708d4ee1f9eed11347842a5ff3b439b86f934ebac5e1db40dd62c7bf04dfa9d5a9949224b0ebfaebda1e749e45d4ad92a5e92de196274b9136f538f3f20ef38a0556d153ec3781f9fd0f7e77cb9f5ff1e19efd5db961e3560a2a1921c154fc201686a2b661c67dfaedd139aedf2b5", @generic="0e9a82bbba028fc91ff7d89de5fee8dab83d86e52f85af1b335a9adc49adc3a7d2e3d7359ed358c557bb0f7b42804fd3f2d7110cd212279b7bc9dd4bebb8482e80d15cf84d8e091352bb291b6bef3d888d6af4ef1a5de37446f14583270828e7456eeded39ebfaa38905160a97ed35c8355f2ad2561095194c95fed74ab2a630f659ab5eeca8ce34efcb62ef9e1cc89d39cab143019338bef4b47c6dd581e226f544c51cfc87cd32464145f6b887f08e768de7018d5ade3c94938272248d0ab66e", @generic="254470a8f25e1e27aff519e5db07ee66621e9591683883f5ebc56aa17ee05464d3cd15c3e7ce9b4d5bb84f0087cb8d9f832866f5830f35a89b81464cee73fece02942feff56b073d2af162717350bdc2f5b10b7eb63ca8ac6d54dfc6ffefc9f9b0cec9"]}]}, 0x12d8}, {&(0x7f0000001ac0)={0x1178, 0x28, 0x800, 0x70bd2d, 0x25dfdbfe, "", [@generic="6b9f2a804c6bb75bd8787cac091392bb35ab325b856420bba7d5c27a23768d2ee36453b0f16b95122e21f3021a793443c5dbd252135af0f7299c936059249bddb8d86042fc9e0a67aa1366578e50abf3092eed5177ab4024f2626d9aead54aef0be8cdd028ab99747c66e693114c9f8928a78ac5b9ed1916400d7bb54d24a37d81d76983f0bcb365e6debb830726137d2bf08a9647f4d2406ebd5724538efd5682ac134ddfbad2ce", @generic="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", @generic="343039f87b8ac39e4afc8dc6f3eb701fd8a7d6bbd24904d44c917bf0a7603092d251a730bc567c00bf1a118834717dffa5efafddf0a3f271e6a5d979bd40c6045b42dd5526a9637f034bf9b66433829f70962f7078dda570d6b4f7a24da5d08de983f2e59a721fb71f4d92fcdf86bd9d934ff70511eefa0f88f9ce26ff9dd3c97d4314e187454100aeb09ec742e26df222f81dac81c5a75532e7f32cfd138416", @typed={0x8, 0x95, @pid=r3}, @typed={0x4, 0x3b}, @typed={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x18}}]}, 0x1178}], 0x3, &(0x7f00000032c0)=[@rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @cred={0x20, 0x1, 0x2, r16, r17, r18}], 0x120, 0x4001}, 0x20000000) r19 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=@ipv4_newrule={0x38, 0x20, 0x21, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, [@FRA_FLOW={0x8}, @FRA_SRC={0x8}, @FRA_GENERIC_POLICY=@FRA_SPORT_RANGE={0x8, 0x17, {0x4e21, 0xa00}}]}, 0x38}}, 0x0) sendmmsg$alg(r19, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000002c0)="2aaafb88d990528adbcb6c62dd498d29d9685e1f1e4c27bd3baef33710286587999ffc35358c61275fa192b56cd9a770188fb23e664fe007ad5aa0e1100c6befcb244523799b0f7729cbb2dad1d6cac0b273bf08f7bbea5e68475d42092cd0d9f5d601d8aed23c2a0fa37d456b767000fd22b31b9d4596153be9a093ff7ee69418cb98b6", 0x84}, {&(0x7f0000000380)="dd661265872309b13b3df2547df167ea464ebb0a80f956262c5bff546d2b5517d4270b2525839d8be73aeaa69c9c2502aa06a190b8e3b698e606d3d3464e2fcb3e0103d8e6c0e5e7eafce6d1a0ca3a1d4c208491176a54cf05aca0553c9254e40d8b03c4f71172c1306e31a02edaa70803b09696560273145425af4efd342954c83a9a098e31cf0d1da8f7ee674167cb120a1eaefc681e6a8e2cb5ea8bbc3d13d858136cc087acaff262aef1f27d10618e874aaaffc6a5e0f16172e3b0f99f4701716f25e6cdd77f76df98f076a7ab9c096bea7b39f7", 0xd6}, {&(0x7f0000000480)="b4d899a0ea0a85804f238906901a1a70065edba9c5907cc3098e5f7d79d6cc9c75c74a9e9d4064a5a6680786b1c9881890fda3e7c7f802d8252210ac7300fa0f94ff8048bece3d78afaf5245252108b75cf57ebe1744220b28df77c98610a3883af9ffc6fe4df9dc0b101992082d9363540b85a4c4dd92050141f4f5d36a01914c722c02cfd03a998acb2f5e3a8ddbef0a748c60da755302b84f0abb3bed17c7798fda4c2338ecc462dc5acafa8a5fce295a6fad3fa310a9725b12f0b3c1050e", 0xc0}, {&(0x7f0000000540)="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", 0xfc}, {&(0x7f00000006c0)="d5fd2eb6fc6e6f4faa7533f9b198a9ef0b63cded7c246fdaff117de9f0a371c67ca88450b6123ca70ce450d1847a99c70d7f762c88e3f9210c9621fa35f2dd9088c0e6bdb9180f85dec43038dafb8ff1d5e01b4908", 0x55}], 0x5, &(0x7f0000000100)}], 0x1, 0x0) [ 248.859069] gfs2: invalid mount option: locktable= [ 248.864126] gfs2: can't parse mount arguments 10:55:47 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) getsockname(r2, &(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000280)=0x80) read(r0, &(0x7f00000000c0)=""/10, 0xa) 10:55:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x5000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890d, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xfcfdffff00000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xe900, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") set_mempolicy(0x3, &(0x7f0000000240)=0x3, 0x2) mmap(&(0x7f000081a000/0x1000)=nil, 0x1000, 0xfffffffffffffffb, 0x4052, r0, 0x4000000000000000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000200)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/ip6_flowlabel\x00') ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x100000000000, 0xfffffffffffffffc, 0x8}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="002cb4d1d23f00000000000000000000ffae0a07a9a2525342af1182be58e5be47365ce1ef7f85602b3eb15351ea066de22aa3494c8898ef3089ae7e699cb7643dff2e809143657f5cbfebdb3aa0b4eabf1f046f12ac299dee4def8f6605f146235cd7681ca8c268097b6f75406518ee04784192acce62c98e11f4cb3c406b563f47470b82d582b8025ed8fdc5fcfee174b687f55ccb5ae9329236d8b98489f9ee478213cd1190df8c57c256ef57e9ca440cd3a6d7ed30063f1377b5ac3f237cda1f69f6dfdd2584e51c7d663a6e364e8a668d35a656731721330206cf824fb57421671ff6a8745ac5fac03541c66c35eaa7919208b1f4d3e5f36d5cbde5964929ecbe341f6bc819fc4d", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000040)=0x20) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000100), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000080)=@sack_info={r3, 0x8001, 0x6}, 0xc) 10:55:47 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x894c, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:47 executing program 4: clock_adjtime(0x0, &(0x7f0000000200)={0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x1}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000040)={0x1, 0xffffffffffffffe1, 0x57, 0x3f, [], [], [], 0x1, 0x4, 0x6, 0x1000, "4707b1927de59f65c1d1b24d44e2ee1c"}) [ 249.489562] QAT: Invalid ioctl 10:55:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xdc01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:47 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x20000, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000100)={0xffffffffffffffff}) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000280)=""/103) ioctl$FICLONE(r0, 0x40049409, r1) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rfkill\x00', 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000008000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe00000000850000001f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r2, 0x0, 0x22, 0xd7, &(0x7f0000000140)="3c2d3cd405f08b41637c2fee86dd371da6e5ed6ed61583b2f02a7034f44fca7788dd", &(0x7f0000000480)=""/215, 0x7ff}, 0x28) getsockname$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x786) 10:55:47 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x9, 0x1000) ioctl$SG_IO(r1, 0x2285, &(0x7f00000002c0)={0x53, 0xffffffffffffffff, 0x4d, 0xfffffffffffffffd, @buffer={0x0, 0x7b, &(0x7f0000000040)=""/123}, &(0x7f00000000c0)="af078e80f70935c2b7a74b62795ae9c8e24a4330b1fcd18c693a4410b2fc139a85aee4cb92f54f35f7484083a7dd6d3dce98d26cdefaa86f4ec6ea146effd6aa1a6f8e323e4fe6306c908f254d", &(0x7f0000000200)=""/170, 0x8, 0x10016, 0x1, &(0x7f0000000140)}) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000002540)=0x7ff, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r2) 10:55:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x6000000000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 249.528240] gfs2: invalid mount option: locktable= [ 249.533268] gfs2: can't parse mount arguments [ 249.538295] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 249.564498] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:55:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8904, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x7000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:47 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890d, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 249.639371] QAT: Invalid ioctl [ 249.660760] gfs2: invalid mount option: locktable= [ 249.665790] gfs2: can't parse mount arguments 10:55:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x8500, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 249.710810] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 249.770332] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:55:48 executing program 4: r0 = socket$inet6(0xa, 0x10000000003, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r2, 0x6, &(0x7f0000000400)="025cc8bd6d345f8f768866e6314a2070d70036223d9df6c3407b10eecb1baaa567bd2eaf28d1b165966d1b1469c544f95ce36ac459003821b5856b0be26b448b60f563983ecc5297e63561ee9aac497fe1f3278aea1e859fdebd1243975aa277c9c8492a11a1b0cb0a5d3ad79cc109cf77de371e435e348f2eb268b2b64eaf4c3fb43bb23c0a1435304e5b576ec3de7ceb000000000000000000000000") bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffff9c, 0x50, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socket$inet6(0xa, 0x6, 0x40) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000200)={0x462b}) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)) name_to_handle_at(r4, &(0x7f0000000280)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="89fb0346744d7aaf646ca948c245bf39104c0b6de17a0361fdb6f2302c6700000000000000ff0000"], &(0x7f0000000300), 0x1400) sendto$inet6(r2, &(0x7f0000000280), 0x19e498d7, 0x20000004, &(0x7f0000000000), 0x1c) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x210c00, 0x0) dup2(r1, r0) 10:55:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x4020940d, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:48 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="38f32e0000000000008000000f100078db9b3e0044240ff16f013cf6ed9948159bde33af8b2be9f8e16c00000000000000751400b0000000"], 0x38}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x3, r3, 0x3c, 0x0, @ib={0x1b, 0x4, 0x7, {"2d2e90dec64903b6dc881b7d376e2693"}, 0x8, 0x100, 0x1}}}, 0xa0) 10:55:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xae00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:48 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8935, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:48 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x400000, 0x0) ioctl$TIOCSBRK(r2, 0x40044591) 10:55:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0xf0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 250.350912] QAT: Invalid ioctl 10:55:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xba01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8955, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 250.392992] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 250.409204] gfs2: invalid mount option: locktable= [ 250.414227] gfs2: can't parse mount arguments 10:55:48 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5451, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x305000, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000200)={0xa, [0x810b, 0x3, 0xfffffffffffff801, 0x2, 0x2000000, 0x11c2, 0x4, 0x8, 0x80000000, 0x101]}, 0x18) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x58}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x742000000000000, 0x200, 0x20e, 0x0, 0x53bb5f54, 0x5, 0x3ff, 0x5, r2}, 0x20) socket$packet(0x11, 0x3, 0x300) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x143400, 0x100) unlinkat(r3, &(0x7f0000000040)='./file0\x00', 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x0, 0xfffffffffffffffc}, 0x1) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000240)="98b02722af10fcd5bf65bb7d67f1a8bc6ff351733eda80abdd1b0f1e205e5dd2e865019c1fe7cfab7e76a9a947e639cb5c", 0x31) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) sendto$inet6(r0, &(0x7f0000000200), 0xfdb8, 0x4008080, &(0x7f00000003c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1e7) ioctl$EVIOCGBITSND(r3, 0x80404532, &(0x7f00000002c0)=""/203) sendmmsg(r4, &(0x7f00000092c0), 0x4f, 0x0) 10:55:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890b, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 250.445335] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 250.472392] gfs2: invalid mount option: locktable= [ 250.477508] gfs2: can't parse mount arguments 10:55:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xb201, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x6c, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) r1 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x8000, 0x40) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x50000000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x9c, r2, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1b}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x10001}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40}, 0x10) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x14c, 0x2000) getsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bind$vsock_stream(r3, &(0x7f0000000040)={0x28, 0x0, 0x2710, @host}, 0x10) 10:55:48 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8934, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 250.568935] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:55:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890c, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xf101, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 250.620626] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:55:48 executing program 4: mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x0, 0x71, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f0000b75000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000a3e000/0x1000)=nil) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) 10:55:48 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="0800000000000000f3ffffff018000007a0a00fffffffffd630108"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4021c0, 0x0) write$P9_RSTAT(r1, &(0x7f0000000180)={0x71, 0x7d, 0x1, {0x0, 0x6a, 0x6, 0x5, {0x8, 0x4, 0x1}, 0x1c280000, 0x100, 0x8f27, 0x0, 0x1b, "47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0xf, 'eth1eth0lo#ppp1', 0xb, 'cpuset(]/#\'', 0x2, '!\''}}, 0x71) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x4, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000200)='syzkaller\x00', 0x84000001, 0x3342, &(0x7f0000000300)=""/187}, 0x48) [ 250.671140] gfs2: invalid mount option: locktable= [ 250.676189] gfs2: can't parse mount arguments [ 250.755589] gfs2: invalid mount option: locktable= [ 250.760684] gfs2: can't parse mount arguments 10:55:48 executing program 3: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0xfffffffffffffffd, 0x101000) write$P9_RREAD(r1, &(0x7f0000000180)={0xb}, 0xff66) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x5021}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, r2, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @multicast2}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xf5ee}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x80, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f00000000c0)={0x50, @tick, 0x0, {0x100, 0x5}, 0x6, 0x1, 0x10001}) listen(r4, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r5 = accept4(r4, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r5, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:55:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x29a}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:48 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8907, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x3500, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:48 executing program 4: r0 = creat(&(0x7f0000000240)='./file0\x00', 0xd) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@broadcast, @in=@loopback}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000380)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x5, 0x1, 0x2}, 0x2c) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x12000, 0x0) ptrace$pokeuser(0x6, 0x0, 0x7ff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x11, 0x5, 0x6, 0xf36, 0x6, r0, 0x0, [0xd]}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1f, 0x7, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000050000000036000009000000180000b591fa4c30ca9cfde8a400ff00000000000000ff0300001800000000950000000000000000"], &(0x7f0000000100)='GPL\x00', 0x9, 0x72, &(0x7f0000000140)=""/114, 0x0, 0x1, [], 0x0, 0x9}, 0x48) 10:55:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8940, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x4800000000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:48 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x00', 0x2200}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'bridge_slave_1\x00'}) 10:55:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8924, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:48 executing program 4: r0 = socket$inet6(0x10, 0x2, 0x8000) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000000)=@nl=@unspec={0x0, 0x0, 0x4c00000000000000}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000140)="5400000020007f00b72c13b2a4a2809302000000030343026c2623692500040007f90083431ee93cea36d2f128f1c46b7b31afdc1338d54400ecffffff00005ae583de448daa7227c43ab8220000bf0cec6bab91", 0x54}], 0x1, &(0x7f0000000180)}, 0x0) 10:55:48 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8980, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:48 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) close(r0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'team_slave_1\x00', r1}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000013001108000000000000000000000000", @ANYRES32=r2, @ANYBLOB="00000000002f3e1315140fcd5d5effbf2f74a37964"], 0x2c}}, 0x0) 10:55:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2700, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8a9}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 251.272670] gfs2: invalid mount option: locktable= [ 251.277723] gfs2: can't parse mount arguments [ 251.301847] Unknown ioctl 1077957454 10:55:49 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x4000000000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8982, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 251.420370] netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. [ 251.424599] gfs2: invalid mount option: locktable= [ 251.433930] gfs2: can't parse mount arguments 10:55:49 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB='\v\x00\x00\x00u@\x00\x00\x00\x00\x00'], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x4}, 0xb) recvmsg$kcm(r1, &(0x7f0000001940)={&(0x7f0000000580)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f00000018c0)=[{&(0x7f00000002c0)=""/56, 0x38}, {&(0x7f0000000600)=""/211, 0xd3}, {&(0x7f0000000700)=""/42, 0x2a}, {&(0x7f0000000740)=""/119, 0x77}, {&(0x7f00000007c0)=""/90, 0x5a}, {&(0x7f0000000840)=""/102, 0x66}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x7, 0x0, 0x0, 0xf32}, 0x40000000) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x20040, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000019c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000001980)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000001a00)={0x7, 0x8, 0xfa00, {r3, 0x40}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000140)={0x13, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:55:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891b, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x7400000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x7e01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:49 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x200000000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff08000000bfa100000000000007010000f8ffffffb702000003000000bf130000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) 10:55:49 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5421, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000100), 0x28) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$int_in(r2, 0x5452, &(0x7f0000000300)=0x1) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000340)="f4b60f9088ca911ced98bd68e2521fa74ee908068418c0ec4e669dc26a232856aaf1e859fa2dda22e85385c98b2415fca61125d290804dd7d5ae673bbef9407d40b75ab4eaab3a1f02f073a56f75f411221e1f06cd6d596237247513c7") recvmsg(r2, &(0x7f0000000780)={&(0x7f0000000240)=@pppoe={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000740)=""/22, 0x16}, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000004c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) faccessat(r2, &(0x7f0000000000)='./file0\x00', 0x20, 0x1800) connect$unix(r2, &(0x7f00000001c0)=@abs, 0x6e) [ 252.057378] Unknown ioctl 1077957454 [ 252.090124] tls_set_device_offload_rx: netdev lo with no TLS offload [ 252.099262] [ 252.100933] ********************************************************** [ 252.107664] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 252.114352] ** ** [ 252.121034] ** trace_printk() being used. Allocating extra memory. ** [ 252.127719] ** ** 10:55:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xc601, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x9a02000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 252.134394] ** This means that this is a DEBUG kernel and it is ** [ 252.141078] ** unsafe for production use. ** [ 252.147758] ** ** [ 252.154464] ** If you see this message and you are not debugging ** [ 252.161136] ** the kernel, report this immediately to your vendor! ** [ 252.164700] gfs2: invalid mount option: locktable= [ 252.167819] ** ** [ 252.167824] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** 10:55:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x7f01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:49 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8953, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 252.167828] ********************************************************** [ 252.192911] gfs2: can't parse mount arguments 10:55:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8934, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f000000f000)=@abs={0x1}, 0x6e) r3 = syz_open_procfs(0x0, &(0x7f0000a92ff7)='net/unix\x00') sendfile(r1, r3, &(0x7f0000000340)=0x102, 0x80000009) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x101000, 0x0) getsockname(r0, &(0x7f0000000200)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000002c0)=0x80) sendmsg$can_bcm(r5, &(0x7f0000000500)={&(0x7f0000000300)={0x1d, r6}, 0x10, &(0x7f0000000480)={&(0x7f0000000740)=ANY=[@ANYBLOB="070000a502ce04439fbe7f1ce27c0006d69000014613599c630007000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="040000a00100000001000040060100003bdc1bd0700a2274"], 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) r7 = accept$alg(r4, 0x0, 0x0) r8 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x100000001, 0xffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x117, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f00000003c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000540), r9, 0x3}}, 0x18) sendmsg$alg(r7, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) 10:55:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x6000000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:49 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x7a000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 252.384295] gfs2: invalid mount option: locktable= [ 252.389409] gfs2: can't parse mount arguments 10:55:50 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f00000000c0)={0xb, 0x75, 0x0, {0xffffffffffffff0c}}, 0xfffffffffffffe9e) r0 = socket$inet6(0xa, 0x80003, 0x6) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x20200, 0x0) fanotify_mark(r2, 0xc, 0x40000008, r2, &(0x7f0000000280)='./file0\x00') getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000100)={0x4, [0x7, 0x7cbe, 0x1, 0x80]}, &(0x7f0000000140)=0xc) ioctl$TIOCSBRK(r2, 0x40044591) 10:55:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2900, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:50 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = gettid() write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0b01080726010000dd0000003f00000068030000020000000000000000000000f2d7e228ee669d5ab2b866f46c32a944e2af972f4468ba01d338969f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000054faffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000810000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x83c) process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x7ffff000}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x50000, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f0000000a00)={'broute\x00', 0x0, 0x3, 0x0, [], 0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {}], &(0x7f0000000040)}, &(0x7f0000000a80)=0x78) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000c22ff0)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) getpgid(r1) ioctl(r3, 0x8353, &(0x7f0000000180)="025c3f0a00145f8f764070") sendmsg$nl_xfrm(r2, &(0x7f0000000b40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80002000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)=@flushpolicy={0x18, 0x1d, 0x220, 0x70bd28, 0x25dfdbfb, "", [@etimer_thresh={0x8, 0xc, 0x31}]}, 0x18}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000d0) 10:55:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8919, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:50 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8919, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0xf0ffffff00000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:50 executing program 4: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000180)=0xd5) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) sched_setaffinity(r0, 0x8, &(0x7f0000000000)=0x37) listen(r1, 0x2) r3 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) recvfrom$packet(r3, &(0x7f0000000080)=""/89, 0x59, 0x0, &(0x7f00000002c0)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000300)={r2, 0x3, 0xbb, "88afa889d40b3024c044ad96dced5e3df83d8a2f9360cb83ce72a2f7c2acc6beb012b3cb6da3191f0cc4750bc2edcd0bcb58ede723909c06ece8ad7ec0f2431a15cb8eb3987ae751e2fbb19aa67bafbed3330cdef8d564ab3e00a06cf263d1330ddf48e8cffbe5a40b0275e5e269c887d859a574aff875b3be5271227455da769d4aa6846841577cde5f6bc6e192d50ffc349c964ab600cc117255f705a2b037891a1868dc8da2bb346f7756e3b225c439e0d2fccc5a157fe1faec"}, 0xc3) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000238000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) 10:55:50 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5451, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:50 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5411, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8100000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 252.972181] gfs2: invalid mount option: locktable= [ 252.977214] gfs2: can't parse mount arguments [ 252.996833] gfs2: invalid mount option: locktable= [ 253.001873] gfs2: can't parse mount arguments 10:55:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xd301, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 253.054758] QAT: Invalid ioctl 10:55:50 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xedc0, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8915, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x74000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:50 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x5, 0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:55:50 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8924, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xf701, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:50 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = gettid() write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0b01080726010000dd0000003f00000068030000020000000000000000000000f2d7e228ee669d5ab2b866f46c32a944e2af972f4468ba01d338969f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000054faffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000810000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x83c) process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x7ffff000}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x50000, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f0000000a00)={'broute\x00', 0x0, 0x3, 0x0, [], 0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {}], &(0x7f0000000040)}, &(0x7f0000000a80)=0x78) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000c22ff0)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) getpgid(r1) ioctl(r3, 0x8353, &(0x7f0000000180)="025c3f0a00145f8f764070") sendmsg$nl_xfrm(r2, &(0x7f0000000b40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80002000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)=@flushpolicy={0x18, 0x1d, 0x220, 0x70bd28, 0x25dfdbfb, "", [@etimer_thresh={0x8, 0xc, 0x31}]}, 0x18}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000d0) 10:55:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5452, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 253.183193] gfs2: invalid mount option: locktable= [ 253.188246] gfs2: can't parse mount arguments 10:55:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x6000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8953, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 253.279326] gfs2: invalid mount option: locktable= [ 253.284385] gfs2: can't parse mount arguments 10:55:51 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = dup3(r0, r0, 0x80000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000240)={0x3, '\x00', 0x7}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 10:55:51 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_dev$midi(&(0x7f00000008c0)='/dev/midi#\x00', 0xcaa8, 0x800) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000900)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x1) recvmsg(r0, &(0x7f0000000800)={&(0x7f0000000280)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000380)=""/209, 0xd1}, {&(0x7f0000000480)=""/125, 0x7d}, {&(0x7f0000000140)=""/30, 0x1e}, {&(0x7f0000000500)=""/113, 0x71}, {&(0x7f0000000580)=""/253, 0xfd}], 0x5, &(0x7f0000000700)=""/233, 0xe9, 0xa0}, 0x100) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000840)={@dev={0xfe, 0x80, [], 0x18}, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xd}}, @remote, 0xfffffffffffffc01, 0x101, 0x4, 0x400, 0x7fffffff, 0x1, r2}) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000940)={0x4, {{0xa, 0x4e24, 0xffff, @mcast1, 0xde}}, 0x0, 0x4, [{{0xa, 0x4e22, 0x80, @loopback, 0x8000}}, {{0xa, 0x4e20, 0x2, @remote, 0x2}}, {{0xa, 0x4e23, 0xfffffffffffffffc, @ipv4={[], [], @multicast2}, 0x10001}}, {{0xa, 0x4e22, 0x800, @mcast1, 0xffffffffffffffd8}}]}, 0x290) r3 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r3, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setitimer(0x1, &(0x7f00000000c0)={{r4, r5/1000+10000}}, &(0x7f0000000100)) 10:55:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x500}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0189436, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:51 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891c, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xed00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:51 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r1 = gettid() write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0b01080726010000dd0000003f00000068030000020000000000000000000000f2d7e228ee669d5ab2b866f46c32a944e2af972f4468ba01d338969f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000054faffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000810000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x83c) process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x7ffff000}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x50000, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f0000000a00)={'broute\x00', 0x0, 0x3, 0x0, [], 0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {}], &(0x7f0000000040)}, &(0x7f0000000a80)=0x78) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000c22ff0)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) getpgid(r1) ioctl(r3, 0x8353, &(0x7f0000000180)="025c3f0a00145f8f764070") sendmsg$nl_xfrm(r2, &(0x7f0000000b40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80002000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)=@flushpolicy={0x18, 0x1d, 0x220, 0x70bd28, 0x25dfdbfb, "", [@etimer_thresh={0x8, 0xc, 0x31}]}, 0x18}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000d0) 10:55:51 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0045878, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xc00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 253.832303] validate_nla: 14 callbacks suppressed [ 253.832312] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 253.837965] gfs2: invalid mount option: locktable= [ 253.849551] gfs2: can't parse mount arguments [ 253.856941] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:55:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x6c00000000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200001, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000140)={0x101, 0xfff, 0x9, 0x57, 0x41002ba2, 0x10000, 0xffffffffffff96c0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) connect$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0x8, 0x3, 0x8001, 0x2, 0x193821f8, 0x2}, 0x3f}, 0xa) eventfd(0x0) sendmsg$nl_generic(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0xf50c}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000002700000000000000000000000000000083e691df2a05655888d83d7bea7cc394b5c5e30c20899698881df21b40b6891416558bf6bc10a36740d9cad6e8e867c16592208098cb9a0001a7b7b738e3b690b1e89a86f4ab162688877ecb9a89b084b875284a87bab337aa518aceef"], 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x0) 10:55:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x700, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x25}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5411, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:51 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8913, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 253.995429] gfs2: invalid mount option: locktable= [ 254.000462] gfs2: can't parse mount arguments [ 254.009632] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 254.027512] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:55:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8935, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 254.052651] gfs2: invalid mount option: locktable= [ 254.057687] gfs2: can't parse mount arguments 10:55:52 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB='\v\x00\x00\x00u\x00\x00@\x00\x00\x00'], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) connect$vsock_dgram(r1, &(0x7f0000000080)={0x28, 0x0, 0x2710, @my=0x0}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x18) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:55:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) flistxattr(r0, &(0x7f0000000000)=""/208, 0xd0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSBRK(r1, 0x5427) 10:55:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x16, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xfdffffff00000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r1 = syz_open_dev$mouse(&(0x7f0000003ec0)='/dev/input/mouse#\x00', 0x6, 0x181000) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000003f00)={0x7fffffff, 0x2, 0x76, 0x3}, 0x10) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 10:55:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc020660b, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:52 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8917, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x700000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891a, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5400, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 254.690617] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 254.698705] gfs2: invalid mount option: locktable= [ 254.703689] gfs2: can't parse mount arguments 10:55:52 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0x2dc) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000080)={{}, 0xfffffffffffffffd}) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000280)=0x1) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/33, 0x200000d7}], 0x1) 10:55:52 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8902, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:52 executing program 1: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0x13, &(0x7f0000000600), 0x4) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80, 0x100) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x40000000}) mkdirat(r1, &(0x7f0000000080)='./file0/file0\x00', 0x20) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f00000000c0)=""/207) 10:55:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x20000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 254.742058] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:55:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8917, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x9a020000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 254.838254] gfs2: invalid mount option: locktable= [ 254.843320] gfs2: can't parse mount arguments [ 254.939133] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 254.955363] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:55:53 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x200, 0x0) bind$bt_sco(r0, &(0x7f00000000c0)={0x1f, {0x1, 0x6, 0x5, 0x2, 0x80000001}}, 0x8) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r1, 0x2) socket$key(0xf, 0x3, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x101400, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x7, 0x7c0, [0x0, 0x20000380, 0x200005d0, 0x200007b8], 0x0, &(0x7f0000000100), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{{{0x1b, 0x40, 0x17, 'yam0\x00', 'veth0_to_team\x00', 'lo\x00', 'irlan0\x00', @local, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @random="650252007030", [0xff, 0xff, 0x6fceac4cc46bd30c, 0xff, 0xff, 0xff], 0xd0, 0xd0, 0x120, [@m802_3={'802_3\x00', 0x8, {{0x8e, 0x80, 0x2}}}, @connlabel={'connlabel\x00', 0x8, {{0x81, 0x1}}}]}}, @common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x150, 0x5}}}}, {{{0x3, 0x10, 0x11, 'bridge_slave_0\x00', 'teql0\x00', 'syzkaller0\x00', 'veth1_to_team\x00', @dev={[], 0x1f}, [0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x100}, [@common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffd}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{{{0x9, 0x10, 0x8808, 'bridge_slave_0\x00', 'veth0\x00', 'ip6_vti0\x00', 'team0\x00', @empty, [0x0, 0x0, 0xff, 0xff, 0xff], @remote, [0xff, 0x0, 0xff], 0x70, 0xe8, 0x118}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x80, 0x37, 0x4d, 0x0, 0x0, "65eea8872ac5514f7c563a5b4d6fcb3370db6e7b771c5276a270cd0e0804201a5327a8863ae66a1b9d3c049676ad5599c770f70c16c60dcc20e383e712ab3ac7"}}}]}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}, {{{0x5, 0x0, 0x15, 'yam0\x00', 'bridge_slave_1\x00', 'syzkaller0\x00', 'vcan0\x00', @broadcast, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], @random="b7c02f17373e", [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffc, 0x1, [{{{0x9, 0x1c, 0x805, 'irlan0\x00', 'bpq0\x00', 'vcan0\x00', 'team_slave_0\x00', @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], 0xe0, 0xe0, 0x110, [@time={'time\x00', 0x18, {{0x9, 0x5, 0x112b8, 0x9d4, 0x3, 0x3, 0x1}}}, @state={'state\x00', 0x8, {{0xfe}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x3}}}}]}, {0x0, '\x00', 0x5, 0xfffffffffffffffc, 0x2, [{{{0x9, 0xc, 0xd, 'bond_slave_0\x00', 'ip6tnl0\x00', 'ip6gre0\x00', 'sit0\x00', @dev={[], 0x18}, [0xff, 0x0, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], 0xb0, 0x118, 0x148, [@devgroup={'devgroup\x00', 0x18, {{0x1, 0xffffffffffffffd2, 0x8, 0x60, 0xee}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffd}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0xfffffffffffffff9}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}}, {{{0x3, 0x32, 0x88ff, 'ip_vti0\x00', 'ipddp0\x00', 'veth0_to_bond\x00', 'yam0\x00', @local, [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], 0xa0, 0xa0, 0xd0, [@cpu={'cpu\x00', 0x8}]}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}}]}]}, 0x838) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:55:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x6000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6401, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:53 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000005c0)="0a5cc80700315f85714070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r3 = dup3(r1, r2, 0x80000) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000600)=""/4096) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@dev, 0x5000000, 0x0, 0x2, 0x1, 0x52}, 0x20) 10:55:53 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8941, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) unshare(0x2000400) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='ip6tnl0\x00') write$evdev(r2, &(0x7f000004d000)=[{{}, 0x0, 0x10000001}, {{0x2}}], 0x30) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f00000002c0)=""/240) 10:55:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0xf0ffff}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8918, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xf200, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:53 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x541b, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 255.560113] gfs2: invalid mount option: locktable= [ 255.562436] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 255.565144] gfs2: can't parse mount arguments 10:55:53 executing program 4: mmap(&(0x7f0000013000/0x3000)=nil, 0x3000, 0x2000004, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) restart_syscall() ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) recvmmsg(0xffffffffffffffff, &(0x7f0000008500)=[{{&(0x7f0000000080)=@generic, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000300)=""/4096, 0x1000, 0x3}, 0x4}, {{&(0x7f0000001300)=@hci, 0x80, &(0x7f0000001780)=[{&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000001380)=""/126, 0x7e}, {&(0x7f0000003000)=""/4096, 0x1000}, {&(0x7f0000001400)=""/94, 0x5e}, {&(0x7f0000001480)=""/109, 0x6d}, {&(0x7f0000001500)=""/207, 0xcf}, {&(0x7f0000000240)=""/52, 0x34}, {&(0x7f0000001600)=""/155, 0x9b}, {&(0x7f00000016c0)=""/152, 0x98}], 0x9, 0x0, 0x0, 0x1}, 0x4}, {{&(0x7f0000001840)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001d00)=[{&(0x7f00000018c0)=""/199, 0xc7}, {&(0x7f00000019c0)=""/37, 0x25}, {&(0x7f0000004000)=""/4096, 0x1000}, {&(0x7f0000001a00)=""/105, 0x69}, {&(0x7f0000001a80)=""/160, 0xa0}, {&(0x7f0000001b40)=""/48, 0x30}, {&(0x7f0000001b80)=""/178, 0xb2}, {&(0x7f0000001c40)=""/186, 0xba}], 0x8, &(0x7f0000005000)=""/4096, 0x1000, 0xc45a}, 0x4}, {{&(0x7f0000001d80)=@ethernet={0x0, @random}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001e00)=""/76, 0x4c}, {&(0x7f0000001e80)=""/194, 0xc2}, {&(0x7f0000006000)=""/77, 0x4d}], 0x3, &(0x7f0000006080)=""/193, 0xc1, 0xffffffffffffffff}, 0x3}, {{&(0x7f0000006180)=@sco, 0x80, &(0x7f00000065c0)=[{&(0x7f0000006200)=""/135, 0x87}, {&(0x7f00000062c0)=""/147, 0x93}, {&(0x7f0000006380)=""/205, 0xcd}, {&(0x7f0000006480)=""/239, 0xef}, {&(0x7f0000006580)=""/50, 0x32}], 0x5, 0x0, 0x0, 0x5}, 0x1}, {{&(0x7f0000006640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000007a80)=[{&(0x7f00000066c0)=""/48, 0x30}, {&(0x7f0000006700)=""/129, 0x81}, {&(0x7f00000067c0)=""/213, 0xd5}, {&(0x7f00000068c0)=""/4096, 0x1000}, {&(0x7f00000078c0)=""/102, 0x66}, {&(0x7f0000007940)=""/130, 0x82}, {&(0x7f0000007a00)=""/28, 0x1c}, {&(0x7f0000007a40)=""/20, 0x14}], 0x8, &(0x7f0000007b00)=""/51, 0x33, 0x4}, 0x1}, {{&(0x7f0000007b40)=@ipx, 0x80, &(0x7f0000007cc0)=[{&(0x7f0000007bc0)=""/239, 0xef}], 0x1, &(0x7f0000007d00)=""/60, 0x3c, 0x3ff}, 0x100000001}, {{&(0x7f0000007d40)=@ipx, 0x80, &(0x7f0000008000)=[{&(0x7f0000007dc0)=""/158, 0x9e}, {&(0x7f0000007e80)=""/122, 0x7a}, {&(0x7f0000007f00)=""/185, 0xb9}, {&(0x7f0000007fc0)=""/23, 0x17}], 0x4, &(0x7f0000008040)=""/233, 0xe9, 0x7}, 0x9}, {{&(0x7f0000008140)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000084c0)=[{&(0x7f00000081c0)=""/197, 0xc5}, {&(0x7f00000082c0)=""/203, 0xcb}, {&(0x7f00000083c0)=""/13, 0xd}, {&(0x7f0000008400)=""/145, 0x91}], 0x4, 0x0, 0x0, 0xe2}, 0xffff}], 0x9, 0x102, &(0x7f0000008740)={0x77359400}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000008780)={0x0, 0x86, "727c68c88dd2114d6e94f252c6f994a56fbd55199d81e67e0b652cf6cfbf6e8b5db4390e5199f4cc0200515d58f3cb9cdfe591328ccf40541c076200f22345be173c40c2ca6ae5838c01cebacee643e59d342a903f78105440bfcc10a2783fa346756abc8d10318dbc9655d341073473320049d30b99af67ec988c2504c8faaedafcf290e389"}, &(0x7f0000008840)=0x8e) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000008880)={r3}, 0x8) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000002c0)) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0xbf0, &(0x7f0000000140)="fc328b5919bb8f3c8cab8654d7ba73943c7eb311aa41d2a1b7b622eb62165f81ca39f2ca6d0d547c9a0b29c7536a8bfcea1f660c69b1b9f07820643478ec0d91502523") setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000100)={0x100000001}, 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_FPU(r5, 0x81a0ae8c, &(0x7f00000088c0)) ioctl(r4, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$EVIOCGABS0(r6, 0x80184540, &(0x7f0000008c40)=""/240) close(r0) io_setup(0x80, &(0x7f0000008a80)=0x0) io_submit(r7, 0x1, &(0x7f0000008c00)=[&(0x7f0000008bc0)={0x0, 0x0, 0x0, 0x1, 0x6f, r2, &(0x7f0000008ac0)="2d5670a21240e8cad5b73bc52ecc8216cdb34e03786803e23e4382462158a2a07a05c6d33bb088e164fee32714516eaa52bc263d8b98cb00d1f985dba811d598c1b6fae293a2c4b77d574552e66c998822425642c24785b05bfd3b369cade68ff45e0e35ed1397e19e78578933d44e784a758758441360db09dc920b73bd22d7e4ce6ad8eef095212488512391516bde0917de3234d05e0dcc5ad0927fb65c55ad692cdc80be8f5078510146e2e88bdb448828c92e516e2ed9119b888eec30ae8c05bb2360e04b986c9017ac9c47c19f3cbf042eaa490bc8f012f68685dde6", 0xdf, 0x9a4, 0x0, 0x0, r6}]) 10:55:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0045878, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x1f00, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0xaa080000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 255.644312] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 255.661938] kernel msg: ebtables bug: please report to author: bad policy 10:55:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x541b, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x2, 0x403) ioctl(r1, 0x4147, &(0x7f0000001f64)) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000080)={0x0, 0x8}) socket$vsock_dgram(0x28, 0x2, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000100)=0x8, 0xb31ec18c99ff2000) [ 255.699247] gfs2: invalid mount option: locktable= [ 255.704328] gfs2: can't parse mount arguments [ 255.755334] gfs2: invalid mount option: locktable= [ 255.760366] gfs2: can't parse mount arguments 10:55:54 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) getpeername$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:55:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xd401, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:54 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8981, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:54 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x242002, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)="0047fc2f07d832") syz_emit_ethernet(0xfdef, &(0x7f00000000c0)=ANY=[@ANYBLOB="aadcd5063b54348180a847887a2787aaaaaaaaab9c0000000000bbfe800000000000000000000000a90d0043d4b8cf0000089078d1000000000000000000000000000000000000000000000000000000000000792f4fae8d472116c555f647e5c212cfe33a84bf751a8181c8a3b55b93839d61a422862091ea7cfb2bf943fd5ea3e474c6b40fa76ec56e504bca9e8ade6440386671f764ac8ee2fb84a739675c5d5d438e45135923633b06"], &(0x7f0000000040)) 10:55:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x6800000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:54 executing program 1: seccomp(0x1, 0x1, &(0x7f0000028ff0)={0x1, &(0x7f00000b3000)=[{0x6, 0x0, 0x0, 0x407ffffffd}]}) prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x3ff, 0x151000) timerfd_settime(r0, 0x0, &(0x7f0000000280)={{0x0, 0x1c9c380}}, &(0x7f00000002c0)) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x400000, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x400445a0, &(0x7f0000013000)) seccomp(0x1, 0x1, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)=0x5) 10:55:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8907, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 256.383193] kernel msg: ebtables bug: please report to author: bad policy 10:55:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a0, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x600000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xb400, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:54 executing program 4: r0 = socket(0x11, 0x8080a, 0x0) ioctl(r0, 0x800, &(0x7f00000000c0)="1ec5412ee41fbe04dd00c6292257b7e8c905df91f4fa74168adc7de4ef6d78e312cfceb15acd504b98fee02c826af3e591c2be5a16954b16b8d39f34b5a3223ec9b88db0bcee42da74e1135821968ac1b46d112ed65ac2be58eee8ea2685a745bf82ba6e1909ab25f0ed71b4d392ac2ca1e2edbd6c69311c76345e3a10a3accbf52fa0cd8d87624e165ec46beaddf1a03f6d81fc0eb9742819a8a75ea8da45babd02faf5a34886fca97e20c6d7731a") setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000180)={0x0, 0xa846, 0x400000000, 0x7ff}, 0x10) getpeername(r0, &(0x7f0000000000)=@nfc, &(0x7f0000000080)=0x80) [ 256.455297] gfs2: invalid mount option: locktable= [ 256.460310] gfs2: can't parse mount arguments [ 256.483935] gfs2: invalid mount option: locktable= [ 256.489010] gfs2: can't parse mount arguments 10:55:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0xc0045878, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x300000000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:54 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x4020940d, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f00000000c0)={0x8, 0x2, 0x6, 0xffff, 'syz0\x00', 0x2}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0x4090ae82, 0x0) [ 256.623149] gfs2: invalid mount option: locktable= [ 256.628188] gfs2: can't parse mount arguments [ 256.690872] gfs2: invalid mount option: locktable= [ 256.695883] gfs2: can't parse mount arguments 10:55:54 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:55:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0xffffff7f00000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xa500, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:54 executing program 4: r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x2, r0) fadvise64(r1, 0x0, 0x0, 0x0) 10:55:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8909, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:54 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8901, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x40000000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:54 executing program 1: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x300000000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x9effffff00000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:55 executing program 4: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) accept4$unix(r0, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e, 0x80000) write$sndseq(r0, &(0x7f0000011fd2), 0xffffffee) 10:55:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x2, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 257.331544] gfs2: invalid mount option: locktable= [ 257.336584] gfs2: can't parse mount arguments [ 257.347134] gfs2: invalid mount option: locktable= [ 257.352151] gfs2: can't parse mount arguments 10:55:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5301, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:55 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a0, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x3000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:55 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000080)={'dummy0\x00', 0xffff}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x101000) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000100)={0x5, [0x2, 0x7, 0x8000, 0x3, 0x1]}, &(0x7f0000000180)=0xe) ioctl(r1, 0x890f, &(0x7f0000000140)="025c3f0a00145f8f764070") r3 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r3, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "74b1ed68a0a140740f69e063d4ddb488b6ebd3eeacce2d0f354c4e3f4497ab2fc8336ed4a49bc70769d5e0995dba5fb83adab53b7eb54f19b88bd660b83e70"}, 0x60) sendto(r3, &(0x7f0000000880), 0x1100, 0x0, &(0x7f0000000980)=@generic={0x0, "a66d2f778928acc5a8b05325e393687c95d96f62ea5af4a35de490092874e6acdc68e956528d5a2d0c3b32339b8612072c93671cb02fa506e03a19ad2a2168dd50cf1b8c4c964bb7a51c2faa95ad257687c3be216c2a91079ce9b3b49a86c1810584dfbfba41c456e326ab405ae2407bc7bb3120aef746c519b491760a3a"}, 0x80) [ 257.398026] gfs2: invalid mount option: locktable= [ 257.403063] gfs2: can't parse mount arguments 10:55:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'team_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000004300)={&(0x7f0000000180), 0xc, &(0x7f00000042c0)={&(0x7f0000000b40)=@newlink={0x38, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4, 0x5}}}]}, 0x38}}, 0x0) 10:55:55 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x75, 0x800000}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f00000000c0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x6, 0x1000000000000) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x32166b) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:55:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x894c, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:55 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a1, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x68000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xc700, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000005c0)="0a5cc80700315f85714070") unshare(0x8020000) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/ipc\x00') shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) setns(r1, 0x0) 10:55:55 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/2, 0x2000, 0x1800}, 0x18) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x180000000) 10:55:55 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8915, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl(r1, 0x8911, &(0x7f0000000940)="4ade16e8dec8c61593faeb13e28494ed6e44ae16258f733400000fa02965b14d7efc4311ca75905d9862c5300238f75c39c3dfef4522963756fb56b12a83c8349c5208ec16b37d3cf2237aa77860ae8fa091e08f3bf45a2f4447a7a96750af995188baefcb6c633648b490336062a72b33c7c498c6a5a23dca2ba02bbd7ac20000000000") syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000380)=[@text32={0x20, &(0x7f00000002c0)="66baf80cb89da0118def66bafc0cb00fee660fd6c2eaa741f0fd5300f2650f013fb91f020000b800080000ba000000000f300f0fdf8af7ac2900680000b805000000b950e900000f01c166baf80cb8a64f098eef66bafc0c66ed66baf80cb849069e84ef66bafc0cb012ee", 0x6b}], 0x1, 0x0, &(0x7f00000002c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f00000001c0)="660f388059349ae3210000fc0066bad104b00ceef2660f01dff659d4660f38821bf436672620c0c4e178139beaf500002e0f01bb77740000", 0x38}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2040, 0x0) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000fe7000/0x4000)=nil, 0x4000}, 0x1}) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000003c0)={"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"}) setsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f00000000c0)=0x2, 0x4) 10:55:55 executing program 4: r0 = socket$inet6(0xa, 0x1004000000002, 0xfffffffffffffffe) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") r1 = shmget$private(0x0, 0x3000, 0x25, &(0x7f0000ffa000/0x3000)=nil) shmat(r1, &(0x7f0000ffa000/0x1000)=nil, 0x6000) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r2, 0x4c05, 0xffffffffffffffff) 10:55:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8913, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xf400, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x2500}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 258.191667] gfs2: invalid mount option: locktable= [ 258.196744] gfs2: can't parse mount arguments [ 258.214493] gfs2: invalid mount option: locktable= [ 258.219501] gfs2: can't parse mount arguments 10:55:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x6c00, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:55 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8916, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 258.316003] kvm: vcpu 0: requested 64 ns lapic timer period limited to 200000 ns [ 258.388968] gfs2: invalid mount option: locktable= [ 258.394073] gfs2: can't parse mount arguments [ 258.411726] kvm: vcpu 0: requested 2048 ns lapic timer period limited to 200000 ns 10:55:56 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f00000000c0)={0xfffffffffffffff9, 0x7f, 0xfa14, 0xffff}) 10:55:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0xaa08}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:56 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000004c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace(0x4211, r1) 10:55:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2500, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890f, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:56 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffd, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:56 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x891b, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:56 executing program 1: kexec_load(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000), 0x0, 0x0, 0xa000010000}], 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) signalfd4(r0, &(0x7f0000001240)={0x9}, 0x8, 0x80000) 10:55:56 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x1000, 0x800, 0x8, 0x8, 0xfffffffffffffff7, 0x2, 0x7c8, 0x4}, &(0x7f0000000080)={0xf7f, 0x5, 0xffffffffffff7fff, 0x4, 0x24000000000, 0x2}, &(0x7f00000000c0)={0x7, 0x0, 0x2, 0x8, 0xae61, 0xff, 0x0, 0x5}, &(0x7f0000000140)={r1, r2+30000000}, &(0x7f00000001c0)={&(0x7f0000000180)={0x1000}, 0x8}) unshare(0x2000400) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:55:56 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x4004) r1 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x7ff, 0x123081) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x2, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x100, 0x0) syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x8, 0x1) r3 = syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0xdf, 0x100) r4 = openat$cgroup_ro(r3, &(0x7f00000003c0)="637075616363ffffffff6167655f73797300", 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f0000000180)={'nat\x00'}, &(0x7f0000000200)=0x78) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000140)={0x6, 0x8}) clock_adjtime(0x0, &(0x7f0000000000)={0xfffffffffffffffb, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e3}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000240)=0x10004) [ 259.006823] validate_nla: 15 callbacks suppressed [ 259.006831] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 259.023219] gfs2: invalid mount option: locktable= [ 259.028279] gfs2: can't parse mount arguments 10:55:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5421, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xea01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 259.059358] gfs2: invalid mount option: locktable= [ 259.061687] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 259.064451] gfs2: can't parse mount arguments 10:55:57 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5450, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0xffffffc3}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x1000, 0x800, 0x8, 0x8, 0xfffffffffffffff7, 0x2, 0x7c8, 0x4}, &(0x7f0000000080)={0xf7f, 0x5, 0xffffffffffff7fff, 0x4, 0x24000000000, 0x2}, &(0x7f00000000c0)={0x7, 0x0, 0x2, 0x8, 0xae61, 0xff, 0x0, 0x5}, &(0x7f0000000140)={r1, r2+30000000}, &(0x7f00000001c0)={&(0x7f0000000180)={0x1000}, 0x8}) unshare(0x2000400) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:55:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x7a, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 259.219872] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 259.258106] gfs2: invalid mount option: locktable= [ 259.263182] gfs2: can't parse mount arguments [ 259.270209] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 259.297157] gfs2: invalid mount option: locktable= [ 259.302198] gfs2: can't parse mount arguments 10:55:59 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="a70000007588a40ee23b00"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x101000, 0x0) write$P9_RMKNOD(r2, &(0x7f00000000c0)={0x14, 0x13, 0x1, {0xc0, 0x2, 0x3}}, 0x14) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000140)={0x3, 0x2, 0x1, 0xffffffffffffff9c}) getsockopt$netlink(r2, 0x10e, 0xf, &(0x7f0000000380)=""/228, &(0x7f0000000100)=0xe4) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:55:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8941, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:59 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/tcp\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92b8669b38ccd6260857dbf5ae46354569636517b50f805ae208348d7e150abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fccbba36f0daa8e7d1c4c4cf144a23173b7605afb905426966c95982fb00", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) ftruncate(r0, 0x100000001) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x2001) bind$unix(r1, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) 10:55:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5201, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:55:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x1000, 0x800, 0x8, 0x8, 0xfffffffffffffff7, 0x2, 0x7c8, 0x4}, &(0x7f0000000080)={0xf7f, 0x5, 0xffffffffffff7fff, 0x4, 0x24000000000, 0x2}, &(0x7f00000000c0)={0x7, 0x0, 0x2, 0x8, 0xae61, 0xff, 0x0, 0x5}, &(0x7f0000000140)={r1, r2+30000000}, &(0x7f00000001c0)={&(0x7f0000000180)={0x1000}, 0x8}) unshare(0x2000400) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:55:59 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8904, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x7}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:59 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x4c, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:55:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8980, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x8501, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 259.863163] gfs2: invalid mount option: locktable= [ 259.868254] gfs2: can't parse mount arguments [ 259.868532] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:55:59 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890c, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:55:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x1000, 0x800, 0x8, 0x8, 0xfffffffffffffff7, 0x2, 0x7c8, 0x4}, &(0x7f0000000080)={0xf7f, 0x5, 0xffffffffffff7fff, 0x4, 0x24000000000, 0x2}, &(0x7f00000000c0)={0x7, 0x0, 0x2, 0x8, 0xae61, 0xff, 0x0, 0x5}, &(0x7f0000000140)={r1, r2+30000000}, &(0x7f00000001c0)={&(0x7f0000000180)={0x1000}, 0x8}) unshare(0x2000400) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:55:59 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) syz_open_procfs(r0, &(0x7f00000001c0)='net/ip_vs\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/sctp\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x152, r1, 0x0) 10:55:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x1000, 0x800, 0x8, 0x8, 0xfffffffffffffff7, 0x2, 0x7c8, 0x4}, &(0x7f0000000080)={0xf7f, 0x5, 0xffffffffffff7fff, 0x4, 0x24000000000, 0x2}, &(0x7f00000000c0)={0x7, 0x0, 0x2, 0x8, 0xae61, 0xff, 0x0, 0x5}, &(0x7f0000000140)={r1, r2+30000000}, &(0x7f00000001c0)={&(0x7f0000000180)={0x1000}, 0x8}) unshare(0x2000400) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 259.945101] gfs2: invalid mount option: locktable= [ 259.950125] gfs2: can't parse mount arguments [ 259.967946] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:55:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x8aa}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:55:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x8600, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 260.074025] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 260.117025] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:00 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x4, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8906, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:00 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8955, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:00 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xf008000000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) 10:56:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x1000, 0x800, 0x8, 0x8, 0xfffffffffffffff7, 0x2, 0x7c8, 0x4}, &(0x7f0000000080)={0xf7f, 0x5, 0xffffffffffff7fff, 0x4, 0x24000000000, 0x2}, &(0x7f00000000c0)={0x7, 0x0, 0x2, 0x8, 0xae61, 0xff, 0x0, 0x5}, &(0x7f0000000140)={r1, r2+30000000}, &(0x7f00000001c0)={&(0x7f0000000180)={0x1000}, 0x8}) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x8901, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x4800000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x1000, 0x800, 0x8, 0x8, 0xfffffffffffffff7, 0x2, 0x7c8, 0x4}, &(0x7f0000000080)={0xf7f, 0x5, 0xffffffffffff7fff, 0x4, 0x24000000000, 0x2}, &(0x7f00000000c0)={0x7, 0x0, 0x2, 0x8, 0xae61, 0xff, 0x0, 0x5}, &(0x7f0000000140)={r1, r2+30000000}, &(0x7f00000001c0)={&(0x7f0000000180)={0x1000}, 0x8}) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 260.752736] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 260.775610] gfs2: invalid mount option: locktable= [ 260.780773] gfs2: can't parse mount arguments 10:56:00 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x40049409, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xda00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8903, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 260.800427] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0x1000, 0x800, 0x8, 0x8, 0xfffffffffffffff7, 0x2, 0x7c8, 0x4}, &(0x7f0000000080)={0xf7f, 0x5, 0xffffffffffff7fff, 0x4, 0x24000000000, 0x2}, &(0x7f00000000c0)={0x7, 0x0, 0x2, 0x8, 0xae61, 0xff, 0x0, 0x5}, &(0x7f0000000140)={r1, r2+30000000}, &(0x7f00000001c0)={&(0x7f0000000180)={0x1000}, 0x8}) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:00 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4, &(0x7f0000000540)="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") syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="000000000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 10:56:00 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xffffff7f, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x60000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 260.910242] loop4: p1 < > p4 [ 260.913418] loop4: partition table partially beyond EOD, truncated [ 260.919276] gfs2: invalid mount option: locktable= [ 260.924741] gfs2: can't parse mount arguments [ 260.959575] gfs2: invalid mount option: locktable= [ 260.964597] gfs2: can't parse mount arguments [ 260.982332] loop4: p1 size 2 extends beyond EOD, truncated [ 260.994993] loop4: p4 start 1854537728 is beyond EOD, truncated [ 261.028521] loop4: p1 < > p4 [ 261.031726] loop4: partition table partially beyond EOD, truncated [ 261.045416] loop4: p1 size 2 extends beyond EOD, truncated [ 261.053621] loop4: p4 start 1854537728 is beyond EOD, truncated 10:56:01 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100)={0x10000, 0x100000001, 0x5, 0xffffffffffffff80, 0x3, 0x20, 0x2, 0x200, 0x10001, 0x2, 0x4}, 0xb) recvmmsg(0xffffffffffffffff, &(0x7f0000002780), 0x800030d, 0x0, &(0x7f0000002840)={0x0, 0x1c9c380}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000180)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100]}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000140)={0x0, 0x100000}) ioctl$KVM_NMI(r3, 0xae9a) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6a00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:01 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'\nridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") clock_gettime(0x0, &(0x7f0000000100)) unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8948, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x68000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:01 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x3000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:01 executing program 4: r0 = bpf$MAP_CREATE(0x4, &(0x7f0000000280), 0x13) prctl$getname(0x10, &(0x7f0000000000)=""/130) preadv(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/71, 0x47}], 0x1, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x200000, 0x0) ioctl$KDENABIO(r1, 0x4b36) 10:56:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x3901, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:01 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x0, &(0x7f0000000280)="025c5f8f74207000000000") r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000003a80)=0x3) ioctl$KVM_RUN(r4, 0x8004ae98, 0xa07000) [ 261.616992] gfs2: invalid mount option: locktable= [ 261.622042] gfs2: can't parse mount arguments 10:56:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2c01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890a, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x6c00}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:01 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:01 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'b\nidge_slave_0\x00', 0x2000000c0ffffff}) 10:56:02 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000075000000000000a76da65bba989472536009b0f952d9f5f3f3ae2ba52d9e74f036a75d33c1dad175f032856bee421516439fb85dfd432243e1eb58fbba770eb26e74c1aa544bc51858da713e8abf1c6918d22e98bba7d45c4b47f676c63dbea68d035a84ea38af1844c4ebc5bdbf54ba613c1de9747b13960a7d9221866215f564996f46976b1a557121a7c9a53f7f1c9e49ed8756247dca8299586e"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000018c0)=[@cswp={0x58, 0x114, 0x3, {{}, &(0x7f0000001780), &(0x7f00000017c0)}}], 0x58}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r3 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r3, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000140)={0x1, 0x8004, 0xe3a, 0xffffffff, r2}, 0x10) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x80001, 0x123) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f00000002c0)) recvmmsg(r1, &(0x7f0000002f80)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000380)=""/216, 0xd8}, {&(0x7f0000000480)=""/218, 0xda}], 0x2, &(0x7f00000005c0)=""/226, 0xe2, 0x400}, 0x3}, {{&(0x7f00000006c0)=@can, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000001940)=""/239, 0xef}, {&(0x7f0000001740)=""/7, 0x7}, {&(0x7f0000001f80)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/211, 0xd3}, {&(0x7f0000001800)}, {&(0x7f0000001840)=""/84, 0x54}, {&(0x7f0000001b40)=""/3, 0x3}, {&(0x7f0000001b80)=""/37, 0x25}], 0x9, 0x0, 0x0, 0x6a}, 0x6}, {{&(0x7f0000001c80)=@alg, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001d00)=""/19, 0x13}, {&(0x7f0000001d40)=""/85, 0x55}, {&(0x7f0000001dc0)=""/96, 0x60}], 0x3, &(0x7f0000001e80)=""/123, 0x7b, 0x3}, 0x6}], 0x3, 0x40000020, &(0x7f0000001f00)) 10:56:02 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xf0080000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x890e, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x9b01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:02 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101000, 0x0) r1 = accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x80000) getpid() r2 = getpgrp(0xffffffffffffffff) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000240)={0x8133, 0x9, 0x7, 0x7, 0xc22, 0x1f, 0x8, 0x1, 0x2}) r3 = syz_open_procfs(r2, &(0x7f00000003c0)="6e7574000d0000f7ffffff029bd9b167dc6ee13dd0975764ac857dca44a75fdda138097b61d345087ab7febe72b76da95c31") ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1, r3}) poll(&(0x7f0000000140)=[{r3, 0x80}], 0x1, 0xfffffffffffff000) getsockopt$inet6_int(r3, 0x29, 0xce, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r4 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0xb) r5 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7, 0x668000) ioctl$SNDRV_TIMER_IOCTL_START(r5, 0x54a0) 10:56:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x4c}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:02 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:02 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'b%idge_slave_0\x00', 0x2000000c0ffffff}) 10:56:02 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x200000000000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 262.437258] gfs2: invalid mount option: locktable= [ 262.442271] gfs2: can't parse mount arguments [ 262.463795] gfs2: invalid mount option: locktable= [ 262.468852] gfs2: can't parse mount arguments 10:56:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89a1, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6a01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:02 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x48000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:02 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'br%dge_slave_0\x00', 0x2000000c0ffffff}) 10:56:02 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0xf0ffffffffffff}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 262.634641] gfs2: invalid mount option: locktable= [ 262.639707] gfs2: can't parse mount arguments [ 262.691869] gfs2: invalid mount option: locktable= [ 262.696962] gfs2: can't parse mount arguments 10:56:02 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000075000000000000c8d95a71f7ab155c81f043c6a55c4959a235a7a80275d682ad4f3f4aebcf7eae999c54ae2ad3ad296f829fcc00debeeec96c3ea27850c4c4c9ed7219403bdcf1b4c6bfc5f30f831c37832631d58811db48a303800a1133ac1792b7aa650e9630b4fff2fb2f6a82c9631b3c2741a5bd4307bf41b1c3d30b76a3f6881a7ec3f0fcbc8cacba9268af734f0203e96eaa27582a37122c48a0bdfc9ba5555e9d6d907be42c2ab73267ee0f"], 0xb) r0 = socket$inet6(0xa, 0x204, 0x7f7fc) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000002c0)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000280)=0x3c9, 0x4) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080), 0xffc7) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x40049409, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xe101, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:02 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x48000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:02 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x4c000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:02 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'br\ndge_slave_0\x00', 0x2000000c0ffffff}) 10:56:02 executing program 4: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x1d, r1) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) keyctl$search(0xa, r1, &(0x7f0000000000)='logon\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, r1) 10:56:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2d01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x5450, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x6c000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:03 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 263.298580] gfs2: invalid mount option: locktable= [ 263.303681] gfs2: can't parse mount arguments [ 263.329013] gfs2: invalid mount option: locktable= [ 263.334037] gfs2: can't parse mount arguments 10:56:03 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="0b009e79b02f8f250d98"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x4}, 0xb) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7fffffff, 0x20000) ioctl$EVIOCSKEYCODE(r3, 0x40084504, &(0x7f0000000100)=[0x5, 0x800]) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000380)={0x5, 0x800, 0x0, 0x8, 0xbc}, 0x14) tkill(r2, 0x3b) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:03 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x3f00, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:03 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xffffffffffffffff) tee(r0, r1, 0x7, 0x0) 10:56:03 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bri\nge_slave_0\x00', 0x2000000c0ffffff}) 10:56:03 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="0000060000000000010100") r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200000002) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') sendfile(r1, r2, &(0x7f0000000040), 0x10000000000441) poll(&(0x7f0000000000)=[{r1}, {r1}, {r1}], 0x3, 0x0) 10:56:03 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'\nridge_slave_0\x00', 0x2000000c0ffffff}) [ 263.492344] gfs2: invalid mount option: locktable= [ 263.497395] gfs2: can't parse mount arguments 10:56:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x700}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xad01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) write$binfmt_script(r1, &(0x7f0000000180)={'#! ', './file0'}, 0xb) writev(r0, &(0x7f0000000040), 0xfffffffffffff5d) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0xffffffffffffff83, 0x8001, 0xc, 0x7, 0x7fff, 0x47, 0x7, 0x7, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000140)={r3, 0xb024, 0x4, [0xfffffffffffffffb, 0x100, 0x8, 0x8001]}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e23, 0x1, @local}}, 0x8000, 0x5, 0x8, 0x8, 0x1}, &(0x7f0000000100)=0x98) 10:56:03 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 263.586834] gfs2: invalid mount option: locktable= [ 263.591881] gfs2: can't parse mount arguments 10:56:03 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bri%ge_slave_0\x00', 0x2000000c0ffffff}) 10:56:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0xf00}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:03 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xfffffff6, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xb501, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:03 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18}, 0x18) r2 = request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000140)='/dev/cuse\x00', 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000300)="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", 0x1000, 0xfffffffffffffffd) fstat(r1, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000280), &(0x7f0000001380), &(0x7f00000013c0)=0x0) lstat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x6, &(0x7f0000001640)=[r4, r5, r6, r7, r8, r9]) r10 = creat(&(0x7f0000001680)='./file0\x00', 0x0) ioctl$KVM_SET_IRQCHIP(r10, 0x8208ae63, &(0x7f00000016c0)={0x0, 0x0, @ioapic={0x106004, 0x7, 0x9, 0x9, 0x0, [{0x4, 0xdf, 0x6, [], 0x6}, {0x200, 0x100000000, 0x2, [], 0x80}, {0x0, 0x9, 0x421ce9d, [], 0x4}, {0x5, 0x2, 0x8, [], 0x8000}, {0x800, 0x0, 0xffffffff, [], 0x6}, {0x4850, 0x8, 0x8000, [], 0x9}, {0x9, 0x10001, 0x4, [], 0x6}, {0x1, 0x2, 0x7, [], 0xa1cd739}, {0x3, 0x7, 0x8000000000000000, [], 0xeb}, {0x7ff, 0x2, 0x41d, [], 0x20}, {0x0, 0x4, 0xe0000000000, [], 0x1}, {0x5, 0x100, 0x0, [], 0x1}, {0xc82, 0x1, 0x5, [], 0x7}, {0x4, 0x7, 0xfff, [], 0x2e}, {0x4, 0x6, 0x3, [], 0x200}, {0x4, 0x8, 0x5, [], 0x3}, {0x7, 0x4, 0x7, [], 0xf9c6bbc}, {0x8, 0x4d, 0x5cb, [], 0x1}, {0x56, 0x101, 0x6, [], 0x80}, {0x9, 0x80000000, 0x3, [], 0x800}, {0x3, 0xffffffffffffffbf, 0x4}, {0x7, 0x3f, 0x0, [], 0x1}, {0x7, 0xffffffffffffffff, 0x4, [], 0x2}, {0xffffffffffffff81, 0x5, 0x3, [], 0x5}]}}) keyctl$reject(0x13, r2, 0x100, 0x500, r3) [ 263.766986] gfs2: invalid mount option: locktable= [ 263.772095] gfs2: can't parse mount arguments [ 263.806892] gfs2: invalid mount option: locktable= [ 263.811920] gfs2: can't parse mount arguments 10:56:03 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'b\nidge_slave_0\x00', 0x2000000c0ffffff}) 10:56:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0x7, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5a01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:03 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18}, 0x18) r2 = request_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000140)='/dev/cuse\x00', 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000300)="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", 0x1000, 0xfffffffffffffffd) fstat(r1, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000280), &(0x7f0000001380), &(0x7f00000013c0)=0x0) lstat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x6, &(0x7f0000001640)=[r4, r5, r6, r7, r8, r9]) r10 = creat(&(0x7f0000001680)='./file0\x00', 0x0) ioctl$KVM_SET_IRQCHIP(r10, 0x8208ae63, &(0x7f00000016c0)={0x0, 0x0, @ioapic={0x106004, 0x7, 0x9, 0x9, 0x0, [{0x4, 0xdf, 0x6, [], 0x6}, {0x200, 0x100000000, 0x2, [], 0x80}, {0x0, 0x9, 0x421ce9d, [], 0x4}, {0x5, 0x2, 0x8, [], 0x8000}, {0x800, 0x0, 0xffffffff, [], 0x6}, {0x4850, 0x8, 0x8000, [], 0x9}, {0x9, 0x10001, 0x4, [], 0x6}, {0x1, 0x2, 0x7, [], 0xa1cd739}, {0x3, 0x7, 0x8000000000000000, [], 0xeb}, {0x7ff, 0x2, 0x41d, [], 0x20}, {0x0, 0x4, 0xe0000000000, [], 0x1}, {0x5, 0x100, 0x0, [], 0x1}, {0xc82, 0x1, 0x5, [], 0x7}, {0x4, 0x7, 0xfff, [], 0x2e}, {0x4, 0x6, 0x3, [], 0x200}, {0x4, 0x8, 0x5, [], 0x3}, {0x7, 0x4, 0x7, [], 0xf9c6bbc}, {0x8, 0x4d, 0x5cb, [], 0x1}, {0x56, 0x101, 0x6, [], 0x80}, {0x9, 0x80000000, 0x3, [], 0x800}, {0x3, 0xffffffffffffffbf, 0x4}, {0x7, 0x3f, 0x0, [], 0x1}, {0x7, 0xffffffffffffffff, 0x4, [], 0x2}, {0xffffffffffffff81, 0x5, 0x3, [], 0x5}]}}) keyctl$reject(0x13, r2, 0x100, 0x500, r3) 10:56:03 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'brid\ne_slave_0\x00', 0x2000000c0ffffff}) 10:56:03 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) fsync(r0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) 10:56:03 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x60, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:03 executing program 4: r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xadd, 0x201) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040)=0x6, 0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000000c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x10) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000380)={"6ad306a3c545e561ba44d1525415f273b8cc626bee3e792739bb23b1fe17fd6dfbd62f1bd24dd906fa2722cc8e4a41462b3ad5daf2ff1afd7ff36f168b4971a57e681a5db5c5cd2493b1c5ef5d6e15f99d9ddd40597da1a545a505dace527c51d8e21e63eea59ebfc53470fad7832c0c425ff5311e62d903a7c4116e144b532a4fca1c9efbecf7e6dd15f802d620cb9c1777c22aa44b036676b656ecb0250513ba5c38fe9ae83bd0f0d091af4d822d13c2780793b2b73f2deb601c852e279f66313b813a363ca3ff93466e345bc61237dda6aefa77a863b6dc85afdc8b9797aa057c34d92f8a51d24c365590efb68fe91eba935411d732be96d306b0e7c2544416c238aa4d4515dc9b3ea771e2436382b302a800356d2f4e29052d3bcf07d54f7b9fcf9c97bc677f27743bb81c0309735ba18649d052b09f171aec53f7dd0582bc0763477ae541dfb7db285a9a5a2f9b6623cd526fed3b86406b16b50aab067dc5636b87f87d4e84125059f8cb54deedb5adab5985d888bcece68d987912982c9f7ce7e8ef79f652bfd4c213d94b8aa7299efde3bd59d26c1c09dd892a3b9e00c723ccc751ae26db6f387b0b86e31cd6e092278b837b6f3ea41fbe0397350023c37fe6ea0cdca983173cc56bba836510d06fc8f4001de3ef9e60475f217dbb5f0bed5d0bb5398c358a3645ccc495a5be7a61c1665d19f2fc1f34de9da3b827d528391b2361ace6e6e26c2b984ea396af3b57ea762379294ae1c5e317c323eb868c1f0a7dd87e4ffa6793fba493995c1f746b98c9ef64798da668f3d79cc795a449aa47a8007db58bb0c39235be3311470261b37f7deecce966998d7274e650996e6dc69298544ef5cb11be6acafd1fbf4a27ce59c571a4883f3501580fc8c2dac3e5c87da75edf82e30fb21be3ba59c3667557dae70a7775452eeb4e5d4bf1080f43fbb3a88a7e661de1f93bf83f353c9da4632645f3546c8075124a5e0334f4b8fff61631223b347215199687c4414383b9b0054de6e0504829aadab70daeb5daed0dc4e0f803c00597631d80ec19d3d6ce180256b89f03ece022f6f1caa9601bb2605c4f99e9e3cdb1e32b1fd0cbe94d30cccedba0dad147fef15abfed0ac8eabd9121b3c779bd904ffa3eded55ac82c3a1a81253b342b7f176f863b2a44619ca945c8544036c5c3fcf8e38e2bb0b45fdcff587f323c4c5fb77379f71278280a3a0c00c592cb67280e0a6fb6d768049c176dfb00c7a378fbf84c8e72a04c9b5f19c466162df0ccfc7bee1e5b193c1d7c4a2e98d058fef69dd062a9f9e83d15cbcabdd1bf28e92e506e8885a98ce6582cdd966ba0e411bed2339603e7febdfaa0082c5ba3947866bcda6ddd9f3df0eaa164597befb9de281affae93a81ff0e1c06aa1a07e44389f250b3d842641b5d753d8d0cb1eb3651fcae3208d581fede1"}) ioctl(r1, 0x3, &(0x7f0000000780)="8af3433ee3d8bed88e028cb57b6020f48f69341bd8ab8424f20e0c6aacdd25feda37b3b1923f96b6171dd7af1bbc9a3466b58a45cfbbb270be62c5e3341ce1e9bec25d10a2e1463c56faa2999b9bb500d9ed7b00600565191eb88a4fc11d8dc2b37ff5b12f7aeeddac2d0b26cd93a15ef424a79445794fc10a0bf69de027cec0c106f7e2b3ca90bb9734ef538ae5f1be86c8c3f22e1686e3aeb92f0521dd0a303f") setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000280), 0xc5) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f00000001c0)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000140)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7d8a295b90bf9cc8578ec03a10c48d102000000000000d293660848", 0x48}], 0x1}, 0x0) 10:56:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc68, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x4700, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 264.278487] gfs2: invalid mount option: locktable= [ 264.283555] gfs2: can't parse mount arguments 10:56:04 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'b%idge_slave_0\x00', 0x2000000c0ffffff}) [ 264.342002] gfs2: invalid mount option: locktable= [ 264.347012] gfs2: can't parse mount arguments [ 264.379356] validate_nla: 20 callbacks suppressed [ 264.379365] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:04 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x48, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1301, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:04 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) ioctl$KVM_GET_REG_LIST(r0, 0x800452d2, &(0x7f0000000000)=ANY=[@ANYBLOB="2ebfee0000000000000000"]) 10:56:04 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:04 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridg\n_slave_0\x00', 0x2000000c0ffffff}) 10:56:04 executing program 4: 10:56:04 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 264.485475] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 264.501748] gfs2: invalid mount option: locktable= [ 264.506866] gfs2: can't parse mount arguments 10:56:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xb, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1800, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 264.579404] gfs2: invalid mount option: locktable= [ 264.584462] gfs2: can't parse mount arguments 10:56:04 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) setsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000080)=0x1f, 0x4) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'br\ndge_slave_0\x00', 0x2000000c0ffffff}) 10:56:04 executing program 4: 10:56:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0x10, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:04 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x6800, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x3c00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:04 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridg%_slave_0\x00', 0x2000000c0ffffff}) 10:56:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1901, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:04 executing program 4: [ 265.144105] gfs2: invalid mount option: locktable= [ 265.149142] gfs2: can't parse mount arguments 10:56:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc40, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bri\nge_slave_0\x00', 0x2000000c0ffffff}) 10:56:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x4000, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:04 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:04 executing program 4: [ 265.247109] gfs2: invalid mount option: locktable= [ 265.252140] gfs2: can't parse mount arguments [ 265.265918] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 265.325369] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:05 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x100, 0x0) write$P9_RREAD(r0, &(0x7f00000002c0)=ANY=[], 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r1, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) ioctl$KDSKBLED(r0, 0x4b65, 0x9) r3 = dup(r1) ioctl$TIOCCONS(r3, 0x541d) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000280)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:05 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge\nslave_0\x00', 0x2000000c0ffffff}) 10:56:05 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xedc000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xa600, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:05 executing program 4: 10:56:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xdb8, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bri%ge_slave_0\x00', 0x2000000c0ffffff}) 10:56:05 executing program 4: [ 266.023545] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 266.036357] gfs2: invalid mount option: locktable= [ 266.041400] gfs2: can't parse mount arguments [ 266.055632] gfs2: invalid mount option: locktable= [ 266.060658] gfs2: can't parse mount arguments 10:56:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xf001, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:05 executing program 4: 10:56:05 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x500000000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:05 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 266.075503] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:05 executing program 4: 10:56:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0x3, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'brid\ne_slave_0\x00', 0x2000000c0ffffff}) [ 266.164021] gfs2: invalid mount option: locktable= [ 266.169034] gfs2: can't parse mount arguments [ 266.256650] gfs2: invalid mount option: locktable= [ 266.261675] gfs2: can't parse mount arguments 10:56:06 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:06 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge%slave_0\x00', 0x2000000c0ffffff}) 10:56:06 executing program 4: 10:56:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xdb00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xe14, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:06 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x1f00000000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridg\n_slave_0\x00', 0x2000000c0ffffff}) 10:56:06 executing program 4: 10:56:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:06 executing program 4: [ 266.944867] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 266.957280] gfs2: invalid mount option: locktable= [ 266.962274] gfs2: can't parse mount arguments 10:56:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x7100, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0x2000, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 267.008408] gfs2: invalid mount option: locktable= [ 267.013445] gfs2: can't parse mount arguments 10:56:06 executing program 4: 10:56:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridg%_slave_0\x00', 0x2000000c0ffffff}) [ 267.123236] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 267.174560] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:07 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:07 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_#lave_0\x00', 0x2000000c0ffffff}) 10:56:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:07 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xfcfdffff, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xcc01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000040)=ANY=[]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4090ae82, &(0x7f00000001c0)={0x2, 0x0, [0x48d]}) 10:56:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0x20000b4c, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge\nslave_0\x00', 0x2000000c0ffffff}) 10:56:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xd600, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f76") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 267.780432] gfs2: invalid mount option: locktable= [ 267.785482] gfs2: can't parse mount arguments [ 267.794811] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 267.806184] gfs2: invalid mount option: locktable= [ 267.811191] gfs2: can't parse mount arguments 10:56:07 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x5000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:07 executing program 4: futex(&(0x7f0000000180), 0x1, 0x0, &(0x7f00000001c0)={0x77359400}, &(0x7f0000048000)=0x40000000000, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000140)="c8a8707470", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000080)="16", 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000100), 0xffffffff) iopl(0x8) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) connect$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x7, 0x3, 0xffff, 0x4, 0x73, 0x80000000}, 0xfff}, 0xa) sendfile(r0, r0, &(0x7f0000000240), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) 10:56:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f76") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xf01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:07 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_-lave_0\x00', 0x2000000c0ffffff}) [ 267.957728] gfs2: invalid mount option: locktable= [ 267.962875] gfs2: can't parse mount arguments [ 268.033430] gfs2: invalid mount option: locktable= [ 268.038517] gfs2: can't parse mount arguments [ 268.053656] print_req_error: I/O error, dev loop0, sector 640 [ 268.059047] print_req_error: I/O error, dev loop0, sector 1280 10:56:08 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB='\v\n\x00\x00u\x00\x00\x00\x00\x00\x00'], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x4, 0x40000) ioctl$KDDELIO(r1, 0x4b35, 0x5) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x20800) ioctl$TIOCSBRK(r2, 0x5427) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x400, 0x8, 0xea, 0x1ff, 0x5, 0xffff, 0x7, 0x27, 0x86f4, 0x3, 0x9}, 0xb) r3 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) rt_sigreturn() recvfrom$packet(r3, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) prctl$setendian(0x14, 0x2) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) connect$vsock_stream(r1, &(0x7f0000000140)={0x28, 0x0, 0x0, @reserved}, 0x10) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) socket$vsock_stream(0x28, 0x1, 0x0) 10:56:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0x51, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_0lave_0\x00', 0x2000000c0ffffff}) 10:56:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f76") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1001, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:08 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:08 executing program 4: exit(0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) write$P9_ROPEN(r0, &(0x7f0000000000)={0x18, 0x71, 0x1, {{0x1, 0x2, 0x2}, 0x9}}, 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x2, 0x3) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) move_pages(0x0, 0x191, &(0x7f0000000040)=[&(0x7f0000fff000/0x1000)=nil], &(0x7f0000000180), &(0x7f00000001c0), 0x0) ptrace(0xffffffffffffffff, 0x0) 10:56:08 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_.lave_0\x00', 0x2000000c0ffffff}) 10:56:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f7640") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xfd00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_clave_0\x00', 0x2000000c0ffffff}) [ 268.690075] gfs2: invalid mount option: locktable= [ 268.695117] gfs2: can't parse mount arguments 10:56:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc74, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f7640") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:08 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="bbe2e33f56bf11ce5b7f"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:08 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_Xlave_0\x00', 0x2000000c0ffffff}) 10:56:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xf301, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 268.816280] gfs2: invalid mount option: locktable= [ 268.821311] gfs2: can't parse mount arguments 10:56:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xdc4, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f7640") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:08 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xfffffdfc, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_ulave_0\x00', 0x2000000c0ffffff}) 10:56:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x7c00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 268.975525] gfs2: invalid mount option: locktable= [ 268.980543] gfs2: can't parse mount arguments 10:56:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x13) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f0000024000), 0xc, &(0x7f0000023ff0)={&(0x7f0000000240)={0x18, 0x30, 0xaff, 0x0, 0x0, {0x3}, [@nested={0x4}]}, 0x18}}, 0x0) 10:56:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0x25, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xf800, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:09 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_xlave_0\x00', 0x2000000c0ffffff}) 10:56:09 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xffffff7f00000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_ilave_0\x00', 0x2000000c0ffffff}) 10:56:09 executing program 4: r0 = socket$nl_generic(0xa, 0x5, 0x84) r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)={0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000200)={0x10, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="fb78583d0d2b517b57f9a4bee464000000000000000000000000000000", @ANYRES64=r2], 0x81, 0x0, &(0x7f0000000140)="ae7b40217a7dd90a6b2f5c6a4bc036f301567f932dd2e1b596a51d62c81c716152d243652da9fc3356323b7a83800ece8af33a5ed24e97d4d5fec26b33ee70f66266d5d51c1e10024da11d20e7d57820bd1418338bdc8d96e27f94fefe03b259d7c4d9929976157a8b17af2114e804b194230aec56970226b57076a2b2ba2c5c67"}) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x12, 0x0, 0x707000, 0x0, 0x0, 0x0, 0x2}}) socket$nl_crypto(0x10, 0x3, 0x15) 10:56:09 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000100)) recvmmsg(r0, &(0x7f0000001900)=[{{&(0x7f0000000280)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000380)=""/4096, 0x1000}], 0x1, &(0x7f0000001380)=""/123, 0x7b, 0xd9f}, 0x8}, {{&(0x7f0000001400)=@sco, 0x80, &(0x7f0000001840)=[{&(0x7f0000001480)=""/122, 0x7a}, {&(0x7f0000001500)=""/255, 0xff}, {&(0x7f0000001600)=""/145, 0x91}, {&(0x7f00000016c0)=""/121, 0x79}, {&(0x7f0000001740)=""/18, 0x12}, {&(0x7f0000001780)=""/149, 0x95}], 0x6, &(0x7f00000018c0)=""/16, 0x10, 0x10001}, 0xfffffffffffffff8}], 0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r1, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r3 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r3, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001980)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000080)={0xab, 0x0, 0x2, 0x3, 0x8000, 0x8, 0x6, 0xfffffffffffff53e, r2}, &(0x7f00000000c0)=0x20) 10:56:09 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 269.629644] validate_nla: 5 callbacks suppressed [ 269.629653] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 269.650133] gfs2: invalid mount option: locktable= [ 269.654936] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 269.655130] gfs2: can't parse mount arguments 10:56:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0x3e0, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xbb01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 269.716543] binder: 22578:22580 unknown command 1029208315 [ 269.744060] binder: 22578:22580 ioctl c0306201 20000200 returned -22 [ 269.771160] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 269.784526] binder: 22578:22588 unknown command 1029208315 [ 269.793289] gfs2: invalid mount option: locktable= [ 269.794320] binder: 22578:22588 ioctl c0306201 20000200 returned -22 [ 269.798265] gfs2: can't parse mount arguments [ 269.810622] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x9e01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_+lave_0\x00', 0x2000000c0ffffff}) 10:56:09 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_ilave_0\x00', 0x2000000c0ffffff}) [ 269.823893] gfs2: invalid mount option: locktable= [ 269.828938] gfs2: can't parse mount arguments 10:56:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0x24, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:09 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl(r0, 0x8912, &(0x7f00000005c0)="0a5cc80700315f85714070") ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000000)) socket$pppoe(0x18, 0x1, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x3, 0x500) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f00000000c0)=0x9) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000100)=0x1, 0x4) r3 = fcntl$getown(r1, 0x9) ptrace$getsig(0x4202, r3, 0x7f, &(0x7f0000000040)) 10:56:09 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xf008, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000040), 0x4) 10:56:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xac01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:09 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x1000000100002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000180)="025c3f0a00145f8f764070") r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x20) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000000c0)=0x2) socket$netlink(0x10, 0x3, 0x1f) mount(&(0x7f0000434ff8)='./file0\x00', &(0x7f0000abf000)='./file0\x00', &(0x7f0000f4c000)='jfs\x00', 0x1023402, 0x0) sysfs$2(0x2, 0x40, &(0x7f0000000000)=""/121) dup2(r2, r1) [ 269.979264] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xd300, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 270.022911] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 270.023962] gfs2: invalid mount option: locktable= [ 270.035241] gfs2: can't parse mount arguments [ 270.120298] gfs2: invalid mount option: locktable= [ 270.125413] gfs2: can't parse mount arguments 10:56:10 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'team_slave_0\x00', {0x2, 0x4e20, @remote}}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_dlave_0\x00', 0x2000000c0ffffff}) 10:56:10 executing program 1 (fault-call:4 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:10 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f0, &(0x7f0000000300)='gre0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000300)='gre0\x00') r4 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') accept4$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14, 0x800) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f00000004c0)={@dev, 0x0}, &(0x7f0000000500)=0x14) getpeername(r2, &(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x80) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000001bc0)={'ifb0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000001c00)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001d00)=0xe8) getsockname$packet(r2, &(0x7f0000001d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001d80)=0x14) getpeername$packet(r0, &(0x7f0000001dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001e00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000002100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x63ae2f3f8c5784b7}, 0xc, &(0x7f00000020c0)={&(0x7f0000001e40)={0x258, r4, 0xa04, 0x70bd27, 0x7, {}, [{{0x8, 0x1, r5}, {0xbc, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xfff}}}]}}, {{0x8, 0x1, r8}, {0x178, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x63}}}]}}]}, 0x258}}, 0x20000000) 10:56:10 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_+lave_0\x00', 0x2000000c0ffffff}) 10:56:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2f01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:10 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x7a00000000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x4b01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 270.548079] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 270.566893] gfs2: invalid mount option: locktable= [ 270.571920] gfs2: can't parse mount arguments [ 270.588716] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:10 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x7000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x3, &(0x7f0000000040), 0x4) 10:56:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="03050000000000086a8e04abdafbfb0003e71300020067726530000000000000000000000600000000000000000000000000000000010801f7ffffff0000"], 0x50}}, 0x0) 10:56:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x3b00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 270.706922] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 270.715077] gfs2: invalid mount option: locktable= [ 270.720114] gfs2: can't parse mount arguments 10:56:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040), 0x4) [ 270.752804] netlink: 60 bytes leftover after parsing attributes in process `syz-executor4'. [ 270.773018] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 270.814868] netlink: 60 bytes leftover after parsing attributes in process `syz-executor4'. 10:56:11 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x6, 0x800) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x8ce) r2 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_%lave_0\x00', 0x2000000c0ffffff}) 10:56:11 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_dlave_0\x00', 0x2000000c0ffffff}) 10:56:11 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x1000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x21, &(0x7f0000000040), 0x4) 10:56:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x9f01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:11 executing program 4: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x32}, 0x0, @in=@rand_addr}}, 0xe8) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) write(r0, &(0x7f0000000040)="1b05f83fc5d5d01d881ec197cb3f869eddd7a04fd5544a158b75f74df26d029d669f8c57fc715fdd8c96291a22c3d36e707728ed831afd939ce207fcda01d8f5e277b6bef9af7c153f", 0x49) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) 10:56:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x15, &(0x7f0000000040), 0x4) 10:56:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x3400, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 271.385567] gfs2: invalid mount option: locktable= [ 271.390601] gfs2: can't parse mount arguments 10:56:11 executing program 4: r0 = socket(0xa, 0x3, 0x19) r1 = socket$inet6(0xa, 0x80003, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x80000001}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={r2, @in6={{0xa, 0x4e21, 0x480, @ipv4={[], [], @loopback}, 0x173}}, 0x7}, 0x90) ioctl(r1, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") ioctl$sock_proto_private(r0, 0x89e1, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000140)={0x3}, 0x1) 10:56:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x12, &(0x7f0000000040), 0x4) [ 271.427225] gfs2: invalid mount option: locktable= [ 271.432255] gfs2: can't parse mount arguments 10:56:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_-lave_0\x00', 0x2000000c0ffffff}) 10:56:11 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x10, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5f00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 271.569501] gfs2: invalid mount option: locktable= [ 271.574529] gfs2: can't parse mount arguments [ 271.635083] gfs2: invalid mount option: locktable= [ 271.640206] gfs2: can't parse mount arguments 10:56:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xd, &(0x7f0000000040), 0x4) 10:56:11 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_clave_0\x00', 0x2000000c0ffffff}) 10:56:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:11 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0xffffffff80000000, &(0x7f00000000c0)="0248a059915f5ac6755cc90700345f8f764070") keyctl$set_reqkey_keyring(0xe, 0x1) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'vcan0\x00', {0x2, 0x4e22, @rand_addr=0x7}}) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) dup3(r2, r1, 0x0) 10:56:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xf100, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:11 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:11 executing program 3: r0 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x0, 0x24000) write$P9_RREAD(r0, &(0x7f0000000180)={0xb}, 0xb) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r1, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = getpgid(0xffffffffffffffff) sched_getattr(r2, &(0x7f0000000080), 0x30, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000380)=0x9, 0x4) r3 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r3, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) fcntl$dupfd(r3, 0x406, r3) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x40002, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x800, 0x0) syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x7f, 0x4000) r4 = open(&(0x7f0000000280)='./file0\x00', 0x400000, 0x8) ioctl$TIOCSBRK(r4, 0x40044591) 10:56:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_plave_0\x00', 0x2000000c0ffffff}) 10:56:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x9200, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 272.272789] gfs2: invalid mount option: locktable= [ 272.277807] gfs2: can't parse mount arguments 10:56:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x16, &(0x7f0000000040), 0x4) 10:56:12 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0xd, &(0x7f0000000000)={0x0, 0x2}, 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000140)=0xe8) 10:56:12 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x600000000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_xlave_0\x00', 0x2000000c0ffffff}) 10:56:12 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_%lave_0\x00', 0x2000000c0ffffff}) 10:56:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x7001, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000040), 0x4) [ 272.446747] gfs2: invalid mount option: locktable= [ 272.451790] gfs2: can't parse mount arguments 10:56:12 executing program 4: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) getsockopt$llc_int(r0, 0x10c, 0xf, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0xa, 0x3, 0x11) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000080)=@ax25, 0x49c32a6ab37c067b, &(0x7f0000000080), 0x0, &(0x7f00000009c0)=""/4096, 0x1000, 0x9}, 0x0) sendmsg(r2, &(0x7f0000000280)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1302}}, 0x80, &(0x7f00000000c0), 0x2fe, &(0x7f0000000440)}, 0x0) 10:56:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x7500, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 272.493617] gfs2: invalid mount option: locktable= [ 272.498667] gfs2: can't parse mount arguments 10:56:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10, &(0x7f0000000040), 0x4) 10:56:12 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB='\v\x00\x00'], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:12 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0243984fa7295f8f764070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x0, 0x0, 0x3, 0x1}, 0x20) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000200)={@dev, 0x0, 0x1}, 0x20) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1) 10:56:12 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x6800000000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:12 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_ulave_0\x00', 0x2000000c0ffffff}) 10:56:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_#lave_0\x00', 0x2000000c0ffffff}) 10:56:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000040), 0x4) 10:56:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xee01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 273.133149] gfs2: invalid mount option: locktable= [ 273.138201] gfs2: can't parse mount arguments 10:56:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4, &(0x7f0000000040), 0x4) 10:56:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xfa01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:12 executing program 4: prctl$intptr(0x26, 0x1) clone(0x0, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x6) ioctl$TUNSETLINK(r0, 0x400454cd, 0x110) 10:56:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 273.176428] gfs2: invalid mount option: locktable= [ 273.181472] gfs2: can't parse mount arguments 10:56:12 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x20100000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:12 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_\nlave_0\x00', 0x2000000c0ffffff}) 10:56:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_Xlave_0\x00', 0x2000000c0ffffff}) 10:56:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xbc01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 273.318023] gfs2: invalid mount option: locktable= [ 273.323058] gfs2: can't parse mount arguments 10:56:13 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="f4ff00836339bdcde4809e9ce95cd911ba5a2a1bbc2450a7475d35ab7f0c55d2f6000000200006de00000000000000df6ab3ed87f1a1b6843fbdb207000000ec2c4c2f0c215bdf9cf31b06c51ec16e17000388394fe5b48148854420ce9b4fb2f6da31e8e10f3b95e4369b9a2b7b"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x200000, 0xfe74) r1 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x40) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000004c0)={0x8, 0x5}) r2 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) accept$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f00000002c0)={0x11, 0x80000000000, r3, 0x1, 0x0, 0x6, @broadcast}, 0x56) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='statm\x00') ioctl$KVM_GET_SREGS(r4, 0x8138ae83, &(0x7f0000000380)) 10:56:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:13 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000002400)='/dev/input/mouse#\x00', 0x1, 0x82400) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000002440)=0x2, 0x2) socket$inet6_udplite(0xa, 0x2, 0x88) connect$llc(r0, &(0x7f0000000180), 0x7) sendmsg$xdp(r0, &(0x7f00000023c0)={0x0, 0x0, &(0x7f0000002340)=[{&(0x7f0000000000)="07b02d0164e4f08a7dcbaaa254775a336645bb4b50f159f2ae361e2ea9ade4d6dceacd634b8d8e823587f820c30fc537f21223f3e1b0520b1ee28f64eee2e2152ea5ba5a0689769bc97ad6c39ff10d25d2d8067fbf53d1e79829034ad5ccb0168d284910190d6fea46622c353cb568780308eb0b8e01cd1e78410e2121484cb23454c9431422e11a08a58efd", 0x8c}, {&(0x7f00000001c0)="aaba64614f290e16289af13836be3151c84ca933c976678abd0ceb740be0dfc50fb1709c318056775c895c6c8bcd2fff8fc49591437a7a697cb90a06ed09f1835bcc5a9b846b7d03e1486e55b4942d55a5797d857791cad3b0f72509d719c59ae08f752b4a28a372849c04f5060d4876062a6be72cead7aa372721ecedba1ba6b379d6fb88bb46472aaeafd4d45fce36eefac77af304f5541fb40f2ac46123d539607236319e2cf02a96d7a8a50c6191cdaf14ae6c54958882b8d8eb707a789e688728e76e394f7a594f93d98ddf58948dae1e8ae748d3fdced2b5ffc15eef96cc5dabe3225a41125e073a760110d47cd60938a846c744d78a8ad5abf9869669e8a64393af8fb84987b4dddad399f5917ad99f01b6da9a7c11c9e47c8a192659fcd2eb6c53538e897bbc7df6d54d0d0e1de69334efd03ff33c625e1aab6520c3386f854d4ddd3253dcb2b6b5b86488f83ca708eb1844d7c844e63ee36b00643a390472d763e38d40f3e57c660cc48827352976dff64b8ddfdb832434be6610b510260e08d5ff3d76927a41bc6df8edfa7e3400aedca99592da7e8b4e1eb24e89bbc4f543057db56ab17280f9b6c708a86dcf5cf93e2a03e3401984722c729bc0930e973528fdec6107502c1b2257ea622b6f3856e9d31e4004d61b3e7be257b2c7f4f4dad637392cef7d09d32d6a0bd36ca84779476de7cf94948e3397c42099b4c81c5b9b277897e2a86c6510e768797f164bfeeeb5192fe5502fb39e738a02b64cb2a580752d6b64a9f3e8c660e5d66f8afb347d6c60fd74c11eaa2c1203758721ee7e3f7dd20d12b5a46c3cccad6d766cc44e9162ff136de45745b28fba33b3a0095814265a0062361f75a29d512c86e3383b4dcb6d4a4cde5a8847ec8998d9a5c6a75f4cc3ea6838efb002ed66a07aa6b752835068ba309d812fc65e7c48c6d8cf851959ad77db49d33fe24b07f30238496dd4cf516561d67c57127b62e837e2fba622e19d8780450f8a7f74e9a1ebfef5c41f00a82388283c19d63efe9ddc016bc0112f1a48eeb4abef9d4a1845ad8e6ee7decb8c58e1ffa7ce35513f4433dedf7918735e11666b3d343ff956ed48c87788b031affb4fba94dddf8885d000a8feb9373e30727e7929bd93f60718b0d5d79aed5472fc3d19a8b447b6f6b2331b6e1d8ebe7fbf04ae371fba008fd97fc0c9344684545d98e7619df3d2369613ba0073de49ac86c84bbf2bdea820340d53a1bf33aea36bca47b2aa8ec8f64eff714f8b8edb54e907cad530d555fba77e6cd9b5789f3fff4cc6529a1522b09e10fff40530b5a3446ce65339934f56b8f0cfc4e7c9f121f25e192d3f40478541f77410ad50620f444bde3d881c9ba39711aec1f1f2b0c1780aa57acdf1902afac7fa07cbc35d763a9ec9e5aa12c3387cd2ddaf476aa7c1f4c67902c9a2ecd4d309a3d2736593363dcb61f85d963dfaad1490d81da41b579f2beadd69a7dbbae9fce0fea0869d92b64b7cd6b735caebb14038fee78c557e354999b7a59feaa9cf0ca4afadd22781627a47edd61f528a635a7b95b58a758e135493e1cfe4da9a43a29c1c655bbf1b3605054c71845c4cb5ac5eb8ef29f77891d7f7fe5d9e69abd781c0f8223561190715bd30790a749f66d8faa5ccf8efd8c8aa26740143d9cb82c86ceb19334bad52b5f0338e67c390270bd44e85672fc81128c42c06c84e820a59fa27d80e24f284287d8ecfdd92740c242fb05d78bead5c23a6668474a5337d3dd756213db69a29b0fa557cba5730a4a07f4c8a1b2b17a7d81ff8ab088e0cff55a262c9a0171e9d3e99b9e515aadfd70c5210a643b6f8981347b90bd9f826318f0f37fbff41a3d7e43a745dde917da5e8f2a41ea02ec11adf8895acf53468c8b2abf90f16a69d6de9f48955f0b830575d7a8c8d795e806261211522285f97be423af5ad28e987f47e91c821c83bc8e20c1925cc960bbb6bf19ae32cfa0a2c4c5dab18ef2e5a6af70b01b59253a5815bac585ae677a85d5721be7277300126d3814718348b77aedd77e2462e02d2b24b4292a0329d87a84639168e26619d59a3e10c482cce13b6905ce7ef0baee883905dfab95a87b18fbccbda271d98d3e0737e74bb3f39cda7b426f8d63cda704cb1ea178dcec17db5e7ef03956b9f6bf640a494847c3fbe70838e2b598cfa5f46fccf19892cbbc1097cb76bd9fa2c9bebd74b1dff600853fb447751d0d5a77d9037e0510029abc0b9ae7d5f0866ed088b449ff0bd687b17695fe4c532a86f2eb03aa562f263b6d89b64e7ecbe2c41c48c39fa2feef221b09b4bc3597fab60220cab4e1a5899c87f88b2df5bfb6ffd8225c4c30ab9ab6a28c207e7c75118f6e6bc6d855b93a445ad8fb491c2a6557dfd748d005c062c0ef80ad79e0e9492caba64814f16fca3a91a8a027059b12a099c1654e75ef7fcf2b8beae4b86881382ad53060199fb712447a58d885b458d7459c00451561deebba1b9a57afc543291373ab96e2441b32e129551db9bfa1a15a5f2151ed630c01a6fcf6ad72392fc2e2f920115f31aecac08cf9947ba3122da7d699ff6f6f29850ad4631fa463ab68ca1a71007fc7a781fb5af1eeaded5457adafbce0f36733ee045ea6aa8d2dcc2bd1dad2cc4ec7ad89493be427edc703b367b2e06dc082b937bd576dafda1d1d3d6219b998c0bd632a81a49af937d6559a486549cba851658da6c576ded54b8d9017a280db6682959da2b43a1907d73464c5eae6e187f6baa4be21a79a91a18960dad54d2088dea7f8b8e5a6bf9b431bdf26178a6bb44c4248c310f0894387a7a66d17f226d0c2b8d07ad23b0482eb3821eaffab1b119892acb8f3eb18f3ded9833f6b56c5dab3d949719f8da63ec738433b70bbc018658cc2addef0d3321cafcedc8f135a7be08cd48c3b509816649f49a88d3730e5d20e80063982c8137c5e00b5d0ec69ab051794ae069110c2163d28a6d142584c33bb445c66ad617c11ab0b5c78ce5e59c0535bb952cda6e3e3e7b2db35e51c14969ba9704164c6dd8696b9a7d78fd206634e65584522d45d79bfe6ec1f9e7b68c6cdf85a45ec00064520cd635be34edbaafc119941ad4ccf5baa6e28dbfc7fd73d0a570448a2766c225e375fd9953d00be22283e746026567465a5b9ae64e02f7800b3027da1ec4785f92e0fe0cc6c114dd8da414e4ef648fa878fd8b95422d26b896b6cab50a779947aa69da1c800d45beced75b43cf7335926a95a784b6c963d84b8da1f197e9f77f3e3f97395ad2fd2902e7b5df5f66e54cd398031cd8949fbbfb86067100900979cca2ee8ed40d09cf442fa6f12187c6c43a39cb625f1db89f0d1a0485e30e6153f50ac427834ac57669c6db17457111dc3056a8dcaabb155d1fa48b0004fd003a6dabbfb57345db3615c3679d5e079ffa43e9041d6ff412fe85949bb64c74808d289f16d101e331048b9434c3499fd6a9cde7d203ce6b61f98f0703ffc3a7a8b877c38fb983b3784c64382f860904d7fe5b5fa303765bfc9e5ef8f9c244a3363b1d7bf634725ad829292679d76d9b2ad20318349bc64cd76cb7f9fb82d1431d68aaf225994cab578092c1f96b4587ebe09409184835ff79ef0ab1f1d4ecea8ccca018ea7a8c44b4e263d9e70cea4b1ab5719fb73ef49f9722b533f7bd7498e15fb2a518268ae5bf2dc3a9a9b7ba2f438b977c9c9f40ee96339bd36e57805e755ef731ef38bf0b5a4d362713dfe8d082e686ad16802809a292a147b5e84b673c0ec9f847dd8469c4e3a5e25994826b47f5d5f57e33c3d065c436795b931e95cc7f05a1f8cbb81f458c4966fdacc36dd7521896b43c56c41fe54a51ff0bda0aba875f9474b7e86b7096b52534dd6d01e524e62b22e17bcd1d33e3694f7bf4e26d4398d8d7a124dc90e3f4e24a27071c3e35aadf74deeaffc6b7aecd843ad7d1ee36a938d7698981fb98854c14d04fc7fdc34a37b1ed96bf7cfcf1d64c21d208accf5592a26c1941e29b72f2f8f43a5431e6283bfe397c83c4bf138bb306d163abac9570ab7eff087c24c6ca17e6220340595d3d3b5b54b19d56e38d5eb42f5377eef572991dad85ad650bf6173dcbb6f1dff49fb5a50122e4a5dad719abc8e04fc0251ee671532633a47a5626154f30b30fa7cd151f722325c069ac545a258be41497c4835340cda0a9f3dc6a7d1ae45a07b8d00357e870bf53a64dece1bb24c1cc5ddcbd37861b3a89ac2669457dece7eadd08711f73fec8903a402539da6e3c52d0a5e19526560333f64b06ae8293dcb12d9df5479536db16778f99969b87a967d4c0b076c21c03514ce290cdd9ae7bbb1d7b3ca5d5ea7a8aa0884bd877f77f7587daf135a10f0ce135205c5625aa06082ef99619c816e040936cb43d9771904e611f6f719355acede68c6221a1fb35afc5ca0b72cad675341dc24de9293f6cea4b83d68706ab312f17ddf9a43c1a340bf70dbacf1d2675b817fccb0428578392f8df1942e9b505477ec2e403f7e396c15fdc5cdb10ea48e9d871149bae309065b5bff4a0043250e86912630e8a69177c903464c442d6013b7d6234ebdb8f435238a708c36342bef57aba2cd5b13d0a487a745de64128aedcd0620eb4acb9fbb0e324e5f68838e16d7394d5a7a4226312474fd9a5668b1a3aac52de25444f12e2522568ae66dbc2247c753c5c0473dac1fd89fc073ae2014ea34ced6bd89335db4f92332511458030afd465b9da5d1c65a1a9bb6c02be42f04a849c503892ed9ee1069abaf558fad423dd93bc59d6a63a2dd6fd5a71590c5aba6ac73af39032dee89d3494f4c56ffa8131929cb12703b722fd706d4783a8230563feccace9ea899d9a79d410ffc1e7ab0ff10559593dabcef71895c6ae7519d332c8b567a2902b310b5b5ce48d0e0fb3f057369eef89eda3f01b4951a1883476c8c7926201570cee2951114af03c0c31959fffa1cd6f38f1ed4d0ae647e798cd9365f4b601fd306760e5b10c74cd2832f7775de55fc9a27ef9445819aef84a1ac7effa338836fad6cba3197306350e1717cff9099e56cbb2567c501e262e69726956f781c540389ebbc18323756bae740c916b57c07e13e3c1b1a623d9d5ba70d50d402716afec0b833fe1c206f1393b51321fe414441a3cd74d2ff0d16e7263bc732e43033d7bfbde4cc07675ab593d4b38a0e86e4b505a2443097e6f4f0f82cc0a0a93319d8a911332117d5364dd4362b92476b2f1198333b341ebf13f55535f4d8877e9a79fca3d69abea739b5ba535536ab19d5155f53c7e253259c22cd200da80760bdad5717a7721f483d19f116f6d03ad960d4f19a9f96e37bfa95309fd99c856246067170b3037c0ec8f665ab1975cd84cc25d0cc33bf59b555da6994792268e75c57e627399498a6a97625d7ed679634a05c62f3b90e5f07442b3704b02ab884df18f73bb1ae093dd1ba9249e3e08348c0ebaacfba102acd1513c1083c13d2452706237c9b73ade0547484e457db1628b29f73ce428a66ddd409d8c1a76766ef6f69640a485b40ab3f6ebe7a01977a11ec53a05f7e587a278c34ea52bb611341e4a9be28d49544ffe9fffe3e885e467b0973f344d7f35cfc043af61dfb3f1b76451d21f1deda99ae5c66233e71ca65e1d23d576c898da05f7ce55c66c6f46fae37c3af22ad172eba253435e649d8ba87ac2fcd3e1e7bfa59da6d703103b19ed9720abe9937e0a6ef9a75463fa03f32194cf2e5e2fa0f6e5360562982367ffff6877f36868201f82aa641196f07e31151863686f7dbcebeb", 0x1000}, {&(0x7f00000011c0)="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", 0x1000}, {&(0x7f00000000c0)="1a9de340a35a1433a7bccb5751ce79d5141209cbe6f82b801bd989548c16b3ebe82bd8f2", 0x24}, {&(0x7f0000000100)="1fc5ae3f6f1e88801a7d79ea4d", 0xd}, {&(0x7f00000021c0)="4a1e91343f6195c3da1538ae2683b7877a6ef35c9fb449abdf41a57b261d422532a1574ea4b27d7e07e1b8b0c06ebc1fff97150084fc4cebd2d930d2f6294d453a7320a2f35f2fa9ffbf755ab7117644211d0e0d667ea460086780a4cad29a313c97ee9552c361e0c70c971e18f1d05d25a1114d93230ab1b63a4722f7a0a7bde219b529d38e9575e5c4982bd4d992162477d458623a3f40b102b3d1f1d7ac77af1c", 0xa2}, {&(0x7f0000002280)="db890ff73a71a77fb5e22ad085c341442fec3cae1892e12e260e6b8dcaa460b08af4dfbf1a22a4faad131868dd734f8b65cda6b7735b810f7fc4abd286a0d4385f44bb7eb051238a58ae7e49d203e9c32e498ed31cf468bea4d07abcea9eed77b1febd3307dcdecf2db0e0be17003a26740e08c52655e9e75be6a17a96f5cf983de28b897c6607fc95a571ef5c5e200fbec404495451e5f435617188aed2", 0x9e}, {&(0x7f0000000140)="0622f51ab3321c", 0x7}], 0x8, 0x0, 0x0, 0x20004804}, 0x4000000) 10:56:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xb600, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:13 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_olave_0\x00', 0x2000000c0ffffff}) 10:56:13 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x2010, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_\nlave_0\x00', 0x2000000c0ffffff}) [ 273.987418] gfs2: invalid mount option: locktable= [ 273.992477] gfs2: can't parse mount arguments 10:56:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() setresgid(r1, r2, r3) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1}, 0x50) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xfffffff6) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) write$FUSE_ENTRY(r0, &(0x7f0000000580)={0x90, 0x0, 0x2}, 0x90) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000100)) getdents(r4, &(0x7f0000000240)=""/185, 0xb9) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_POLL(r0, &(0x7f0000000080)={0x18, 0x0, 0x4}, 0x18) 10:56:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x9c00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x11, &(0x7f0000000040), 0x4) 10:56:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 274.028870] gfs2: invalid mount option: locktable= [ 274.033899] gfs2: can't parse mount arguments 10:56:13 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_plave_0\x00', 0x2000000c0ffffff}) 10:56:13 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x700, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xbd01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x9, &(0x7f0000000040), 0x4) [ 274.197221] gfs2: invalid mount option: locktable= [ 274.202263] gfs2: can't parse mount arguments [ 274.253055] gfs2: invalid mount option: locktable= [ 274.258094] gfs2: can't parse mount arguments 10:56:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x3501, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_.lave_0\x00', 0x2000000c0ffffff}) 10:56:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040), 0x4) 10:56:14 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x7400, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:14 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_*lave_0\x00', 0x2000000c0ffffff}) 10:56:14 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x16}}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e22, 0x1, @remote, 0x1}, @in6={0xa, 0x4e20, 0x9c99, @mcast1, 0x40}, @in6={0xa, 0x4e23, 0x8, @loopback, 0x3e68e0db}, @in6={0xa, 0x4e23, 0x5, @remote, 0x6}, @in6={0xa, 0x4e24, 0xfffffffffffffffb, @loopback, 0x3}], 0xbc) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x7, &(0x7f0000000040), 0x4) [ 274.843618] gfs2: invalid mount option: locktable= [ 274.848703] gfs2: can't parse mount arguments [ 274.854988] validate_nla: 20 callbacks suppressed [ 274.854997] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 274.909596] gfs2: invalid mount option: locktable= [ 274.912521] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 274.914634] gfs2: can't parse mount arguments 10:56:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() setresgid(r1, r2, r3) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1}, 0x50) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xfffffff6) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) write$FUSE_ENTRY(r0, &(0x7f0000000580)={0x90, 0x0, 0x2}, 0x90) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000100)) getdents(r4, &(0x7f0000000240)=""/185, 0xb9) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_POLL(r0, &(0x7f0000000080)={0x18, 0x0, 0x4}, 0x18) 10:56:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xde00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:14 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x500, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xe, &(0x7f0000000040), 0x4) 10:56:14 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_0lave_0\x00', 0x2000000c0ffffff}) 10:56:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_*lave_0\x00', 0x2000000c0ffffff}) 10:56:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 275.020755] gfs2: invalid mount option: locktable= [ 275.025817] gfs2: can't parse mount arguments [ 275.041459] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xfc00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) [ 275.071744] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 275.083412] gfs2: invalid mount option: locktable= [ 275.088402] gfs2: can't parse mount arguments 10:56:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:14 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x68, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_olave_0\x00', 0x2000000c0ffffff}) 10:56:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5c01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:14 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_llave_0\x00', 0x2000000c0ffffff}) [ 275.215966] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 275.228320] gfs2: invalid mount option: locktable= [ 275.233325] gfs2: can't parse mount arguments [ 275.261485] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 275.282448] gfs2: invalid mount option: locktable= [ 275.287447] gfs2: can't parse mount arguments 10:56:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000040), 0x4) [ 275.672401] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 275.694298] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000040), 0x4) 10:56:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xbf01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:15 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x4c00000000000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_llave_0\x00', 0x2000000c0ffffff}) 10:56:15 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000100)=0x2, 0x4) read(r0, &(0x7f0000000080)=""/14, 0xe) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0xff, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000040)=0x5, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:15 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_s\nave_0\x00', 0x2000000c0ffffff}) 10:56:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x24, &(0x7f0000000040), 0x4) 10:56:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x6, &(0x7f0000000040), 0x4) 10:56:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000040), 0x4) [ 275.882464] gfs2: invalid mount option: locktable= [ 275.887515] gfs2: can't parse mount arguments [ 275.893692] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xcf01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x5, &(0x7f0000000040), 0x4) [ 275.925423] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:15 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0xf6ffffff00000000, 0x0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000040), 0x4) 10:56:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x9301, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:15 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_s%ave_0\x00', 0x2000000c0ffffff}) 10:56:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_suave_0\x00', 0x2000000c0ffffff}) 10:56:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040), 0x4) [ 276.063970] gfs2: invalid mount option: locktable= [ 276.069021] gfs2: can't parse mount arguments 10:56:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() setresgid(r1, r2, r3) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1}, 0x50) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xfffffff6) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) write$FUSE_ENTRY(r0, &(0x7f0000000580)={0x90, 0x0, 0x2}, 0x90) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000100)) getdents(r4, &(0x7f0000000240)=""/185, 0xb9) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_POLL(r0, &(0x7f0000000080)={0x18, 0x0, 0x4}, 0x18) 10:56:16 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000080)={0x80000000}, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x8d00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:16 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x10, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xc, &(0x7f0000000040), 0x4) 10:56:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_s\nave_0\x00', 0x2000000c0ffffff}) 10:56:16 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_s.ave_0\x00', 0x2000000c0ffffff}) 10:56:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f0000000040), 0x4) 10:56:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 276.751899] gfs2: invalid mount option: locktable= [ 276.756925] gfs2: can't parse mount arguments 10:56:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xea00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 276.793980] gfs2: invalid mount option: locktable= [ 276.799032] gfs2: can't parse mount arguments 10:56:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1d, &(0x7f0000000040), 0x4) 10:56:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_s.ave_0\x00', 0x2000000c0ffffff}) 10:56:16 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7a000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xf900, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() setresgid(r1, r2, r3) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1}, 0x50) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0xfffffff6) r4 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) write$FUSE_ENTRY(r0, &(0x7f0000000580)={0x90, 0x0, 0x2}, 0x90) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000100)) getdents(r4, &(0x7f0000000240)=""/185, 0xb9) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_POLL(r0, &(0x7f0000000080)={0x18, 0x0, 0x4}, 0x18) [ 277.003929] gfs2: invalid mount option: locktable= [ 277.008953] gfs2: can't parse mount arguments [ 277.052523] gfs2: invalid mount option: locktable= [ 277.057589] gfs2: can't parse mount arguments 10:56:17 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) ioctl$sock_ifreq(r0, 0x8934, &(0x7f00000000c0)={'dummy0\x00', @ifru_data=&(0x7f0000000080)="a2e2fce433ced3e5eda28a6f574234b6cd78b00cad6278e7da29c0ae1c2d4b85"}) 10:56:17 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_sLave_0\x00', 0x2000000c0ffffff}) 10:56:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f0000000040), 0x4) 10:56:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2200, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_sLave_0\x00', 0x2000000c0ffffff}) 10:56:17 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x8401, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x100000000000000, 0x4) [ 277.617728] gfs2: invalid mount option: locktable= [ 277.623315] gfs2: can't parse mount arguments 10:56:17 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_suave_0\x00', 0x2000000c0ffffff}) 10:56:17 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x500000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_sl\nve_0\x00', 0x2000000c0ffffff}) 10:56:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x1000000, 0x4) 10:56:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xf000, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 277.829717] gfs2: invalid mount option: locktable= [ 277.834795] gfs2: can't parse mount arguments 10:56:18 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYRESDEC=r0], 0x14) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r1, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:18 executing program 4: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="f4ff00836339bdcde4809e9ce95cd911ba5a2a1bbc2450a7475d35ab7f0c55d2f6000000200006de00000000000000df6ab3ed87f1a1b6843fbdb207000000ec2c4c2f0c215bdf9cf31b06c51ec16e17000388394fe5b48148854420ce9b4fb2f6da31e8e10f3b95e4369b9a2b7b"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x200000, 0xfe74) r1 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x40) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000004c0)={0x8, 0x5}) r2 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) accept$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f00000002c0)={0x11, 0x80000000000, r3, 0x1, 0x0, 0x6, @broadcast}, 0x56) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='statm\x00') ioctl$KVM_GET_SREGS(r4, 0x8138ae83, &(0x7f0000000380)) 10:56:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x3) 10:56:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xb00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:18 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_sl\nve_0\x00', 0x2000000c0ffffff}) 10:56:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_sl%ve_0\x00', 0x2000000c0ffffff}) 10:56:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:18 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffff00000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) arch_prctl(0x1004, &(0x7f0000000080)="7b41151efe1ff9ad2a4f96a03405f2abfbf00cbfd7fb4431f2b7389e2d5dee0a76f7bd2079432bad713d6ba3653cd8db76b994c6bc58c8a2db2c96ba02405b9ba768f98334a5e54ea397c8db135eafc8cbd6ca7a64c1287090c225a22f207085a8cae832f6ea154b53616fb797538db36b895aa9f868d9233f7c23fa3730") r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x3d01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 278.488624] gfs2: invalid mount option: locktable= [ 278.493662] gfs2: can't parse mount arguments 10:56:18 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_sl%ve_0\x00', 0x2000000c0ffffff}) 10:56:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6701, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_sla\ne_0\x00', 0x2000000c0ffffff}) 10:56:18 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x300000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:18 executing program 1: epoll_create1(0x80000) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 278.664856] gfs2: invalid mount option: locktable= [ 278.669937] gfs2: can't parse mount arguments 10:56:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000004002, 0x1) ioctl(r0, 0x5, &(0x7f0000000280)="025cc80700145f8f764070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080)=0xc2eb, 0x4) unshare(0x2000400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000040), 0x4) 10:56:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5001, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:18 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_sla\ne_0\x00', 0x2000000c0ffffff}) 10:56:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slav\n_0\x00', 0x2000000c0ffffff}) 10:56:18 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:18 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x200, 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000000c0)={0x6, 0x7, [{0x10000, 0x0, 0xfffffffffffffffd}, {0x10001, 0x0, 0x2}, {0x3, 0x0, 0x2}, {0xf8, 0x0, 0x9}, {0xb0a, 0x0, 0x800}, {0x387a, 0x0, 0x1}]}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r1, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) clock_nanosleep(0x3, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000280)) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000002c0)=0xd3b, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xe400, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@generic={0x3, 0x3, 0xb715}) syz_mount_image$bfs(&(0x7f0000000140)='bfs\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="25b51f09a2288e9edd6c63", 0xb, 0x6}, {&(0x7f0000000200)="afe84563eb0c5d3784153861a242faf3c01e1d08c028be0cb55e7515821115eac21b58fc5aee7bdf8b6d242d511d55c081501d5a45ca592dd5274cc19590915f27c179", 0x43, 0x800}], 0x1000000, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f00000000c0)={0x4b, ""/75}) 10:56:19 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_sla%e_0\x00', 0x2000000c0ffffff}) 10:56:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slav%_0\x00', 0x2000000c0ffffff}) 10:56:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 279.354227] gfs2: invalid mount option: locktable= [ 279.359255] gfs2: can't parse mount arguments 10:56:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xa000, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 279.451438] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 10:56:19 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff7f, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2600, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:19 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slav\n_0\x00', 0x2000000c0ffffff}) [ 279.542309] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 10:56:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave\n0\x00', 0x2000000c0ffffff}) [ 279.641478] gfs2: invalid mount option: locktable= [ 279.646517] gfs2: can't parse mount arguments [ 279.728224] gfs2: invalid mount option: locktable= [ 279.733326] gfs2: can't parse mount arguments 10:56:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0xfffffffffffffffd) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_+\x00', 0x2000000c0ffffff}) 10:56:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x7800, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:19 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slav%_0\x00', 0x2000000c0ffffff}) 10:56:19 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TIOCSBRK(r2, 0x40044591) 10:56:19 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) [ 280.163545] validate_nla: 24 callbacks suppressed [ 280.163561] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 280.197309] gfs2: invalid mount option: locktable= [ 280.202338] gfs2: can't parse mount arguments 10:56:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="01") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x9201, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 280.222268] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_X\x00', 0x2000000c0ffffff}) 10:56:19 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave\n0\x00', 0x2000000c0ffffff}) 10:56:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f0000000080)=0x14) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000000c0)={@loopback, r1}, 0x14) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x20100, 0x0) accept4$llc(r2, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x80800) unshare(0x2000400) r3 = socket$inet_smc(0x2b, 0x1, 0x0) r4 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x8, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f0000000140)={0x7f}, 0x1) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:20 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1f000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1f00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:20 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040), 0x4) [ 280.387892] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 280.422240] gfs2: invalid mount option: locktable= [ 280.427287] gfs2: can't parse mount arguments 10:56:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000000)={0x7f, 0x5ad, 0x1}) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) sendfile(r0, r1, &(0x7f0000000080), 0x7f) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x4a01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 280.430521] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:20 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:20 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080)={0x200000, 0x3, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:20 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7a, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:20 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave%0\x00', 0x2000000c0ffffff}) 10:56:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_-\x00', 0x2000000c0ffffff}) 10:56:20 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x8c01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:20 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xc801, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000040)=0x3, 0x4) [ 281.035438] gfs2: invalid mount option: locktable= [ 281.040456] gfs2: can't parse mount arguments [ 281.047277] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:20 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:20 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4c, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_\n\x00', 0x2000000c0ffffff}) [ 281.099394] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 281.124451] gfs2: invalid mount option: locktable= [ 281.129493] gfs2: can't parse mount arguments 10:56:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:20 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x40000, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000200)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xffffffff00000001, 0x109000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@mcast1, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000001c0)=0xe8) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@local, @in6=@local, 0x4e22, 0x7fffffff, 0x4e21, 0x7, 0xa, 0xa0, 0x80, 0x73, r2, r3}, {0x388a, 0x7, 0x1, 0x8000000000000, 0x3f, 0x4, 0x20}, {0x20, 0x401, 0x8, 0x8}, 0x800, 0x0, 0x1, 0x0, 0x3, 0x3}, {{@in6=@ipv4={[], [], @broadcast}, 0x4d2}, 0x2, @in6=@mcast2, 0x0, 0x4, 0x3, 0x7, 0x1ff, 0x100000000, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x8) ioctl(r4, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x22, &(0x7f0000000000), 0xffffffffffffff7d) [ 281.246112] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 281.260682] gfs2: invalid mount option: locktable= [ 281.265752] gfs2: can't parse mount arguments [ 281.275764] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 281.290932] gfs2: invalid mount option: locktable= [ 281.295950] gfs2: can't parse mount arguments 10:56:21 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x88001, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000380)={0xa, 0x0, [{0x4, 0x0, 0x0, 0x0, @sint={0x8e, 0xffffffff80000001}}, {0x2, 0x2, 0x0, 0x0, @sint={0xfffffffffffffff7, 0x7fffffff}}, {0x1, 0x1, 0x0, 0x0, @irqchip={0xfffffffffffffffd, 0x5}}, {0x7, 0x1, 0x0, 0x0, @msi={0x3, 0xc8}}, {0xfff, 0x3, 0x0, 0x0, @msi={0xffffffffffffffff, 0x14, 0xfff}}, {0x7, 0x7, 0x0, 0x0, @msi={0x6, 0x3, 0x6}}, {0x8001, 0x4, 0x0, 0x0, @adapter={0x1, 0x1, 0x0, 0x400}}, {0x7, 0x7, 0x0, 0x0, @sint={0x800, 0x969c}}, {0x3cb0d297, 0x2, 0x0, 0x0, @msi={0x2, 0x6, 0x7f}}, {0x1ff, 0x2, 0x0, 0x0, @sint={0xe10, 0x1ff}}]}) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r1, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl(r1, 0x101, &(0x7f0000000080)="2fa96ee7f8ed1521218f3bac3644a5d6b0") ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5b01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:21 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_\n\x00', 0x2000000c0ffffff}) 10:56:21 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket(0x10, 0x3, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000000280)="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") sendfile(r1, r2, &(0x7f0000000040), 0x100000001) unshare(0x2000400) r3 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f0000000080)={{0x4, 0x8}, 'port0\x00', 0x80, 0x80002, 0x3f, 0x3e8, 0x1ff, 0x1, 0x3, 0x0, 0x1, 0x1}) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:21 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_H\x00', 0x2000000c0ffffff}) 10:56:21 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) [ 281.900203] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 281.916137] gfs2: invalid mount option: locktable= [ 281.921135] gfs2: can't parse mount arguments 10:56:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xc400, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 281.950437] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 281.968750] gfs2: invalid mount option: locktable= [ 281.973766] gfs2: can't parse mount arguments 10:56:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:21 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:21 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x74, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_\x00 \x00', 0x2000000c0ffffff}) 10:56:21 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_#\x00', 0x2000000c0ffffff}) 10:56:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x8d01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 282.111706] gfs2: invalid mount option: locktable= [ 282.116730] gfs2: can't parse mount arguments [ 282.174916] gfs2: invalid mount option: locktable= [ 282.179982] gfs2: can't parse mount arguments 10:56:22 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f8eeffffff00000054785156cceea66e5d4933644d505cbad8f0c33dc207945fa843f1074dbf1f5de913d9291924cad67c6b5f30c3ca26bfaea5f63c914cec2a81ac5f24ffae8135d247fb150153413fe6275f22b88b9099a852b3c3b86a930d6270b33675e33072cfcd7c406ef0f35cdddd0bdc313d98319925ec950d8b15e43355e3c21fdc37a01dfd08b55a0e199b57bfabbecf646af253fcf5a49d329b052da0238cc66bc2f96936db7b6eb323adb129884a6705078be5ad8005ebfedd91f8857c07afe6259fcca976c417622d131467dd22ecc424"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000380)={r1, @in={{0x2, 0x4e20, @multicast2}}, 0x8001, 0xffffffffffffc347, 0x0, 0x9, 0x5}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a2, &(0x7f0000000580)='ip6_vti0\x00') openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) lseek(r1, 0x0, 0x7) unshare(0x2000400) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10000, 0x0) accept$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x100d}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000180)={0x7, 0x8, 0xfa00, {r4, 0x90}}, 0x10) r5 = socket$inet_smc(0x2b, 0x1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x80, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:22 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_#\x00', 0x2000000c0ffffff}) 10:56:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xf700, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:22 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7400000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:22 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_%\x00', 0x2000000c0ffffff}) 10:56:22 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1900, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 282.801356] gfs2: invalid mount option: locktable= [ 282.806394] gfs2: can't parse mount arguments 10:56:22 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x4000000) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/242, &(0x7f0000000000)=0xf2) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x8001, 0x100) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f00000001c0)={0x5, 0x2, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'teql0\x00'}) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_%\x00', 0x2000000c0ffffff}) 10:56:22 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfdffffff00000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xcc00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 282.941506] IPVS: length: 242 != 8 [ 282.973878] IPVS: length: 242 != 8 [ 282.989948] gfs2: invalid mount option: locktable= [ 282.995067] gfs2: can't parse mount arguments [ 283.050937] gfs2: invalid mount option: locktable= [ 283.055960] gfs2: can't parse mount arguments 10:56:23 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x7, 0x0) ioctl$TIOCEXCL(r1, 0x540c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0xfffffce4, &(0x7f0000000080)}, &(0x7f00000000c0)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(r1, 0x40044591) 10:56:23 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_L\x00', 0x2000000c0ffffff}) 10:56:23 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5600, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) capset(&(0x7f0000000080)={0x399f1736, r1}, &(0x7f00000000c0)={0x1339, 0x80, 0x1, 0x19, 0x6, 0x7}) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:23 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x400000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_F\x00', 0x2000000c0ffffff}) 10:56:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x3201, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:23 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x286001, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x1a, &(0x7f0000000380)=0x4, 0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000080)=""/244, &(0x7f0000000000)=0xf4) openat$nullb(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nullb0\x00', 0x410600, 0x0) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x1, 0x101200) unshare(0x2000400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x4000, 0x0) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000300)) ioctl$KVM_GET_DEVICE_ATTR(r3, 0x4018aee2, &(0x7f0000000240)={0x0, 0x6, 0x40, &(0x7f0000000200)=0xfc000}) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) [ 283.651269] gfs2: invalid mount option: locktable= [ 283.656310] gfs2: can't parse mount arguments 10:56:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 283.733581] IPVS: length: 244 != 8 10:56:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) [ 283.758420] IPVS: length: 244 != 8 10:56:23 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_+\x00', 0x2000000c0ffffff}) [ 283.790566] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 283.846948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.859560] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.865963] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.936073] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:24 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="0b00000075000000003fe1000095d54c32984348c4fb150848d4fa04"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) socket$inet6(0xa, 0x5, 0x40) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x2a, 0x2, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x4e23, 0x30c1, @mcast2, 0x9}}}, 0x88) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x68, r2, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xe5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xb2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x810) 10:56:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:24 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xd701, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl(r0, 0x8994, &(0x7f0000000200)="fdcd62a8552ba50f23288bba71fbcb86641854527b192747450abe15af9788375216bcd9574dd2eec36cebc00c0bd79ca0ac2ddf776221ffff000000000000077464be956779c1e9f64a29a46647af3eac042bfaff013512c6cdde9efa04577b5422a4d42df3163b67503af64998dcdbbe84bd957fd09a976b") unshare(0x2000400) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x461d, 0x18d642) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040)=0xbe1, 0x4) 10:56:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f3003f2", 0x2000000c0ffffff}) 10:56:24 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_-\x00', 0x2000000c0ffffff}) 10:56:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5a00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 284.501242] gfs2: invalid mount option: locktable= [ 284.506321] gfs2: can't parse mount arguments 10:56:24 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_\x00 \x00', 0x2000000c0ffffff}) 10:56:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:24 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x4) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) 10:56:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 284.683668] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.690121] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.808038] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.816358] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.822737] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xa501, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:24 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdfd, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:24 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xf98e8298f9976334, 0x75, 0x1}, 0x18d) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) r2 = semget$private(0x0, 0x2, 0x40) semop(r2, &(0x7f0000000080)=[{0x5, 0x10000}, {0x1, 0x20, 0x1000}, {0x0, 0x1}], 0x3) 10:56:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f0000000080)=0x14) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={r2, @loopback, @rand_addr}, 0xc) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='+!\x00', r0}, 0x10) 10:56:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:24 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00`', 0x2000000c0ffffff}) [ 285.317503] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 285.333469] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.340494] gfs2: invalid mount option: locktable= [ 285.341320] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.345765] gfs2: can't parse mount arguments [ 285.352097] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) [ 285.368164] validate_nla: 14 callbacks suppressed [ 285.373261] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:25 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 285.483909] gfs2: invalid mount option: locktable= [ 285.488930] gfs2: can't parse mount arguments [ 285.494930] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.502909] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.513751] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.520156] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:25 executing program 1: r0 = socket$inet6(0xa, 0x80005, 0x2) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x7, 0xfffffffffffffe7e) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000000)={0x0, 0xffffffffffffff80}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r3, 0x7ff}, &(0x7f0000000100)=0x8) socket$unix(0x1, 0x2, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000180)) 10:56:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xeb01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:25 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:25 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 285.531846] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.538232] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.557232] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc8070014") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@mcast2, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000180)={r2, 0x1, 0x6, @random="0f86719c3128"}, 0x10) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0xb0b, 0x3, @empty, 0x3}, {0xa, 0x4e22, 0x80000000, @remote, 0x7}, 0x81, [0x2, 0x6, 0x2, 0x697, 0xfff, 0x2, 0x4]}, 0x5c) [ 285.679241] gfs2: invalid mount option: locktable= [ 285.684273] gfs2: can't parse mount arguments 10:56:25 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3f000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f30ffff", 0x2000000c0ffffff}) [ 285.780384] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.788851] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.795250] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.796205] gfs2: invalid mount option: locktable= [ 285.806758] gfs2: can't parse mount arguments [ 285.813362] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.821454] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 285.844594] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.848814] gfs2: invalid mount option: locktable= [ 285.850989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.862455] gfs2: can't parse mount arguments [ 285.872343] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.884556] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.890985] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.932450] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 286.030878] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:25 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000080)=0x3, 0x4) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f76") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5601, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:25 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xf0080000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x10001) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:25 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f300600", 0x2000000c0ffffff}) 10:56:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\f\x00', 0x2000000c0ffffff}) 10:56:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f76") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='lo\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000000c0)) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 286.164738] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.184527] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 286.202849] gfs2: invalid mount option: locktable= [ 286.207944] gfs2: can't parse mount arguments 10:56:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1600, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 286.219336] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:25 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4c000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xa001, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:25 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f76") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = dup2(r0, r0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000004c0)={0x5c11}) sendmmsg$inet_sctp(r1, &(0x7f0000000440)=[{&(0x7f0000000040)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000080)="61c35f5aef6b03f50d7f4160a8e5ad99d017a36074eb6ff1b3098cb23e38403930b39f399fea7ff74f70fed321db87f5dfd6657e03b85050b7c2adf511cfcc22f4d32b623c67acd2e1b7302c40d2a9fb846263f45ee7e8c69a70773cd5e63e6dd8df8d", 0x63}, {&(0x7f0000000100)="cb07c751dce4e568483b48df19ed0b3cebcb7c922a509dcd69fa7edee93f2247accb03d801f684fcf01cafb3c640530471c50566a72ca07550f10b73f8f96afe377ce07b2ef5d2822cacddd068626f3aac50201b8592bb91c2b34c80cfe8759d34734ebdc514712dba42ab027567d658b1e11f2b572e37ca683cebcb8ce2d2072d8c6120eff4131a1a7b731875ad1736fe48c592e0a968381e5c47cdc7dc2f963f6cb5676bb37adc3b6b62228a90afc54c719a622fc328a5718900c5d4b9b8b316c0c4fd8cc7adaea9e6c1", 0xcb}, {&(0x7f0000000200)="5bf8b8462f87e5935128c5cf6b7aa0cb0fbb5f19607c8c403065b7b69c10b0b52b2b1c2dec221eb486", 0x29}, {&(0x7f00000002c0)="4f835727af02c63aa79c511975ecf6902dcf7896961b2e027743612e1ecf81aa9642c30c3146f791bbb8cb5f2ee33849e1182b8d655bdc546ff6b7d4c33504bb48cc4bed7608949385cc39ff8b22913022c94263d6f3952af6fe65a7f97d92cee906c0f85e04232ade5a508895580b19788955f8bcbedd2c56477627b48e4d905b22ede20a809ebad7bf86473b5568f34b7f61a08f483457e6728bee5df8272b5210c58708da465c7adb588b88b4", 0xae}, {&(0x7f0000000240)="d62f9fe3e2d7a4b02f2df35f2a66d097b64f29e68f7e", 0x16}, {&(0x7f0000000380)="03727ea58f0f9c762d90164a3c0200344c679246047bc37bae408f008e57161704cc138bd82fada6da21d09a3ecd8478906a", 0x32}], 0x6}], 0x1, 0x80) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000480)={@empty, 0x0}, &(0x7f0000000580)=0x14) sendmsg$can_raw(r1, &(0x7f00000006c0)={&(0x7f00000005c0)={0x1d, r3}, 0x2c5, &(0x7f0000000680)={&(0x7f0000000500)=@can={{0x2, 0x2, 0x3, 0x1000}, 0x8, 0x3, 0x0, 0x0, "ec20aecd9a6bd92b"}, 0x10}, 0x1, 0x0, 0x0, 0x8010}, 0x20008041) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000000), 0x4) [ 286.387448] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 286.430521] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 286.441429] gfs2: invalid mount option: locktable= [ 286.446435] gfs2: can't parse mount arguments [ 286.477349] gfs2: invalid mount option: locktable= [ 286.482365] gfs2: can't parse mount arguments 10:56:26 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="edffffff75000000000000eece4d0568589d1a7c67006731f7015c7512d45391c7ec54582dabade6358854f523c3"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f30f5ff", 0x2000000c0ffffff}) 10:56:26 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f30feff", 0x2000000c0ffffff}) 10:56:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f7640") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xfc01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:26 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000080)={0x0, @remote, @rand_addr}, &(0x7f00000000c0)=0xc) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000100)={r1, @loopback, @dev={0xac, 0x14, 0x14, 0xb}}, 0xc) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x8, 0x3}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={r3, 0x9}, 0x8) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000040), 0x4) syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x4, 0x80) 10:56:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:26 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x48000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f7640") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6b00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:26 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 286.999460] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 287.038854] gfs2: invalid mount option: locktable= [ 287.043915] gfs2: can't parse mount arguments [ 287.061497] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f7640") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:26 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x20000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f300600", 0x2000000c0ffffff}) 10:56:26 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f300500", 0x2000000c0ffffff}) [ 287.262214] gfs2: invalid mount option: locktable= [ 287.267327] gfs2: can't parse mount arguments [ 287.297945] gfs2: invalid mount option: locktable= [ 287.303055] gfs2: can't parse mount arguments 10:56:27 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e20, @multicast1}}, [0x1ff, 0x3ff, 0x401, 0x3, 0x4, 0x7fff, 0xf6, 0x2, 0x6, 0x101, 0x6, 0x3, 0x80000000, 0xfffffffffffffffe, 0x81]}, &(0x7f00000000c0)=0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={r1, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x3) listen(r0, 0x5) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) sendfile(r0, r0, &(0x7f0000000140), 0x40) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7ff, 0x4000) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x30000004}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020025bd7000fbdbdf250100000004000500080002000a0022000800040001000000080004000300000004000500080002000a000000"], 0x3c}, 0x1, 0x0, 0x0, 0x20044040}, 0x4854) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000200)={{0xa, 0x4e22, 0x1000, @mcast2, 0xffffffff00000001}, {0xa, 0x4e20, 0xe23, @loopback}, 0x3, [0xfff, 0x401, 0xc27, 0xfff, 0x5, 0x67, 0x80, 0x3]}, 0x5c) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000280)=0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000580)=0xe8) getgroups(0x4, &(0x7f00000005c0)=[0xee00, 0xee01, 0x0, 0x0]) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000600)={r3, r4, r5}, 0xc) ioctl(r0, 0x8912, &(0x7f0000000400)="02c77b0700005f8f764070d5d25893eca46fe6590956d60c3c642bb23a02f8697ea8f7e376c53841bb81096f387426753cf5125a10b5400f1ea17be836abc674ce9e88aec53f7d163e7ab0b014deb67ad7dbc455ae13ddb4307f518d9ba26650886e953a8ac4b87780355f26f8c45b610250f6d5b38251") io_setup(0x9, &(0x7f00000002c0)) unshare(0x2000400) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x30, r2, 0x0, 0x70bd26, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_AF={0x8, 0x2, 0x2}]}, 0x30}}, 0x40) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) r6 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x4301, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:27 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\a\x00', 0x2000000c0ffffff}) 10:56:27 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xc0ed0000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xe600, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 287.841637] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 287.863911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 287.874914] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.881319] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 287.892546] gfs2: invalid mount option: locktable= [ 287.897554] gfs2: can't parse mount arguments 10:56:27 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x100000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 287.986722] gfs2: invalid mount option: locktable= [ 287.991775] gfs2: can't parse mount arguments 10:56:27 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xf008000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) [ 288.065327] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.079647] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.086050] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.100705] gfs2: invalid mount option: locktable= [ 288.105680] gfs2: can't parse mount arguments 10:56:27 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1501, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 288.197033] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 288.226536] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.235100] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.241509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.250338] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.257775] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.264165] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:28 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000007500000096f21d"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000002c0)=0x20, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) fcntl$dupfd(r1, 0x0, r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x218000, 0x0) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x8001, 0x80002) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0xc4001, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x40, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x440, 0x0) getpeername(r2, &(0x7f00000003c0)=@xdp, &(0x7f0000000440)=0x80) ioctl$TIOCSBRK(r3, 0x40044591) ioctl(r3, 0x0, &(0x7f0000000380)="282450072bd871581e24df698c495da7592b31fada45593b5198357ecd2377582c27c6b1284bce9d3366087120b7de6ab165") dup2(r0, r0) 10:56:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x220141, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) socket$inet_smc(0x2b, 0x1, 0x0) 10:56:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:28 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1a01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:28 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xab00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000040), 0x4) [ 288.740067] gfs2: invalid mount option: locktable= [ 288.745119] gfs2: can't parse mount arguments 10:56:28 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6800000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 288.783853] gfs2: invalid mount option: locktable= [ 288.788940] gfs2: can't parse mount arguments [ 288.825713] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.834131] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.842841] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.849230] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.863164] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.869609] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f300600", 0x2000000c0ffffff}) 10:56:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:28 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000080)={0x7e, @rand_addr=0xffffffff, 0x4e23, 0x4, 'lblcr\x00', 0xeea9f3d044ce4ca3, 0x5, 0x76}, 0x2f6) 10:56:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5b00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 288.900592] gfs2: invalid mount option: locktable= [ 288.905637] gfs2: can't parse mount arguments 10:56:28 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 289.056374] gfs2: invalid mount option: locktable= [ 289.061389] gfs2: can't parse mount arguments [ 289.076821] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.084680] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.091108] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.099740] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.118887] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.125286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.226678] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:29 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000075000000dc8b37"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000080)=r1, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:29 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:29 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x8000010060c00) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bridge_slave_1\x00', {0x2, 0x4e21, @multicast2}}) write$binfmt_elf32(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x10001, 0x2, 0xfff, 0x6, 0x400, 0x2, 0x3e, 0x6, 0x1bc, 0x38, 0x51, 0x1a, 0x3, 0x20, 0x2, 0x2e, 0x8, 0x2}, [{0x70000000, 0x4, 0xc6, 0x2, 0x9, 0x1, 0x2, 0x4}, {0x7, 0x28000000, 0x9, 0x8, 0xa31e, 0x8, 0x400, 0x8}], "a605a060ceae0186caaf835ea97658e88ecc191991d2260928075571901010199d4779ba126de9da79f5bb263122a58fc2378457dd305ecc96766b21ed95bd3ce014e22bdca8d5f490df525dfd66100e704b591643660a047f32e34afa712180c38cdd7067ca51b247028fa0ec4640b655073991fffb2752709390d4673b7ef82e4fc68b694cbb896176d5f5c3351a055c16b6caeeb49858a90e9b9498642d44cab9b7df78c415105c23f341012f9e1695bffd93796da3af729840450f47e87a8520b43b8d71093a56e08e07c47307d4e9b49ec68c2efe25385f17a34367f07c4a1e46389ec8d94236eeffc3fa38c0b0bc63b1ab0c38", [[]]}, 0x26e) 10:56:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2901, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:29 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x40000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 289.561812] gfs2: invalid mount option: locktable= [ 289.566864] gfs2: can't parse mount arguments [ 289.596991] gfs2: invalid mount option: locktable= [ 289.602063] gfs2: can't parse mount arguments [ 289.667137] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.678467] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.686484] gfs2: invalid mount option: locktable= [ 289.691588] gfs2: can't parse mount arguments [ 289.697575] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.704039] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:29 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) getsockopt(r0, 0x7, 0x8001, &(0x7f0000000080)=""/149, &(0x7f0000000000)=0x95) [ 289.713139] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.719574] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.729474] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.735915] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5401, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:29 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2010000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:29 executing program 4 (fault-call:4 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:29 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x700000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 289.862979] gfs2: invalid mount option: locktable= [ 289.868150] gfs2: can't parse mount arguments [ 289.892810] gfs2: invalid mount option: locktable= [ 289.897877] gfs2: can't parse mount arguments [ 289.947835] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.964246] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.972421] gfs2: invalid mount option: locktable= [ 289.977480] gfs2: can't parse mount arguments [ 289.983117] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.989584] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:29 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f300005", 0x2000000c0ffffff}) [ 289.997733] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.004193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.034988] gfs2: invalid mount option: locktable= [ 290.039983] gfs2: can't parse mount arguments [ 290.061780] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.074231] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.080690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.130838] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.151258] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.157717] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:30 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b0000db5a855048a5c86f6da8007500000000009d"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) r2 = dup(r0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) dup(r2) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00B@\x00\x00\x00\x00\x00\x00\x00']) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xe501, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x20000) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x22900, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) io_setup(0xc1f6, &(0x7f0000000100)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) io_getevents(r3, 0x5, 0x3, &(0x7f0000000140)=[{}, {}, {}], &(0x7f0000000200)={r4, r5+10000000}) 10:56:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:30 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:30 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:30 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 290.437651] gfs2: invalid mount option: locktable= [ 290.442687] gfs2: can't parse mount arguments [ 290.470931] gfs2: invalid mount option: locktable= [ 290.475986] gfs2: can't parse mount arguments 10:56:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x9, &(0x7f0000000040), 0x4) 10:56:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x8b00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 290.527230] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.540867] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.549077] gfs2: invalid mount option: locktable= [ 290.552126] validate_nla: 13 callbacks suppressed [ 290.552133] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 290.554058] gfs2: can't parse mount arguments 10:56:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 290.601165] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.603139] gfs2: invalid mount option: locktable= [ 290.607624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.612560] gfs2: can't parse mount arguments [ 290.625248] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 290.634634] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.641085] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:30 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) fcntl$addseals(r0, 0x409, 0x2) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:30 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 290.664076] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.693212] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.699645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.746003] gfs2: invalid mount option: locktable= [ 290.751032] gfs2: can't parse mount arguments 10:56:30 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x200000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 290.793232] gfs2: invalid mount option: locktable= [ 290.798282] gfs2: can't parse mount arguments [ 290.846524] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.856515] gfs2: invalid mount option: locktable= [ 290.861571] gfs2: can't parse mount arguments [ 290.867620] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.874006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.885241] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 290.914191] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.921669] gfs2: invalid mount option: locktable= [ 290.926670] gfs2: can't parse mount arguments [ 290.934286] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.940690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.954317] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 290.976245] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.987576] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.993963] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:30 executing program 3: r0 = dup(0xffffffffffffff9c) write$P9_RREAD(r0, &(0x7f0000000100)=ANY=[@ANYRESOCT], 0x17) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000380)={0x0, 0x2, 0xfffffffffffff000, 0xfff, 0xffffffff80000001, 0x4}, &(0x7f00000003c0)=0x14) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000400)={r2, 0xffffffff}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r1, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r4 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r4, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000480)={{0x2, 0x4e22, @multicast1}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x2, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x13}}, 'eql\x00'}) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000440)) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x4}, 0xb) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000080)={r3, 0x401}, &(0x7f00000000c0)=0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000280)={0xab2, 0x2, 0xba0, 0x2, 0x8b6}, 0x14) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000140)) ioctl$TIOCSBRK(r0, 0x40044591) 10:56:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x8900, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f300003", 0x2000000c0ffffff}) 10:56:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1d, &(0x7f0000000040), 0x4) 10:56:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") open_by_handle_at(r0, &(0x7f0000000180)={0x92, 0x10000, "0bd67985ce57b97e6fcedf846fcd6f40968e46843e8e2e1799e6e2717b2b5398f8284c9e5fd6c777d24800bcc749c37b2378e86ad5a321d2ffa2b1965cb227f503087f34eb9bf24214d1a9ac391d0ce8a9ffeb38df42c445cb946ab0ceb101483607dcf2169c4ed90f3a8a426eecc5cec7b43b5dac9ba739f589ea57ec31c14cda656e8798b1baefecf6"}, 0x0) unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000080)="6e8e00cbbce9cfa4f5d9235d3dabc9b0d456c22c605dcf4a0370764f8d95955b18146973822df1834169ae5fc9e3b36db32d8e54913d16ce7f70cd4b62400674407ba1c384d1a190ccce190b4cd7cb3254f8b1a7e0469df25a00d9db6776824f07b81667ad509350aec3b44cabb7abc96a9d8592bde60fe04c7b4ec254cd930710acb7a71feca4df90d210a87f6871993656ec9c7c130536b2c155abc63f079950fd3093a2608a394e0f521ad4ff1d8505de91b97b424943517ead8417cd5d78c071c5b77442d9551f8a0c12a6bd5daf2db59a6558f9d4fa092c100a3884fd56848045da74b028b3258d731a176a225e6262931d79b87ad2883be404787ebdbc") setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:30 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f300300", 0x2000000c0ffffff}) 10:56:30 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 291.237871] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.253614] gfs2: invalid mount option: locktable= [ 291.258669] gfs2: can't parse mount arguments 10:56:30 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 291.287565] gfs2: invalid mount option: locktable= [ 291.292628] gfs2: can't parse mount arguments 10:56:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0xfffffffffffffffe, 0x4) [ 291.364197] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.372402] gfs2: invalid mount option: locktable= [ 291.377409] gfs2: can't parse mount arguments [ 291.384304] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 291.400588] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 10:56:31 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xcb00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000040), 0x4) [ 291.410982] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 291.419656] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.426065] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.441508] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 291.527481] gfs2: invalid mount option: locktable= [ 291.532526] gfs2: can't parse mount arguments 10:56:31 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4800, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 291.572640] gfs2: invalid mount option: locktable= [ 291.577682] gfs2: can't parse mount arguments [ 291.605373] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0H\x00', 0x2000000c0ffffff}) [ 291.619006] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 291.657850] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 291.724897] gfs2: invalid mount option: locktable= [ 291.729951] gfs2: can't parse mount arguments [ 291.752300] gfs2: invalid mount option: locktable= [ 291.757295] gfs2: can't parse mount arguments 10:56:31 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB='\v\x00\x00\x00e\x00\x00\x00\x00\x00\x00'], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x482000, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) fremovexattr(r0, &(0x7f0000000280)=@known='system.posix_acl_default\x00') getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000380)=0xffffffbe, 0xfffffffffffffffd) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000100)={'security\x00', 0x9, "e0550db7a4a5e05abb"}, &(0x7f0000000140)=0x2d) 10:56:31 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xe701, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0xffeffffffffffffd, 0x4) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x400, 0x800) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0xfff) 10:56:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040), 0x4) 10:56:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:31 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2010, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x7, &(0x7f0000000040), 0x4) [ 292.077329] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 292.097452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.106009] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.109099] gfs2: invalid mount option: locktable= [ 292.112403] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x16, &(0x7f0000000040), 0x4) 10:56:31 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000240)=0x6) r1 = socket$inet6(0xa, 0x1000000000002, 0x40) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r2 = socket$inet(0x10, 0x3, 0x0) read(r2, &(0x7f00000002c0)=""/233, 0xe9) read(r2, &(0x7f0000000100)=""/94, 0x5e) read(r2, &(0x7f0000000000)=""/240, 0xf0) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) sendmsg(r2, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000006000)="1b0000005200030f07fffd946fa283bc04eee6d87986c497271d85", 0x1b}], 0x1}, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f00000001c0)="025cc80700145f8f764070") unshare(0x2000400) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:31 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x700, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 292.117333] gfs2: can't parse mount arguments [ 292.130411] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 292.145002] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.164082] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.170480] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xee00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:31 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 292.205381] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.211819] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.223578] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 292.280703] gfs2: invalid mount option: locktable= [ 292.280709] gfs2: can't parse mount arguments [ 292.304629] gfs2: invalid mount option: locktable= [ 292.304636] gfs2: can't parse mount arguments [ 292.389938] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.397855] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 292.406767] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.416239] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.422620] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.433440] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.442529] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.448934] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.462890] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.475507] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.481919] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:32 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x300, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f3003f4", 0x2000000c0ffffff}) 10:56:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000040), 0x4) 10:56:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xdd00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:32 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00 ', 0x2000000c0ffffff}) 10:56:32 executing program 1: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0xa0, &(0x7f0000000080)=[@in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x10f, @ipv4={[], [], @broadcast}, 0x3}, @in={0x2, 0x4e23, @rand_addr=0x1}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e20, 0xffffffff, @dev={0xfe, 0x80, [], 0x12}, 0x1}, @in6={0xa, 0x4e22, 0x6, @mcast1, 0x1}, @in6={0xa, 0x4e22, 0x1f, @empty, 0xffff}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x1}, &(0x7f0000000200)=0x8) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:32 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000c80)={0x0, 0xffffffffffffff14, &(0x7f0000000c40)}, &(0x7f0000000bc0)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080)=0x8, 0x4) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000380)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000001040)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000002c0)={@mcast1, 0x0}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) getpeername$packet(r1, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000007c0)=0x14) r10 = accept4$packet(r1, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000840)=0x14, 0x80800) r12 = add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000001000)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000001bc0)="130b681a782bcbdb1444dea89a73512256d8f18fa037d8113f9669b8152bb08fccfe040d92f3a8eb4bbd1dd60a48f6dc7eb1e8d47eeb50e45dac82856473e361a7719bbda1e5b119fe0969132166eedea8f55f4390bc21d9a4750f3b51c03e878bb616b6a96400e97f5fcffbdd9e6fb36f6c8fa17245607d9250458b1758a81f790943f697dd199e00366e73fbdfcd15d054ffd140d272fe8f3880f00a44274298", 0xa1, 0xfffffffffffffff8) keyctl$read(0xb, r12, &(0x7f0000001c80)=""/4096, 0x1000) write$binfmt_elf32(r0, &(0x7f0000001080)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7fffffff, 0x7f, 0x3f, 0x8, 0x3, 0x0, 0x2, 0x65, 0x38, 0x2e5, 0x8000, 0x1, 0x20, 0x2, 0x9, 0x5, 0x6}, [{0x6474e557, 0x3ff, 0x6, 0xcab, 0x1, 0xffffffffffff95a4, 0x80000000, 0x5}], "270fc6f1d7235d5dc95ff54f47a08fa30f34b79e6f6eaf9391b21a53013d179af2cafef87ea414cfee5a187c1f9f2dd8efdfa03761bb025efb31eed1705089a9876ba46adff3e092fa3c2bd8f9968ec9dad639ff340075c1424bcc9eb4e18ee2679d798142f4149a2eefbff519c7d890fbab0fa853f1d99f4f27a984aba1f6f933af03f2404e8a36d92c490410ebff864ac34be2ecfb30a6e4ae274a358e772e4e6e30312539d816c89c9f9dc9c1483215b37730c1194afa2141ba2614c7bcf40ecd", [[], [], [], [], [], [], [], [], [], []]}, 0xb1a) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002d40)={{{@in=@multicast2}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000002e40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000880)={{{@in=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000009c0)={'bridge0\x00', 0x0}) getsockopt$inet6_buf(r0, 0x29, 0xff, &(0x7f0000002c80)=""/111, &(0x7f0000002d00)=0x6f) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x132, r10, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000a00)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000b40)={@mcast1, 0x0}, &(0x7f0000000b80)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000fc0)={&(0x7f00000000c0), 0xc, &(0x7f0000000f80)={&(0x7f0000002e80)=ANY=[@ANYBLOB="bc030000", @ANYRES16=r2, @ANYBLOB="200128bd7000fbdbdf250100000008000100", @ANYRES32=r3, @ANYBLOB="44010200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000400000008000600", @ANYRES32=r4, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB="080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040000040000080007000000000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f6164636173740000004018c6000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040004000000080007000000000008000100", @ANYRES32=r6, @ANYBLOB="10020200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000700000008000600", @ANYRES32=r7, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r8, @ANYBLOB="08000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r11, @ANYBLOB="080007000000000054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000024000400000020c308000000000000b80100000000040004000000006fff00000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000008000600", @ANYRES32=r13, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400f36a000008000600", @ANYRES32=r15, @ANYBLOB="08000100", @ANYRES32=r16, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000008000300030000000800040007000000"], 0x3bc}, 0x1, 0x0, 0x0, 0x10}, 0x10) 10:56:32 executing program 1: r0 = socket$inet6(0xa, 0x9000000000002, 0xc4b) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x1, 0x802) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000180)={0x5, 0x70, 0x9, 0x4, 0xb3e, 0x3d98, 0x0, 0x98, 0x200, 0xd, 0x6, 0xff, 0x2, 0xa56, 0x4, 0x8, 0xd700000000000000, 0x8, 0x3, 0x40, 0x2, 0x2, 0x0, 0x8, 0x10001, 0x20, 0xfffffffffffffff8, 0x3, 0xff, 0x2, 0x66, 0x7, 0x5, 0x100000000, 0xb57b, 0x9, 0xffff, 0x9, 0x0, 0x200, 0x3, @perf_bp={&(0x7f0000000140), 0x1}, 0x30, 0x5, 0xff, 0x1, 0x100000001, 0x24000, 0x7}) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x7, @empty, 0x80000000}}, 0x7c, 0xe38, 0x0, 0x1a8, 0x10}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e21, 0x0, @mcast1, 0x1}}, 0x6af3504e, 0xe9}, 0x90) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000080)={0x1d4800000, 0x900e}, 0x2) accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x2a9, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000000c0)={'team0\x00', r4}) 10:56:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xaf01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 292.914607] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.936830] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.939969] gfs2: invalid mount option: locktable= [ 292.943266] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.948203] gfs2: can't parse mount arguments 10:56:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xe, &(0x7f0000000040), 0x4) 10:56:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8992, &(0x7f00000000c0)="025cc80700145f8f764070") unshare(0x1000000002000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000080)=0x14) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:32 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="0b0000007500f4ff000000ad79048b6f8e158ef03304669b3396a33d0c084bc88f2b2bbdf8e0b6142eb7a68eff7f50a8f5ff1e9ab040c139a64021f60ba38f47d7ccca59016795a71e"], 0xb) r0 = userfaultfd(0x800) r1 = socket$inet_udplite(0x2, 0x2, 0x88) splice(r0, &(0x7f0000000440), r1, &(0x7f0000000480), 0x3, 0x1) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) fgetxattr(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="62747266732e2525736563757269747975736572bf00"], &(0x7f0000000100)=""/13, 0xd) r3 = socket$inet6(0xa, 0x2000001, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r3, 0x2) r4 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x2, 0x400) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000380)={'tunl0\x00', @remote}) getsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r5 = accept4(r3, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r5, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) [ 293.032452] gfs2: invalid mount option: locktable= [ 293.037481] gfs2: can't parse mount arguments 10:56:32 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:32 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="f47a"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) getgid() setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x6, @broadcast}, 0x14) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) [ 293.174875] gfs2: invalid mount option: locktable= [ 293.179945] gfs2: can't parse mount arguments [ 293.196864] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.206695] gfs2: invalid mount option: locktable= [ 293.211764] gfs2: can't parse mount arguments [ 293.218943] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f300014", 0x2000000c0ffffff}) 10:56:32 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x600, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 293.228901] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.235327] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6500, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:32 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\b\x00', 0x2000000c0ffffff}) 10:56:32 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) r2 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x100, 0x101000) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f00000001c0)={0x318, @tick=0x401, 0x5, {0x9, 0x200}, 0x200, 0x1, 0x7}) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000080)=0x2, 0x4) unshare(0x2000400) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) r4 = fcntl$dupfd(r0, 0x406, r1) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r4, 0x40a85323, &(0x7f00000000c0)={{0xfff, 0x2}, 'port1\x00', 0x0, 0x40800, 0x2, 0xff, 0x10001, 0x8000, 0x400, 0x0, 0x4, 0x7}) ioctl$LOOP_SET_CAPACITY(r4, 0x4c07) 10:56:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x12, &(0x7f0000000040), 0x4) 10:56:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xa700, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 293.331416] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.337863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.371454] gfs2: invalid mount option: locktable= [ 293.376542] gfs2: can't parse mount arguments 10:56:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x6, &(0x7f0000000040), 0x4) 10:56:33 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x48, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 293.397159] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000080)=""/206, 0xce}, {&(0x7f0000000180)=""/238, 0xee}, {&(0x7f00000002c0)=""/96, 0x60}, {&(0x7f0000000340)=""/168, 0xa8}, {&(0x7f0000000000)=""/53, 0x35}, {&(0x7f0000000400)=""/135, 0x87}, {&(0x7f00000004c0)=""/2, 0x2}, {&(0x7f0000000500)=""/212, 0xd4}, {&(0x7f0000000600)=""/134, 0x86}], 0x9) unshare(0x2000400) r1 = syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x5, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000840)={0x54, 0x8, 0x5, {0x6, 0x9}, {0x7ff8000000000, 0x2}, @period={0x5d, 0x5b5, 0x1000, 0x6, 0x8, {0x0, 0x80000001, 0x6, 0x8001}, 0x5, [0x2, 0xb79e, 0x7, 0x5, 0xec73]}}) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) socket$bt_rfcomm(0x1f, 0x1, 0x3) r3 = syz_open_dev$vcsn(&(0x7f0000000780)='/dev/vcs#\x00', 0x5, 0x200000) ioctl$SG_GET_KEEP_ORPHAN(r3, 0x2288, &(0x7f00000007c0)) [ 293.482229] gfs2: invalid mount option: locktable= [ 293.487242] gfs2: can't parse mount arguments 10:56:33 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x40000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xc, &(0x7f0000000040), 0x4) [ 293.535364] gfs2: invalid mount option: locktable= [ 293.540424] gfs2: can't parse mount arguments [ 293.547722] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.555861] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.562254] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x8601, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 293.711011] gfs2: invalid mount option: locktable= [ 293.716081] gfs2: can't parse mount arguments [ 293.764064] gfs2: invalid mount option: locktable= [ 293.769084] gfs2: can't parse mount arguments 10:56:33 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="0b030000228c0000000000"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) socket$vsock_stream(0x28, 0x1, 0x0) 10:56:33 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 10:56:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\b\x00', 0x2000000c0ffffff}) 10:56:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10, &(0x7f0000000040), 0x4) 10:56:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xd00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:33 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x500, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:33 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xf008, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 294.014996] gfs2: invalid mount option: locktable= [ 294.020034] gfs2: can't parse mount arguments [ 294.042982] gfs2: invalid mount option: locktable= [ 294.047992] gfs2: can't parse mount arguments [ 294.122958] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.131531] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 294.142850] gfs2: invalid mount option: locktable= [ 294.147889] gfs2: can't parse mount arguments [ 294.152733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.161338] bridge0: port 1(bridge_slave_0) entered blocking state 10:56:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f0000000040), 0x4) 10:56:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6201, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 294.167772] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.223262] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.234577] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.240993] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x200, 0xfffffce2) 10:56:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4, &(0x7f0000000040), 0x4) 10:56:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6001, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 294.356414] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.362842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.475083] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.483015] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 294.490943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.499083] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.505467] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:34 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xb) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='#@vmnet1+\x00'}, 0x10) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r1, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:34 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff97, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:34 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x15, &(0x7f0000000040), 0x4) 10:56:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000005, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = dup3(r0, r0, 0x80000) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000640)=0xdb9) accept4(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000140)=0x80, 0x800) getsockopt$packet_int(r2, 0x107, 0xe, &(0x7f0000000180), &(0x7f00000001c0)=0x4) unshare(0x2000400) syz_mount_image$ntfs(&(0x7f0000000380)='ntfs\x00', &(0x7f00000003c0)='./file0\x00', 0xffff, 0x3, &(0x7f0000000580)=[{&(0x7f0000000400)="0c4406dd440ecfc4ff06307af68e9ee09aa7c423f10be06683a464afbf9aa640a06d820cfccd2ccd5790e08b240a9ab30830a8eff22e837c7cf1dd2a91b9d90b445698884c761cd54bbd0174b1348ede21af261dc3e654c90e97f34d4e542cde079470825b1f2d68882e2a4d1149fa5c8e63c03ee50bc916", 0x78, 0x100000000}, {&(0x7f0000000480)="bf79bdc61fc8f0d6a446c0c558c42498db6712735bb327bd37c5c57a22855ea89b08b3499fe3ef8c53751b809cd0955970c6ace4473c9dc0557dc9b4f0f4dd6f002d36b8399beabee42c213a1cc3e9308eb93699adf409182f67cd92cb4b448366ee156ddc62a3024ead6bf5487ed83b38360581233bc62634ae23", 0x7b, 0x5}, {&(0x7f0000000500)="51c6fa5d8137db67a6c4eda202430ea2935b02a8bea725f17753c9855c9ac1e60acf8ede8ba976f8f610e6c7ba81d0412fe19844c4d299ba9a27c3127309f244857b720ca7", 0x45, 0x5}], 0x100001, &(0x7f0000000780)=ANY=[@ANYBLOB="99db1e26f7f1252c07534af0f2432c4689a4"]) r3 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) r4 = creat(&(0x7f0000000200)='./file0\x00', 0x0) syz_open_pts(r4, 0x40000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000240)={0x0, 0x8}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000300)={r5, 0x0, 0x1}, &(0x7f0000000340)=0x8) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) io_setup(0x7, &(0x7f0000000680)=0x0) io_cancel(r6, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x80000000, r0, &(0x7f00000006c0)="6462f9b9d3f8521082f7624d5e7ba59251fc39d745739a3e9d118c5ba67e", 0x1e, 0x3, 0x0, 0x1, r1}, &(0x7f0000000740)) close(r3) ioctl$KVM_PPC_GET_PVINFO(r4, 0x4080aea1, &(0x7f0000000640)) 10:56:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x3100, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:34 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 294.872879] gfs2: invalid mount option: locktable= [ 294.877906] gfs2: can't parse mount arguments [ 294.906767] gfs2: invalid mount option: locktable= [ 294.911790] gfs2: can't parse mount arguments [ 294.969464] gfs2: invalid mount option: locktable= [ 294.974511] gfs2: can't parse mount arguments [ 294.987579] gfs2: invalid mount option: locktable= [ 294.992630] gfs2: can't parse mount arguments [ 295.003382] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.012096] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:34 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xd101, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0xff, &(0x7f00000000c0)="025c483e00145f8f764070") r1 = creat(&(0x7f0000000000)='./file0\x00', 0x20) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e20, @multicast2}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={r2, 0x3}, 0x8) unshare(0x2000400) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rpc\x00') ioctl$SCSI_IOCTL_SYNC(r3, 0x4) r4 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000240)) setsockopt$inet_tcp_int(r4, 0x6, 0x200000000000022, &(0x7f0000000040)=0x40000, 0x4) [ 295.030219] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.036607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.047538] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.053931] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000040), 0x4) [ 295.104310] gfs2: invalid mount option: locktable= [ 295.109329] gfs2: can't parse mount arguments 10:56:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000020008, 0x2) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x436900) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x68, &(0x7f0000000100)=[@in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x17}, 0x40}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e23, 0xfe, @empty, 0x87}]}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={r3, 0x2}, 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) r4 = semget$private(0x0, 0x4, 0x10) semctl$SETVAL(r4, 0x3, 0x10, &(0x7f0000000240)=0xfffffffffffffffd) 10:56:34 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 295.151717] gfs2: invalid mount option: locktable= [ 295.156779] gfs2: can't parse mount arguments [ 295.264611] gfs2: invalid mount option: locktable= [ 295.269683] gfs2: can't parse mount arguments [ 295.279918] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.287469] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.293853] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.301382] gfs2: invalid mount option: locktable= [ 295.306401] gfs2: can't parse mount arguments [ 295.312509] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.324002] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.330394] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:35 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f00000000c0)) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r1 = socket$inet6(0xa, 0x5, 0x2201) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r1, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r2) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff00000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:35 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x5, &(0x7f0000000040), 0x4) 10:56:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xbf00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:35 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101000) r1 = socket$unix(0x1, 0x7, 0x0) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x2100, 0x0) r3 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x800) r4 = inotify_init1(0x800) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000100)=ANY=[@ANYBLOB="0500000000000000ed0d0000000008000400000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r2, @ANYBLOB="00000000020000000000000000000000000000000000000000000000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x009\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="00000000020000000000000000000000000000000000000000000000"]) write$P9_RSETATTR(r0, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x2000) unshare(0x2000400) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 295.683043] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.715890] QAT: Invalid ioctl [ 295.723109] gfs2: invalid mount option: locktable= [ 295.728183] gfs2: can't parse mount arguments 10:56:35 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000380)={0xef, 0x75, 0x0, {0xe4, "9653e91a8b2b405ec0eb118cc3cd4a824f87e9e65f78d8b3b64b681aa1a2e60ffd8167d44188fd65dcd0994f04fefb42d2e741f8808eb36f87798c992c9554215a5bd3d0bfa4c8548381944cc98935922a0a4502e1815ce824491258845415e69c1fb858e9cfb79ec661d1f3c4112ae727827c6bd44a90f57be687b772ebfb00da588dd6ffe7dee66389afdfa09eeb88c087b0aac022037a4c4d4dbd7db267d9d67b4e01d9c94e225c5412bfb4181a1a4320f6fec6c68338fa13f567ac6cd62194606160acae3af8e280b727065fae0255b46e74a0c2f47f7c4c5f66bb5a2e9894064fd5"}}, 0xef) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) [ 295.734460] QAT: Invalid ioctl 10:56:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 295.774498] gfs2: invalid mount option: locktable= [ 295.779521] gfs2: can't parse mount arguments [ 295.844274] gfs2: invalid mount option: locktable= [ 295.849342] gfs2: can't parse mount arguments [ 295.878841] gfs2: invalid mount option: locktable= [ 295.883857] gfs2: can't parse mount arguments 10:56:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x74000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 295.890673] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.898370] validate_nla: 16 callbacks suppressed [ 295.898377] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 295.911950] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 295.920407] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.926793] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040), 0x4) 10:56:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x7e00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x40, 0x480) write$vnet(r1, &(0x7f00000001c0)={0x1, {&(0x7f00000000c0)=""/86, 0x56, &(0x7f0000000140)=""/67, 0x1, 0x7}}, 0x68) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc80700145f8f764070") r2 = fcntl$dupfd(r0, 0x0, r0) socket$unix(0x1, 0x2, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x4) dup(r0) unshare(0x4000002000400) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 295.938540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.954579] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.960974] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 296.016071] gfs2: invalid mount option: locktable= [ 296.019283] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 296.021099] gfs2: can't parse mount arguments 10:56:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 296.131671] gfs2: invalid mount option: locktable= [ 296.136730] gfs2: can't parse mount arguments [ 296.155006] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.166906] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.167236] gfs2: invalid mount option: locktable= 10:56:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff8c, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:35 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00\a', 0x2000000c0ffffff}) 10:56:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x7801, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 296.173300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.184771] gfs2: can't parse mount arguments [ 296.190470] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.201877] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:35 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x10000, 0x0) unshare(0x2000400) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x1, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000140)=ANY=[@ANYBLOB="090000000000000001000080ff7f0000000400000700000007000000000000000100008080ffffffdf0000000500000001000000000000000000000001000100010000007f00000006000000000000000b0000808100000081000000070000007f0000000080000000000000030000000100010026c4000000000000000000000b0000c0050000000400000025feffff020000695300000001000080090000403f000000008000000000000000000000040000000000000002000000000000000200000000000000090000c00100000003000000060000000700000000000000"]) write$FUSE_WRITE(r1, &(0x7f0000000080)={0x18, 0x0, 0x1, {0x1000}}, 0x18) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f00000000c0)=0x4, 0xfffffffffffffff6) 10:56:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f0000000040), 0x4) 10:56:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6800, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 296.300193] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.306650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.308126] gfs2: invalid mount option: locktable= [ 296.318194] gfs2: can't parse mount arguments [ 296.395767] gfs2: invalid mount option: locktable= [ 296.400898] gfs2: can't parse mount arguments [ 296.481907] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.490661] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.498617] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.504970] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.512067] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 296.520914] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.527298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.541487] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:36 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x101000, 0x0) write$P9_RREAD(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0b000000750000005ecfab2edb1aa41fecb9b6ece73196c8b1ca652f6bd7ce47ff320d12dde7b5f6c7dcd86a"], 0xfffffffffffffdb7) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r1, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) read$eventfd(r0, &(0x7f0000000080), 0x8) 10:56:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20000, 0x0) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f0000000080)={[{0x9, 0x9, 0x8, 0xef51, 0x4, 0x0, 0x1, 0x401, 0x3, 0x89, 0x3ff1, 0x20, 0x2}, {0x6, 0x400, 0x5, 0x7, 0x1, 0x2, 0x8001, 0x2, 0x8, 0x0, 0x8, 0xaf11, 0x4}, {0x4, 0xff, 0x1, 0x4, 0x6, 0x5, 0xff, 0xb66f, 0x7f, 0x9, 0x80, 0x6, 0x1}], 0x8}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="7261770000000001000100000000000000000000000000000000000000000000090000000300000038020000b800000000000000b8000000b8000000b8000000a0010000a0010000a0010000a0010000a001000003000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000000000000020004e4f545241434b000000000000000000000000000000000000000000000000000001ffffffffff0000000000000076657468305f746f5f7465616d00000076657468305f746f5f6272696467650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080001060000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000b0000000000000028004d41524b00000000000000000000000000000000000000000000000000020100000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x298) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:36 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x60, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x11, &(0x7f0000000040), 0x4) 10:56:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6601, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:36 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f307fff", 0x2000000c0ffffff}) 10:56:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:36 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1f00, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 296.647987] gfs2: invalid mount option: locktable= [ 296.653047] gfs2: can't parse mount arguments [ 296.668363] gfs2: invalid mount option: locktable= [ 296.673440] gfs2: can't parse mount arguments [ 296.683059] Unknown ioctl 1081126560 10:56:36 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f300200", 0x2000000c0ffffff}) [ 296.720552] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.728840] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.735222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.738846] gfs2: invalid mount option: locktable= [ 296.746802] gfs2: can't parse mount arguments [ 296.752543] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.759979] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x21, &(0x7f0000000040), 0x4) [ 296.769366] Unknown ioctl 1081126560 10:56:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = dup3(r0, r0, 0x80000) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000080)=r2) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) r4 = getuid() getresgid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) fchownat(r1, &(0x7f0000000140)='./file0\x00', r4, r5, 0x1100) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) 10:56:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xf201, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:36 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:36 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xd, &(0x7f0000000040), 0x4) [ 296.894001] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.900464] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.941354] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 296.961768] gfs2: invalid mount option: locktable= [ 296.966748] gfs2: can't parse mount arguments [ 297.027747] gfs2: invalid mount option: locktable= [ 297.032711] gfs2: can't parse mount arguments [ 297.040765] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.053065] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.060714] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.067098] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.074620] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:37 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) socket$kcm(0x29, 0x5, 0x0) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) sysfs$3(0x3) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xa900, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e22, 0xffff, @dev={0xfe, 0x80, [], 0x17}, 0x5}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e21, @loopback}}, 0x1, 0x2, 0xfffffffffffffff7, 0x1f, 0x80000000}, &(0x7f0000000000)=0x98) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e24, 0x0, @local, 0x8001}}, 0x800, 0x10000}, 0x90) r4 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x401, 0x200000) ioctl$EVIOCSFF(r4, 0x40304580, &(0x7f00000002c0)={0x57, 0x7, 0x8, {0x0, 0x7}, {0x7fff, 0x1}, @period={0x5b, 0x5, 0x8, 0x3ff, 0x3, {0xfffffffffffffff9, 0xffff, 0x100000001}, 0x4, [0x6, 0x80000000, 0x9, 0x10000]}}) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:37 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1f00000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000040), 0x4) 10:56:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\a\x00', 0x2000000c0ffffff}) 10:56:37 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1e01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) write$binfmt_aout(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="cc0007062900000070030000018a66e6bce11a8ee35b000000ed010000070000000000000000000000aa0825dbbab02f987641ff31e706f0907a1101dd8843be82db907b021800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fd6c206300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x43d) 10:56:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x3, &(0x7f0000000040), 0x4) [ 297.518707] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 297.541311] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 297.559671] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.589547] gfs2: invalid mount option: locktable= [ 297.594580] gfs2: can't parse mount arguments [ 297.600726] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.607103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.620537] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:37 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x110, r3, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x2}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x14}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x16}}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1000}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfffffffffffffff7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x80}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x81}]}, 0x110}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) 10:56:37 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x600000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) 10:56:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x8b01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 297.635662] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.642062] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.799159] gfs2: invalid mount option: locktable= [ 297.804212] gfs2: can't parse mount arguments [ 297.828357] gfs2: invalid mount option: locktable= [ 297.833352] gfs2: can't parse mount arguments 10:56:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:38 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f30ffff", 0x2000000c0ffffff}) 10:56:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5e01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x24, &(0x7f0000000040), 0x4) 10:56:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) 10:56:38 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00200075000000000000fe6d3fd953a05d53f8b4fae31845255c8b73fd7c77acf86d034502f38cb5e41f3619229bd6110404359625b597e96738ccf286563c5b81c16538b7ef3480fc5a57265ca373eae0f8a475eef92de110769419e172a470d337c55c5242ab7f84f04b8c3edc1d0315ed89407cb7fb84751a1dfc060cafab11ffce3d7997a80aedbf3c02724715c7a26a54418baa0821b128"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x78) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x1) r2 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000080)={0x0, 0x37e08492, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff9}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfcfdffff, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x3) [ 298.395787] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 298.403670] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 298.421269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 298.432348] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.438777] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2801, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8112, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000000c0)={0x3ff, 0x5, 0x2, 'queue0\x00', 0x81}) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f0000000000)) [ 298.456586] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.458783] gfs2: invalid mount option: locktable= [ 298.468044] gfs2: can't parse mount arguments 10:56:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x68000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$void(r0, 0xc0045878) ioctl(r0, 0x15, &(0x7f00000002c0)="025cc80700145f8f764070995ff4c03dd399b14a63da7086d4bdd7c4b1c434928dd67e19e0e9717e560ea1e1450f2f8e69558762968da482630777b24e73b73697a3915a8e1c6038e5952e84e6e31589961d8723091ccaa4d121af9db94de23e4d1f5d9a1ea002f0300905ee84d17ccc9b2cb3769386d7851ae70700072100000000000000000000") unshare(0x2002c010800) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000200)={0x9, 0x100000001, 0x8, 0xc72, 0x100}, 0x14) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7fff, 0x4000) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000240)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x19}}, {0x306, @remote}, 0x4, {0x2, 0x4e21, @multicast2}, 'syz_tun\x00'}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0x5a, "6d1fc2264303fff419671223e1aa581db862c3cf930732aa25e2d163bbb56ca79ee9e599a6bcef2315334d2f8478d1ee50ece4c9838d3b3bf8567022faf1be537357a5c9b6690e5e23be8192dec375e820ab6a6676a89d7d9bce"}, &(0x7f0000000100)=0x62) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={r3, @in={{0x2, 0x4e21, @broadcast}}}, 0x84) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:38 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x401, 0x4) [ 298.591220] gfs2: invalid mount option: locktable= [ 298.596246] gfs2: can't parse mount arguments 10:56:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x68, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xe000, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 298.647838] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.656290] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.662701] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:38 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:38 executing program 4: r0 = socket$inet6(0xa, 0x7, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x6, 0x30, 0x8, 0x40}, &(0x7f0000000140)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={r1, 0x6}, 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002900)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002a00)=0xe8) r4 = getuid() setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000002a40)={{{@in6=@mcast2, @in6=@loopback, 0x4e20, 0x0, 0x4e21, 0x10000, 0x0, 0xa0, 0x0, 0x2f, r3, r4}, {0xd2, 0xfffffffffffff4e0, 0x3, 0x53, 0xdd0d, 0x40000000, 0x1, 0xfffffffffffffffa}, {0x8, 0xffffffff, 0x7, 0x100000001}, 0x0, 0x6e6bb0, 0x1, 0x0, 0x3, 0x3}, {{@in=@rand_addr=0x401, 0x4d4, 0x7e}, 0xa, @in=@multicast2, 0x3506, 0x4, 0x2, 0x8, 0x0, 0xfff, 0xff9f}}, 0xe8) r5 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) r7 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000003c0)="a7c4b5286c98b730082b6e846104e0e8a0560bcd32abde53f2b451a7", 0x1c, 0xfffffffffffffff9) keyctl$get_persistent(0x16, r6, r7) ioctl$sock_inet_SIOCDELRT(r5, 0x890c, &(0x7f0000000080)={0x7, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x18}}, 0x8a, 0x7, 0x3b2a, 0x0, 0x6, &(0x7f0000000000)='veth0_to_bridge\x00', 0x6, 0x1, 0xfffffffffffffff8}) setsockopt$inet_tcp_int(r5, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 298.729050] gfs2: invalid mount option: locktable= [ 298.734105] gfs2: can't parse mount arguments 10:56:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6900, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 298.786713] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 298.818208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 298.835987] gfs2: invalid mount option: locktable= [ 298.841012] gfs2: can't parse mount arguments [ 298.849408] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.855821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.953008] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.962903] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.971286] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.977704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.986070] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.992473] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.074706] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.082763] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.089150] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:38 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x75, 0x3}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000380)=[@in6={0xa, 0x4e24, 0x917, @ipv4={[], [], @loopback}, 0x3}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e22, 0x33c, @remote, 0x6}, @in6={0xa, 0x4e20, 0x7ff, @mcast2, 0x6}, @in6={0xa, 0x4e24, 0x9, @remote, 0x1}, @in6={0xa, 0x4e20, 0x1, @ipv4={[], [], @loopback}, 0x3ff}, @in6={0xa, 0x4e23, 0xffffffffffffff81, @ipv4={[], [], @rand_addr=0x2}, 0x7}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e21, 0x4, @dev={0xfe, 0x80, [], 0x19}, 0x2000000}]}, &(0x7f00000000c0)=0xfffffffffffffec5) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x101000, 0x0) 10:56:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x97ffffff00000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20080, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x2e8, 0x8, &(0x7f0000000080)=0x3}) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:38 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000180)=0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=@updpolicy={0x190, 0x19, 0x100, 0x70bd25, 0x25dfdbfb, {{@in=@rand_addr=0x6, @in6=@mcast2, 0x4e24, 0x273c, 0x4e22, 0x5000000000000000, 0xa, 0xa0, 0x20, 0x3b, 0x0, r1}, {0x40, 0x0, 0xb6, 0x3, 0x3, 0x3, 0x8001, 0x3}, {0x4, 0x5, 0xffffffffffffffff, 0xfffffffffffffff9}, 0x1, 0x6e6bbf, 0x1, 0x1, 0x1, 0x3}, [@lifetime_val={0x24, 0x9, {0x2, 0x9, 0xfffffffffffffffa, 0x20}}, @srcaddr={0x14, 0xd, @in=@rand_addr=0x80000000}, @sec_ctx={0xa0, 0x8, {0x9a, 0x8, 0x1, 0x3, 0x92, "178a9bc5c4968e91710a7fa5f1dfae3848109906d6cb3f99154f42ae46dcb08d3933efb3e07081248c165282089be28c238207f39ebb30fb883049e417c89b327d2120315ed3e5af7b08f01f2d45cdea71af54820abc214ff09c5b7b2afe5394d8eed19bd56e329e6f0eacacfa6072cc39e2d7c545a74d8e3f8b619ffae041de9628ea7992c607e7638098aa69e30c189ab4"}}]}, 0x190}, 0x1, 0x0, 0x0, 0x1}, 0x8000) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:38 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f300006", 0x2000000c0ffffff}) 10:56:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xd001, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 299.255618] gfs2: invalid mount option: locktable= [ 299.260681] gfs2: can't parse mount arguments [ 299.286162] gfs2: invalid mount option: locktable= [ 299.291243] gfs2: can't parse mount arguments [ 299.337318] gfs2: invalid mount option: locktable= [ 299.342394] gfs2: can't parse mount arguments [ 299.362099] gfs2: invalid mount option: locktable= [ 299.362456] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.367091] gfs2: can't parse mount arguments 10:56:39 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8f0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 299.382494] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.391307] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.397713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.416282] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.422694] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xdb01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8480, 0x0) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000080)=""/185) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x100, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000140)={0x8, 0x7, 0x101, 0x800000000006, 0x9}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4100, 0x0) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f0000000080)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f00000002c0)=""/154) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 299.448646] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.464469] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.470886] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.482332] gfs2: invalid mount option: locktable= [ 299.487395] gfs2: can't parse mount arguments 10:56:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:39 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 299.644564] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.652272] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.658644] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.668307] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.681715] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.688102] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.709989] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.721955] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.728339] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:39 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:39 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff00000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:39 executing program 4: ioctl(0xffffffffffffffff, 0x5b, &(0x7f0000000080)="140000000000ddffa9b300") unshare(0x2000400) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) fchown(0xffffffffffffffff, r0, r1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) sched_getattr(r3, &(0x7f00000000c0), 0x30, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x3, 0x30}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={r1, 0x80000001, 0x86, 0x7ff, 0x3, 0x7fffffff}, &(0x7f0000000100)=0x14) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5500, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:39 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @local}}, 0x20, 0xfff}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r1, 0x5}, &(0x7f00000001c0)=0x8) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 300.069572] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.085791] gfs2: invalid mount option: locktable= [ 300.090840] gfs2: can't parse mount arguments 10:56:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000003, 0xfffffffffffffffe) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000100), 0x1) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x1000}, 0x10) r2 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xffffffff, 0x50840) sendmsg$nl_generic(r2, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x364, 0x37, 0x100, 0x70bd2b, 0x25dfdbfb, {0xf}, [@generic="1b025947c09a6f8bdcb2c186f6816a9014f1de062a4b37258a65d7d4bdc2ace059cff3d636210ad2945423fdfd2dd46b37a4a49b10cb74c1dd1c3001f029e342e771a87a767bab55b16254ae5dfbf6e0d08e69a39bceb5da923f779ce1494323e178965886c3954319432f8b2b4e72509d155b8865b028c721bd6dd85f438e0917", @typed={0xc, 0x91, @u64=0x6}, @generic="f3b5698be11bf80de441bbfd9db2a83d10f1a20c60a49299409e5a2a7d4f1c24bdcb9df175277709fac712442ff17f849a3e2216cf4565e062e73bc6843428a6c24f97a8e5032a79814377b40bc7983299c3a90b5a8ade2360f104cd46ef5d5c96105be095a0604b5b80c94e8279852187876e1100ee3d488dff2bd1a1876803b74f117bd133739ff6b9c3b57feb21472b625dde52d026022c1e382ec2a591a90db1c11c1bfae563a2beb88d5e4e7410fa57a7cd5515f14193533ce2efbee70b988d0ec52bf09bc0312981985936", @nested={0x1f4, 0x6f, [@generic="26a0072f8b0ac616713425c0ba76f1c3e8561577632e9c1a568d483eaa8a6bde0e9ac291112eda583f18e6c42ad8c411c5d97904d224ebc6e2378b5348390ab5f3a35e912504496381f57de202ff461e4930c94c893d1d49e009d84a56968c43f2b5a31e316120487fea69bc358350df737244349d795035c6c14d8d9387d4af147c0e03ac2a160962aaa7cb5e19ef3d33f64ce6bc068a1fa0b324d5d3f7aee4019ca205de9340f16d5243f4ea4f0a972c50fdb20830cf88fdba026a02f7ce2f8ad9800a2fa927b5a9c73dcd0d9a665dead9a341b14e6d4efe29", @generic="ff014bae969b84dd11bc95ab1168598e64f9989eb92d3f030ef2d5ce5f9a7b7873f3af781ac4c736ee7fca118c4a3d61594aa898e94ce8895bfd9c4c933ff7550f9aef", @generic="80ae08d2382b2102091bc7bb6ccf377d057982d754cfbac33b768d2d726fc1d059d4618e8e61b1ec66e5", @generic="973ce782729e9aa2e9448ac0fb452fd24998a219e99e98a6ae91329f6b140464a23644ad3615b4d9aa8e111735dfdeaf52c87f122852e2db16e2ba5b72d442d14dc6254b149dcd2369063c400cfd7319bb831271a388a37b94c72b2dcf9a09f314f21b279f1db657c0b2b82356d28ad11b6178a47458c8776d00e47bec466e833b5272b3a4f352331034a5612efe9e33a4d93600d8c1aa4ee49e8a0cddc4c84fcd281bbc0c647f"]}]}, 0x364}}, 0x8005) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) 10:56:39 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000900)={@remote, @multicast2, r2}, 0xc) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = dup(r0) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0', [], 0xa, "510e7f2b4563891b4279c8bca29b5f76bde993674c379b5ab1f599a1a89607a15789cd22978fdc5ffc1a3bcef8604f86e1916e19bc79625b5aecb7e83a2361fbc19587f5cd89d6009e16065954d1dcc82d53dfbd0e1abee4103600eba4e544c14a7c6a40d7b3653caeb6ccc9c91d6c60655a25a0b4c5a27b7600081b"}, 0x7d8bc0bcb1803ed8) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000000)) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000080)) getcwd(&(0x7f0000000440)=""/252, 0xfc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x80000001}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000340)={r2, 0x7, 0x7, [0x5, 0x5, 0x100, 0x0, 0xfff, 0x2, 0xffffffffffffff81]}, &(0x7f0000000380)=0x16) unshare(0x2000400) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x17, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x80000001}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r4, 0x8}, 0x8) [ 300.233680] gfs2: invalid mount option: locktable= [ 300.238742] gfs2: can't parse mount arguments 10:56:39 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffdfc, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xac00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 300.299015] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.306374] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 300.318146] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.324601] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.339718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.350621] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.357012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.372095] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.378814] gfs2: invalid mount option: locktable= [ 300.383811] gfs2: can't parse mount arguments [ 300.389556] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.395948] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.512503] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.520015] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.526371] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:40 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(0xffffffffffffffff, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r0 = creat(&(0x7f0000000080)='./file0\x00', 0xe0) ioctl$TCFLSH(r0, 0x540b, 0x5) r1 = accept4(0xffffffffffffffff, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000000c0)=0x4) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:40 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:40 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffd, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0xfffffffffffffd90) 10:56:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xce01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000000)="1d0b24591c9fc39c13f563125f084c5e", 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = dup3(r1, r1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x13f}}, 0x20) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:40 executing program 3: socketpair$inet6(0xa, 0x4, 0x9, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0)=0x6, 0x4) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r1, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000380)='./file0\x00', 0x7, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="62471f320b09109e60cde0db34e73665e7fffd661aa9766caf8ecbdac75758757f850fcc6a15d7613ce30290142062740cd504f02f52f8d4716fb5a3701d8b199bbe348ce865e4267fbd5780677a1050c27ad73aa4f5bd14baeda0eed4ab9954c0ba0549dd3c369459ae722ac0d59baf00a3b59eddf64ff4", 0x78, 0x9}, {&(0x7f0000000440)="0ca9ce95b367026edab6c9162d0e2ea1e3a1e7463001bf90cae9833cafcab9a0ee1bb96fd029428fbc80d4c41b7a6994cc294aa6ffd2ba1b41879f94c0ebb5e8f9f859f8154adb05b1a9e4f958467024d03bdd0b9f9e438a388dddcaeb778d8bab409a19b8ffcbce3dfd51f555a8a0af765e4a17de2a229bb3aa47a26250107f15229458c1f9b2d3fc7c8b2d82e184c7ac1553ef102eae7e65444cb0cb265376ad89cc5459085fc5d4ccd2f5f2620e2c6e4e2c1e65db1323ab65d15d84fd11303f3e9c8fb96c0253d2562a6546b870ee745d5799cbd05dad7110a806f98abce948ca28cc080db3932d9fe627b1", 0xed, 0x8}, {&(0x7f0000000540)="6dee01fea3a30892e58dfc677e4a874cb80615105b5bc58e62b211b9e72aa8ca4a40bcc966885f565a482622230b381c7e763bdedba6429a78e3795397cc8f3f91a89c8c9f230e9fbdd871912849e39f0c67f20cc1bc37a806042a82459992a4b44bd81492008a5c5b7eef3c51cf14f998b569c6c1b933b1fe7c6ab580a0cc", 0x7f, 0x6}], 0x200000, &(0x7f0000000640)={[{@balloc_border='block-allocator=border'}, {@grpjquota='grpjquota'}, {@balloc_no_unhash_reloc='block-allocator=no_unhashed_relocation'}, {@grpquota='grpquota'}, {@errors_continue='errors=continue'}, {@grpquota='grpquota'}]}) r3 = syz_open_dev$vcsn(&(0x7f00000006c0)='/dev/vcs#\x00', 0x6d, 0x400000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000700)={0x0}, &(0x7f0000000740)=0xc) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000780)={[], 0x3, 0x1f, 0x80, 0xb08c, 0x1f, r4}) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x80500, 0x0) write$P9_RSTATFS(r5, &(0x7f0000000280)={0x43, 0x9, 0x2, {0x6, 0x2, 0xaf, 0x6, 0x1, 0x9, 0x389f, 0x200, 0x7f}}, 0x43) [ 300.936186] gfs2: invalid mount option: locktable= [ 300.941212] gfs2: can't parse mount arguments [ 300.951065] validate_nla: 12 callbacks suppressed [ 300.951073] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 300.976281] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:40 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x10000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 301.073592] gfs2: invalid mount option: locktable= [ 301.078605] gfs2: can't parse mount arguments [ 301.116985] gfs2: invalid mount option: locktable= [ 301.122018] gfs2: can't parse mount arguments [ 301.126322] REISERFS warning (device loop3): super-6504 reiserfs_getopt: the option "grpjquota" requires an argument [ 301.126322] [ 301.133382] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.146323] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x100150, r0, 0x0) unshare(0x2000400) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x400000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x60, "b208d77f3d0d392168cd9ccc393c8b7d31eaa28e4717b9a16d1cf92ad7b88d5ac3beba4b24227a9d5aa883a04f690508476750e5fc043b3a69d7e4380748271f39fd9444f5fde1e2d4ef1e6cc0decfba039cf6d7f998e7ded18c894dc565f3e5"}, &(0x7f0000000100)=0x68) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={r2, 0x8}, 0x8) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xab01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:40 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 301.161690] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 301.180874] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 10:56:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 301.210965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.235786] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.242231] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = pkey_alloc(0x0, 0x1) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) pkey_free(r1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 301.258782] gfs2: invalid mount option: locktable= [ 301.263882] gfs2: can't parse mount arguments [ 301.268883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.278097] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.284486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.295420] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xedc000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 301.397465] gfs2: invalid mount option: locktable= [ 301.402468] gfs2: can't parse mount arguments [ 301.417866] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.425389] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.431746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.439680] bridge0: port 1(bridge_slave_0) entered blocking state 10:56:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) socketpair$inet(0x2, 0x800, 0xba97, &(0x7f0000000000)) listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/172, 0xac) [ 301.446041] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.453905] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:41 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f30ffff", 0x2000000c0ffffff}) 10:56:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000480)='/dev/audio\x00', 0x200000, 0x0) r3 = mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xc, 0x80010, r2, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xc8, 0x0, &(0x7f00000002c0)=[@reply={0x40406301, {0x2, 0x0, 0x1, 0x0, 0x10, 0x0, 0x0, 0x48, 0x10, &(0x7f00000000c0)=[@fda={0x66646185, 0x9, 0x0, 0x2f}, @ptr={0x70742a85, 0x1, &(0x7f0000000080), 0x1, 0x1, 0xe}], &(0x7f0000000140)=[0x40, 0x38]}}, @decrefs, @acquire, @enter_looper, @exit_looper, @decrefs={0x40046307, 0x4}, @increfs_done={0x40106308, r3}, @dead_binder_done={0x40086310, 0x1}, @transaction={0x40406300, {0x0, 0x0, 0x1, 0x0, 0x10, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000180)=[@fda={0x66646185, 0x0, 0x4, 0xc}, @fda={0x66646185, 0x4, 0x3, 0x5}, @fda={0x66646185, 0x0, 0x1, 0x13}], &(0x7f0000000200)=[0x0, 0x58, 0x20]}}], 0xb2, 0x0, &(0x7f00000003c0)="f44aa7aa05df8c6b74b32ba514ff362851575f5461e5c0e6b8a17b6f4b406c4a95b2a81aaa746ae885cfe67b0c09e6b18471352a08785b2261ac7c962e5855e3ed58ba4b5b27a4748f0e439309ab9a723f68a92b832d95eec31f39736509b8a16762eeab1fd1510a9840a141524d0b05a80f1eea108e7bec3f36dfcdba5cfd22f0072fe248f9ff6fdfec21ec124d66e659bd5b5a7b0d6cef302dab764b80862b46c12a9bb6d6000f368e359471ea19c2f42a"}) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x9701, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x97ffffff, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f00000003c0)=0xc) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0xadbb, 0x3, &(0x7f0000000340)=[{&(0x7f00000000c0)="24d911254d2f64e223b0fa9fd5092974ce54208d7d3be6410fc5a48cbf8906a0b2abf81110b97804ab83271a1221c3e5691341ce5cbd2a162ace37fcfb592d72167a16bace3ab4762d2a89322934d79dccd3f5ed22b92509823ba77254f47c789fa51d8c50d4242bcda686ee61f18c2e5889527a00fffcdaedcd21f1", 0x7c, 0x3f}, {&(0x7f0000000140)="ba05e5080fd35b3dcc92b7136b1fda925f186c41bec323336249db291c8c9d9824c64c0037d3349bb95ec5c97561e4989c59ee30ade61c0636ebe00148d49c43d99d95ee00f13bafae55b6a0a4230100fdd847d278d2391c994b243b503a19f4be0cde426de058500a1d903bf533ca6f75fe3ab44fc183f3a1f7ec641d6a58d0c9a78e99f589ddaa8483036e1add13598dce461beea046c25f563b16d915b65d268dff3a84b4922be4c34fca137115f8b2b4296c1cabcf6cac566ae97bd3d0edadc379440e36d02633f2ae6ad57af6c299444ce2ac702296b2e6f0de359aebfc92", 0xe1, 0x3}, {&(0x7f00000002c0)="323695101154ec2847cb99f2305027c325b2fe0581916be95bc75e29c796cc8ca7f5c79f75ea1156c19328bfb28db554c528f93190b90beca6978f0d6de840f25b95a41155e4e101", 0x48, 0x5}], 0x0, &(0x7f0000000400)={[{@fat=@uid={'uid', 0x3d, r2}}, {@nodots='nodots'}]}) [ 301.637931] gfs2: invalid mount option: locktable= [ 301.642958] gfs2: can't parse mount arguments [ 301.719308] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.730138] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.743818] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 301.756186] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.762601] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.772648] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 301.781695] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.795182] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.801593] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:41 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x210000, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f00000000c0)={0x0, r1}) socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x2000400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xd900, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x4e22, 0x5, @remote, 0x7}}, 0xffffffffffff787f, 0x6, 0x1c99733f, "6dc803b9f43895319672120db7cb33d86df5c7a1a02781d35b6a33d2486861001d089129462cb024f5d09c1e3b34581a6e868db22e16c9b6524f56c593e2e0bd4398bc67fad063c927a5e7b3460a5860"}, 0xd8) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00\a', 0x2000000c0ffffff}) 10:56:41 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="0b000e005a00019532db000100581b4947ee48c9a08969ac9120"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000380)={0x14, 0x88, 0xfa00, {r2, 0x3c, 0x0, @ib={0x1b, 0x455, 0x1, {"5917d604e0eb9576a21dc9f3575c51a8"}, 0x59cc, 0xe1, 0xeeb}}}, 0x90) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000140)) r3 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r3, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) getrusage(0xffffffffffffffff, &(0x7f0000000440)) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) 10:56:41 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 301.864453] REISERFS warning (device loop3): super-6504 reiserfs_getopt: the option "grpjquota" requires an argument [ 301.864453] [ 301.923930] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.930406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.954272] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.965607] gfs2: invalid mount option: locktable= 10:56:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x1, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000240)={0x6, &(0x7f0000000200)=[{0x2, 0x3, 0x6, 0x5}, {0x0, 0x942, 0x80000001, 0x7ff4}, {0x0, 0x0, 0x3, 0xfffffffffffffffb}, {0x4, 0x81, 0xd25, 0xb9}, {0x15bba0000000, 0x8207, 0x8, 0x20}, {0x128e, 0x8, 0x7f, 0x7}]}) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x8001, 0x30281) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000000)={0x0, 0xcb17}, &(0x7f0000000080)=0xec) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r4, 0x1}, &(0x7f0000000100)=0x8) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x857}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x9c}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000300)={0x4, 0xffffffffffffff4f, 0x8, 0x1ff, 0x1}, 0x14) 10:56:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x9300, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7400, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 301.970614] gfs2: can't parse mount arguments [ 301.979406] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 302.010259] gfs2: invalid mount option: locktable= [ 302.015264] gfs2: can't parse mount arguments [ 302.114338] gfs2: invalid mount option: locktable= [ 302.119445] gfs2: can't parse mount arguments [ 302.146971] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.147753] gfs2: invalid mount option: locktable= [ 302.158350] gfs2: can't parse mount arguments 10:56:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x602000, 0x0) mq_timedreceive(r1, &(0x7f0000000080)=""/112, 0x70, 0x0, &(0x7f0000000100)={0x77359400}) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000040), 0x4) [ 302.164341] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.170693] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.180518] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 302.192961] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 302.204122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 10:56:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f3003f6", 0x2000000c0ffffff}) 10:56:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1020, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 302.216252] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.222632] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:41 executing program 1: socket$inet6(0xa, 0x803, 0x0) unshare(0x2000400) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80800, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x0, 0x2, [0x0, 0x4]}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000100)=r1, 0x4) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1c00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 302.266742] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.277235] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.283618] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:42 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f30ffff", 0x2000000c0ffffff}) [ 302.346679] gfs2: invalid mount option: locktable= [ 302.351727] gfs2: can't parse mount arguments 10:56:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x8000) write$P9_RLINK(r2, &(0x7f0000000080)={0x7, 0x47, 0x2}, 0x7) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 302.442282] gfs2: invalid mount option: locktable= [ 302.447362] gfs2: can't parse mount arguments 10:56:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = dup3(r0, r0, 0x80000) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000000)={0x3, 0x9}) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000040), 0x4) [ 302.485131] gfs2: invalid mount option: locktable= [ 302.490150] gfs2: can't parse mount arguments [ 302.496030] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.504210] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 302.513376] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x8201, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 302.532932] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:42 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000080)=""/56, &(0x7f00000000c0)=0x38) 10:56:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x8, &(0x7f0000000000)=0x5, 0x4) 10:56:42 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00@', 0x2000000c0ffffff}) 10:56:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xc301, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x20100000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f30feff", 0x2000000c0ffffff}) 10:56:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) r1 = socket$inet_smc(0x2b, 0x1, 0x0) sync_file_range(r0, 0x0, 0x6, 0x2) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xd000, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) r2 = getgid() fchown(r0, r1, r2) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x17, &(0x7f0000000040), 0x4) [ 302.756551] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 302.770679] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.777114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.789105] gfs2: invalid mount option: locktable= [ 302.794127] gfs2: can't parse mount arguments 10:56:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="840588f2", @ANYRES16, @ANYBLOB="01002dbd7000ffdbdf25080000000800060007000000080006000500000024000100080002003f000000080006006f7666000800080001000000080004004e2400000800040007000000080005000600000008000600000000000800040000000000a43757f96f80ea8e77d06e4d92c4c4868d11becbe26ba4122ccfe41ce119ed8ec65e3ee5d534529fb5327b28e20b3b15c8992b3c570125e7fea760f90705e3a9f18dd869a18c2d8985efb1036b51436d809f0e4e5907990a2104c8d3e3095ccd5b8aa70f4671d6d5cc2ed8741fb0d2c0ede62cc1133a1bc8cac361bdbbb8a2948aa165037852ddbfdfc73b1e6e2483704a5ad319b888ccc23070c42972ad341e5985"], 0x68}, 0x1, 0x0, 0x0, 0x24000001}, 0x4000000) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6800, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6700, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 302.850618] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.887400] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.893845] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") syz_init_net_socket$llc(0x1a, 0x4, 0x0) unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 302.965297] gfs2: invalid mount option: locktable= [ 302.970335] gfs2: can't parse mount arguments [ 302.996552] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.003007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.130821] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.139334] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.145734] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:43 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7, 0x80000000004, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xa201, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x400, 0x80) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x100, 0x100) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000000c0)=r2) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000403) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:43 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0`\x00', 0x2000000c0ffffff}) 10:56:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:43 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x100) sendmsg$nfc_llcp(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x27, 0x1, 0x1, 0x7, 0x10000, 0x7, "018816ab2cb897f71b4991e6bcc89cd4186474b1316634773d06a87bf31971d7228ab157412d1138191411d9686f4edaf134d4eab24ef636b3ff1c56d6d8cb", 0x5}, 0x60, &(0x7f0000000140)=[{&(0x7f0000000100)="b0bb4883e5ed2cb15f5f4265bfe6099236838a66f5fc7aaf8e0f30e6c3656949294b5dfead9a63eadecc", 0x2a}], 0x1, &(0x7f00000002c0)={0x1010, 0x1ff, 0x8, "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"}, 0x1010, 0x80}, 0x20008000) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f307fff", 0x2000000c0ffffff}) [ 303.613945] gfs2: invalid mount option: locktable= [ 303.619019] gfs2: can't parse mount arguments 10:56:43 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x9600, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000d77968272d894225ab3a50d4be0c943c710b48298c40c3d966bc894b1088134225e03a521a0628d601731477f8e8b4eebd3fac8dbec7b93dd7c0a6a7cb6885882fab06761da57c25bf3d89ca06acfb18352a0112683dddb5c113dcadafb12c3aeb2e0fd4cc8e0d099fc9b06db0f2acbc9507e32b63e00f1f9a5bc85198dec7f3a8cfdff4df2e99850f9ce783a4c1af261a38df48534e9edfabe59eaaaa266a6c1b50210f8fd2b71616e7ae025b6362a5f2cb104690eec8950072bab7c0bef52ff2114f76ac5a28c61f80d4e478dfd341f227cfb2a8cbc3959ee63783edbd1a31f9bb18d8b99e26d5df6f0bf53aa2fce712f6df96a9a96e9ffa48b20d06919fb708b6c8359272f426a3fcc1044dfb3034abe4174ddd61ba19fb8a973f32459ed6aef86efe3d00df764a25fe71838d64a22b5b2521cc3a1194fd2a83dad97f0ec7c107000f3a8d560000049e752c983cc8446022645d5811caf3c4e5d380952bd7d9c78a7ca0", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0xc) unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) [ 303.717961] gfs2: invalid mount option: locktable= [ 303.723057] gfs2: can't parse mount arguments [ 303.731472] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.742776] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.754489] gfs2: invalid mount option: locktable= [ 303.759531] gfs2: can't parse mount arguments 10:56:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") close(r0) unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x200000, 0x0) sendmsg$nl_crypto(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x108}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)=@upd={0x120, 0x12, 0x308, 0x70bd27, 0x25dfdbfd, {{'drbg_pr_sha256\x00'}, [], [], 0x400, 0x400}, [{0x8, 0x1, 0x40}, {0x8, 0x1, 0x4}, {0x8, 0x1, 0xfff}, {0x8, 0x1, 0x20}, {0x8, 0x1, 0x7fff}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x7fffffff}, {0x8, 0x1, 0x8}]}, 0x120}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040001) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x800, 0x0) gettid() ioctl$KVM_TRANSLATE(r3, 0xc018ae85, &(0x7f0000000080)={0x0, 0x1f000, 0xd7fb, 0xa0, 0xa82}) 10:56:43 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f30c3ff", 0x2000000c0ffffff}) 10:56:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:43 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 303.885484] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 303.896657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.911448] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.917872] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.962125] gfs2: invalid mount option: locktable= [ 303.967203] gfs2: can't parse mount arguments [ 303.989892] gfs2: invalid mount option: locktable= [ 303.994918] gfs2: can't parse mount arguments [ 304.052054] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.059685] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.066130] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:44 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x0, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f00000000c0)={0x0, 0x6000, 0x3, 0x7c0f, 0x7e3d}) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x8e00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101002, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000000c0)={0x5, {{0x2, 0x4e21, @rand_addr=0x401}}}, 0x88) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000080)={0x7, 0x20, 0x1}) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff6, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9}, [@exit]}, &(0x7f00000000c0)='syzkaller\x00', 0xf, 0x8b, &(0x7f0000000100)=""/139, 0x40f00, 0x1, [], r1, 0x2}, 0x48) unshare(0x2000400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockname$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x1c) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x200, 0x401, 0x14, 0x5}, 0x8) 10:56:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00\n', 0x2000000c0ffffff}) 10:56:44 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f301400", 0x2000000c0ffffff}) 10:56:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000404) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:44 executing program 1: r0 = socket$inet6(0xa, 0x80000, 0xbc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x40000) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 304.479420] gfs2: invalid mount option: locktable= [ 304.484451] gfs2: can't parse mount arguments 10:56:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xedc0, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x7201, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 304.592800] gfs2: invalid mount option: locktable= [ 304.597877] gfs2: can't parse mount arguments [ 304.609035] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.618999] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.625396] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:44 executing program 4: r0 = socket$inet6(0xa, 0x1, 0xfffffffffffffffe) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'bond_slave_1\x00', {0x2, 0x4e22, @rand_addr=0x3}}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@mcast2, 0x4a3, 0x1, 0xff, 0x9, 0x7ff, 0x8, 0x40000000}, &(0x7f00000000c0)=0x20) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x100) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r1, 0x0) 10:56:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) r2 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x80) setsockopt$inet_dccp_int(r2, 0x21, 0xf, &(0x7f0000000080)=0x20, 0x4) [ 304.786224] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.798917] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 304.812476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 304.825362] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.831753] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:44 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0b0000007500000000000082a9ae35a41e7b1a83232d91e88bf6d2d2201411a676ebf83c546b4c7cc33cd53d709287d35c088fe616beab893a5e59327cfc7611a4a2585f33ce35d693990a0000389799e8fd9c9abb016caea0d345b553da1ccdd75e3bd589e0ecab0dc3566cfa3746d9297cccc6624a0e4f1790b425028d6abba0432144492158de564237b9b36814e4b4"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6c000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r1, 0x6}, 0x8) unshare(0x2000400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000040), 0x4) fcntl$addseals(r2, 0x409, 0x2) 10:56:44 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xca00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0t\x00', 0x2000000c0ffffff}) 10:56:44 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000000)=0x2, 0xffffffffffffffd1) [ 305.266307] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 305.277794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 305.284540] gfs2: invalid mount option: locktable= [ 305.289902] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.290114] gfs2: can't parse mount arguments [ 305.296466] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff7f00000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x60000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 305.399791] gfs2: invalid mount option: locktable= [ 305.404891] gfs2: can't parse mount arguments [ 305.419150] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.427728] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.436238] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.442643] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x4d01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 10:56:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00l', 0x2000000c0ffffff}) 10:56:45 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = semget(0x2, 0x2, 0x2) semctl$GETZCNT(r1, 0x2, 0xf, &(0x7f00000000c0)=""/11) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x400600, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r3, 0x4) [ 305.565966] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.572399] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.582752] gfs2: invalid mount option: locktable= [ 305.587772] gfs2: can't parse mount arguments [ 305.605713] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.737898] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.745831] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.752223] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.760229] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.766597] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.774885] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.788079] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.794506] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:45 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="0b0400007500609eee090070768557ad01fb84b1924e6b92ced09e8ad6c08dead7797c46cf2b0ba7a422659cbef144a989e718c7c1ccddb896ae3b6a878b73f448d8e144fb34915db02d46b85bd8ed2c190ae811764e44872357089eb88a91369140d86b4cff9850be44690b03ecec9713400102801c0afe09b9647d1f0000000000000000"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={r1, 0xb3bb, 0x20}, &(0x7f00000000c0)=0xc) r3 = syz_open_dev$mice(&(0x7f0000000600)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_GET_PIT(r3, 0xc048ae65, &(0x7f0000000640)) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) accept$packet(r2, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x4, 0xa, &(0x7f00000006c0)=@raw=[@jmp={0x5, 0xff, 0x9, 0xf, 0x9, 0x40, 0xfffffffffffffffc}, @generic={0x400, 0x0, 0x3, 0x9}, @call={0x85, 0x0, 0x0, 0x2f}, @generic={0x100, 0x7, 0x0, 0x4}, @exit], &(0x7f0000000740)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000780)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000001880)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000380)={{{@in=@rand_addr, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}}}, &(0x7f0000000140)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={r4, r6, r7}, 0xc) r8 = fcntl$getown(r2, 0x9) r9 = getpgid(0x0) tgkill(r8, r9, 0x2c) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000500)=@assoc_value={r1, 0x8}, 0x8) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xd100, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:45 executing program 4: r0 = dup(0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') accept4$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14, 0x800) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000200)={@empty, @remote, 0x0}, &(0x7f0000000240)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14, 0xc0b6156f60fdcd42) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000440)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001840)={0x11, 0x0, 0x0}, &(0x7f0000001880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000018c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001900)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001940)={0x0, @broadcast, @dev}, &(0x7f0000001980)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000019c0)={0x0, @broadcast, @loopback}, &(0x7f0000001a00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001a40)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000001b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b80)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000001c80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000001cc0)={@rand_addr, @loopback, 0x0}, &(0x7f0000001d00)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f0000002680)={@dev, 0x0}, &(0x7f00000026c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000002700)={@broadcast, @local, 0x0}, &(0x7f0000002740)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000002a40)={'vcan0\x00', 0x0}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002dc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002e00)={{{@in=@rand_addr, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000002f00)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000003300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003340)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003480)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000003580)={@loopback, @multicast2, 0x0}, &(0x7f00000035c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003600)={'team0\x00', 0x0}) accept$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003bc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000004400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40090000}, 0xc, &(0x7f00000043c0)={&(0x7f0000003c00)={0x7bc, r1, 0x10, 0x70bd28, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0xf4, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0xb8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x12c, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfff}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r17}, {0xe8, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r18}}, {0x8}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3f}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x76}}}]}}, {{0x8, 0x1, r19}, {0xb8, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xec5}}}]}}, {{0x8, 0x1, r20}, {0x1bc, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1c2f}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x7ff, 0x3, 0x3e, 0x3}, {0x3, 0x6, 0x100, 0x5}, {0xffffffff, 0x2a96adb3, 0x1, 0xe8}, {0x1000, 0x3ff, 0xffffffffffff9da5, 0xfffffffffffffffe}]}}}]}}, {{0x8, 0x1, r22}, {0xf4, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1f}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8d}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r23}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3b75}}}]}}]}, 0x7bc}, 0x1, 0x0, 0x0, 0x800}, 0x4) r24 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r24, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) setsockopt$inet6_buf(r24, 0x29, 0x2c, &(0x7f0000000000)="d14e2c349b292f4ffcc9fdf60fdf9a3c199f9a6c759caf618d0456db47", 0x1d) r25 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x9, 0x400000) ioctl$KVM_ASSIGN_PCI_DEVICE(r25, 0x8040ae69, &(0x7f00000000c0)={0x0, 0x80000001, 0x1, 0x2, 0x800}) r26 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r26, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4800000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000004, 0x8) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x8000200) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0L\x00', 0x2000000c0ffffff}) 10:56:45 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f300014", 0x2000000c0ffffff}) 10:56:45 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 306.118060] gfs2: invalid mount option: locktable= [ 306.123114] gfs2: can't parse mount arguments 10:56:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfcfdffff00000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xf901, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 306.205165] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.213214] validate_nla: 13 callbacks suppressed [ 306.213221] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 306.243729] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.251706] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.258088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.265955] gfs2: invalid mount option: locktable= [ 306.270973] gfs2: can't parse mount arguments [ 306.276056] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 306.287578] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000004, 0x8) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = gettid() r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x80800, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xc, 0x400) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000180)=0x8000, 0x4) write$P9_RLOPEN(r4, &(0x7f0000000100)={0x18, 0xd, 0x2, {{0x11, 0x2, 0x5}, 0x10001}}, 0x18) write$eventfd(r1, &(0x7f0000000080)=0x8, 0x8) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r2) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000040)={@dev={0xfe, 0x80, [], 0xd}, r1}, 0x14) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x20000000000004, 0x0) unshare(0x2000400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x19, &(0x7f0000000080)=0x8001, 0xfffffffffffffd6b) fstat(r0, &(0x7f0000000100)) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@local, r1}, 0x14) 10:56:46 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 306.299770] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.306201] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f30f603", 0x2000000c0ffffff}) [ 306.380432] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 306.412992] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 306.452145] gfs2: invalid mount option: locktable= [ 306.457197] gfs2: can't parse mount arguments 10:56:46 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x220200, 0x0) ioctl$RTC_VL_CLR(r2, 0x7014) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6, @in6=@local}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000180)=0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000001c0)=r1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1601, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:46 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f30f5ff", 0x2000000c0ffffff}) 10:56:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 10:56:46 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfdffffff, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f300400", 0x2000000c0ffffff}) 10:56:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5200, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:46 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x4, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x81) r1 = socket$inet6(0xa, 0x1000000000002, 0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x12a7c03b08905585, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000080)) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 306.932461] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 306.960362] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.973032] netlink: 'syz-executor0': attribute type 5 has an invalid length. 10:56:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000080), 0x354481362c89be98) 10:56:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 306.982114] gfs2: invalid mount option: locktable= [ 306.987189] gfs2: can't parse mount arguments 10:56:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xe700, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x10000) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000000)="18142affdd465ee455c0f20390787449", 0x10) 10:56:46 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) [ 307.094329] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 307.152998] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 307.166642] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 307.178350] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.184774] bridge0: port 1(bridge_slave_0) entered forwarding state [ 307.193639] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 307.269949] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.277361] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.283754] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:47 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="4a67daffa3c5d46700000000000012f248978622cda2809e31bc9042ae4e902ec145d2d0a702000000000000000c3f0622d140906aa1157d227035a78be034f90b6b207fad882fb70d18e25d7a207f9b61bb0dd22d1d93c7251eabad000360709d5863f65acfa70c7f93dd2e648b2fed34d9c62e1f195184a2d0a3bdef4930b99d163d6110f1a3a4219346c451c27a663f475213fec660c0ec703ef2950f4054739b3ca17aaf847465d99e9fab7d5a6076aea9c64687f0f1ddcc8c5a69df7a04570412e25355050e19ca7816f82d1210f47300f55e4895241567777ed17280e6d5e122a910e65a54684e92b3559f7c0b6cd76e4c2235edeb2b728b659aa3b183a0d6f718b5b105bfb8b5660c479f6f19ea7f10bc409fa6863ae47251c9129f3869b396ca09ddfd6f0c2dd3ff6c264bed5e123823982de41ff413ab162e82397853141734e42b099844a3a282f94463e2fe3c7affc331874c6da8d003bd7412eebc86262b94c0dce634d5c7f6eb04eb08f4383e14bc471833a100aff6241bed6f912e6a017cc93e4439b43ecd44c2c13d881554e53e84be5faf1d6374aee34583a278ae76120659cc3631f1903a67e12df260ffd1dc0fac27850e8b"], 0xb) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000280)=0x3) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r1, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e20, 0x80000000, @remote, 0x7}, {0xa, 0x4e22, 0x10001, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x20}}, 0x9}, 0x7fff, [0x2, 0xaea, 0x1, 0x0, 0xb74, 0xea64, 0xaa, 0x7]}, 0x5c) r2 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) listen(r0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0xffffffffffffff00, 0x2, 0x1000}, 0x4) connect$packet(r2, &(0x7f0000000140)={0x11, 0x8, r3, 0x1, 0xfffffffffffff182, 0x6, @local}, 0x14) 10:56:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:47 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x9400, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10000, 0x0) getsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000080)=""/102, &(0x7f0000000100)=0x66) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") socket$nl_route(0x10, 0x3, 0x0) unshare(0x2000400) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) prctl$void(0x3f) 10:56:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:47 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x7, 0x4) unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6c, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 307.806044] gfs2: invalid mount option: locktable= [ 307.811075] gfs2: can't parse mount arguments [ 307.885863] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.894485] gfs2: invalid mount option: locktable= [ 307.899493] gfs2: can't parse mount arguments [ 307.906556] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 307.914381] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 307.927801] gfs2: invalid mount option: locktable= 10:56:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1400, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000000000000, &(0x7f0000003380), 0x0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 307.932776] gfs2: can't parse mount arguments [ 307.942609] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 307.952676] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 307.964956] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.971325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 307.980414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 307.990304] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.996652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.016870] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.023826] gfs2: invalid mount option: locktable= [ 308.028956] gfs2: can't parse mount arguments 10:56:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x113, 0x5}}, 0x20) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000340)={'broute\x00', 0x0, 0x4, 0x4, [], 0x7, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000240)=""/4}, &(0x7f00000003c0)=0x78) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x2, {0x3ff, 0x9, "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", 0x6a, 0x7fffffff, 0x6, 0x8, 0x1, 0x6, 0x7}, r2}}, 0x128) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x22, &(0x7f0000000040), 0x4) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000480)={0x0, 0x8, 0x3, &(0x7f0000000440)=0x6}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000400)=0x6) 10:56:47 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7, 0x101000) setsockopt$inet_dccp_int(r1, 0x21, 0x6, &(0x7f0000000080)=0x4, 0x4) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000040), 0x4) [ 308.034993] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.041373] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:47 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x4000000000000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 308.087988] gfs2: invalid mount option: locktable= [ 308.093013] gfs2: can't parse mount arguments 10:56:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xfcfdffff00000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 308.199789] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.208879] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.215265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.223390] netlink: 'syz-executor0': attribute type 5 has an invalid length. [ 308.241967] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.270976] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.277357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.313041] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.325109] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.331521] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:48 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000080)={r1, 0x9}, 0x8) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) r3 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x1, 0x80000) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x484800, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={r3, r4, 0x0, 0x1}, 0x10) r5 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x410800) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r5, 0xc058534b, &(0x7f0000000100)={0x80, 0x7fecfc98, 0x40, 0x4, 0x0, 0x3}) 10:56:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xef01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xfdfdffff, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000403) socketpair(0x8, 0x800, 0x100, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000080)=""/229) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getrlimit(0x2, &(0x7f00000001c0)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000180)={0x3f, 0x0, 0x1, 0x7fffffff, 0x0, 0x100000001, 0x81, 0x4, 0x0, 0x9, 0x7, 0xffffffff}) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:48 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'bond_slave_1\x00', 0x200}) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) r2 = getpgrp(0xffffffffffffffff) mkdirat(r1, &(0x7f00000002c0)='./file0\x00', 0x16) lstat(&(0x7f0000000440)='./file1\x00', &(0x7f0000000480)) ptrace$getenv(0x4201, r2, 0x1000, &(0x7f0000000240)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() write$P9_RSTATu(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="33361d932338cf158d0000007d010000005600ff0001040000820200000004000000000000000000200066240000d0080000050000000000000016006d643573752c776c616e312d290d00626f6e645f736c6176655f310075737465645e5b2b766d6e65743064706f7369785f61636c5f61636365737300000000000000000000000000000000004d", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5], 0x8d) unshare(0x2000400) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x17, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000300)={{0xa, 0x4e21, 0xfffffffffffffff7, @local, 0x100000000}, {0xa, 0x4e22, 0x7, @mcast2, 0x81}, 0x6c, [0x2, 0x6, 0x9, 0x80, 0x7, 0x6, 0xe0, 0x7f]}, 0x5c) 10:56:48 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000080)={0x9, 0x10000, 0x9, 0x0, 0x0, [{r0, 0x0, 0x100000001}, {r0, 0x0, 0x6}, {r0, 0x0, 0x7}, {r0, 0x0, 0x100000000}, {r0}, {r0, 0x0, 0xf09}, {r0, 0x0, 0x4}, {r0, 0x0, 0x101}, {r0, 0x0, 0x1}]}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x4c00, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 308.649580] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x7a, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 308.716095] gfs2: invalid mount option: locktable= [ 308.721183] gfs2: can't parse mount arguments [ 308.740437] gfs2: invalid mount option: locktable= [ 308.745479] gfs2: can't parse mount arguments 10:56:48 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x8000000017, &(0x7f0000000040)=0x3d, 0x4) [ 308.791143] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.803482] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.809888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.826772] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.833211] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xb401, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x20003ff) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xf91f, 0x400000) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f0000000080)={0x60000000000000, 0x1, 0x4}) [ 308.848044] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x10000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 308.932510] gfs2: invalid mount option: locktable= [ 308.937534] gfs2: can't parse mount arguments [ 309.017139] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.026586] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 309.034305] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 309.044618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 309.060809] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.067211] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.074378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 309.082634] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.089013] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:49 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e23, @remote}}}, &(0x7f0000000280)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000480)={r1, 0x10, &(0x7f00000004c0)}, &(0x7f0000000200)=0xfffffffffffffeea) r2 = socket(0x5, 0x80806, 0x3) listen(r0, 0x2) r3 = semget$private(0x0, 0x3, 0x0) r4 = fcntl$dupfd(r2, 0x406, r0) ioctl$TIOCOUTQ(r4, 0x5411, &(0x7f0000000140)) semctl$GETNCNT(r3, 0x4, 0xe, &(0x7f0000000080)=""/157) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r5 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r5, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:49 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x100000000000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:49 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000), 0x0) 10:56:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1300, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x3800, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:49 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x1000000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 309.500148] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in=@loopback, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x42001, 0x0) bind$can_raw(r2, &(0x7f00000002c0)={0x1d, r3}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:49 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x3000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 309.622228] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.648647] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.648662] gfs2: invalid mount option: locktable= [ 309.655062] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000080)={0x3, 0x5}) unshare(0x2000400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 309.663946] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.666556] gfs2: can't parse mount arguments [ 309.677447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.695365] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.711125] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.712856] gfs2: invalid mount option: locktable= 10:56:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xae01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 309.717532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.722450] gfs2: can't parse mount arguments 10:56:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x17, 0x5, 0x0, 0x100000001, 0x401, 0x7f, 0x7ff, 0xfff, 0x0}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000001440)={r2, 0x1000, 0x1}, 0x8) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x9, 0x80) recvmsg(r0, &(0x7f00000013c0)={&(0x7f00000002c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000340)=""/121, 0x79}], 0x1, &(0x7f00000003c0)=""/4096, 0x1000, 0x76}, 0x40) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000001480)) recvfrom$packet(r3, &(0x7f0000000140)=""/53, 0x35, 0x100, &(0x7f0000001400)={0x11, 0x7, r4, 0x1, 0x0, 0x6, @random="ec8573cc59da"}, 0x14) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x30000, 0x0) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000080)) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$bt_BT_POWER(r5, 0x112, 0x9, &(0x7f00000000c0)=0x4, 0x1) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f00000014c0)={0x200, 0x5}) setsockopt$inet_tcp_int(r6, 0x6, 0x17, &(0x7f0000000040)=0x3, 0xffffffffffffffe0) lseek(r6, 0x0, 0x7) [ 309.890310] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.898782] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.905200] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:49 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xb) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x800, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:49 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:49 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x10, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00L', 0x2000000c0ffffff}) 10:56:49 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x200, 0x0) capset(&(0x7f0000000080)={0x39980732, r0}, &(0x7f00000000c0)={0x5e9, 0x8, 0x970, 0x3, 0x2, 0xfff}) r1 = socket$inet6(0xa, 0x1000000000002, 0x699) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x58, r3, 0x331, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x20000000000}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x200001}, 0x40800) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6301, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x33fe0, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x7) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:49 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000080)=0x4) fcntl$setpipe(r0, 0x407, 0x7) unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x7ffff000, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5d00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 310.336639] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.349764] gfs2: invalid mount option: locktable= [ 310.354784] gfs2: can't parse mount arguments 10:56:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x51, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:50 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8915, &(0x7f0000000300)="0000e2070014672e5f89769f57a5a3cde23c43cf983526b2da76a7e914a701e9760000000000000004de5b9306b7f08339e340000000000000000000000002") unshare(0x2000400) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000001c0)=@generic={0x1, 0x9004, 0x6d}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000000)=0x44) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x1, 0x1}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={r2, 0x6}, 0x8) [ 310.405601] gfs2: invalid mount option: locktable= [ 310.410637] gfs2: can't parse mount arguments 10:56:50 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xfcfdffff, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0xf, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:50 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="02ff1e6986f7a75cc8010000000000001c5960648a61342ff4caeba21949008b0098b78334269d8513a4a343be1c2122bdc412a69c4d862854dbf3a497c7fb7e00b237eff0003ae64191c3e313975d257946afa66ad0f99e2ad855015df26d1f0be48200") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) [ 310.578482] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.597680] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 310.609548] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 310.620034] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 310.631718] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.638127] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.645240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 310.654292] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.660645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.668714] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.739159] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.752688] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.759068] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.766914] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.773283] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:50 executing program 3: socketpair$inet6(0xa, 0x806, 0x7fff, &(0x7f0000002840)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000002900)=@nat={'nat\x00', 0x1b, 0x5, 0x698, 0x1b8, 0x0, 0x0, 0x1b8, 0x1b8, 0x5c8, 0x5c8, 0x5c8, 0x5c8, 0x5c8, 0x5, &(0x7f0000002880), {[{{@ipv6={@mcast1, @dev={0xfe, 0x80, [], 0x1c}, [0xffffffff, 0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffffff], 'bcsf0\x00', 'ip_vti0\x00', {}, {0xff}, 0x87, 0x7, 0x1, 0x8}, 0x0, 0x190, 0x1b8, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0xbf, 0x1ff, 0x200, 0xfffffffffffffff9, 0x1e41c4ab, @loopback, @empty, @remote, [0x0, 0xffffff00, 0xff000000, 0xffffffff], [0xffffffff, 0xffffffff], [0xffffffff, 0xff000000, 0xff000000, 0xff000000], 0x224, 0x40}}, @common=@unspec=@connbytes={0x38, 'connbytes\x00', 0x0, {0x5, 0x80000000, 0x0, 0x2}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x10000, 0x6a47}, {0xffffffffffff0001, 0x400, 0x2}}}}, {{@ipv6={@local, @dev={0xfe, 0x80, [], 0x1f}, [0xff, 0xffffffff, 0xff000000, 0xffffffff], [0xff, 0x0, 0xffffffff, 0xffffffff], 'team_slave_0\x00', 'bcsh0\x00', {}, {0xff}, 0x7d, 0x80, 0x2, 0x2}, 0x0, 0x158, 0x1a0, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x4, 0x1, 0x1, [0x9, 0x5, 0x8, 0x1ff, 0x4, 0x7, 0x2, 0x400, 0x80000000, 0x8a5, 0xc43, 0x1, 0x9, 0x1, 0x1ff, 0x2], 0xf}}, @common=@dst={0x48, 'dst\x00', 0x0, {0x9, 0x0, 0x1, [0x1f, 0x0, 0x5, 0x80000000, 0x3, 0x100, 0x1, 0x0, 0x5, 0x433a, 0x6, 0x8, 0x3, 0x5f359a87, 0x466d, 0x7], 0xa}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@dev={0xac, 0x14, 0x14, 0xe}, @ipv6=@mcast1, @icmp_id=0x67, @gre_key=0x8}}}, {{@uncond, 0x0, 0xc8, 0x110}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x11, @ipv6=@mcast1, @ipv4=@broadcast, @port=0x4e21, @icmp_id=0x68}}}, {{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@common=@unspec=@cpu={0x28, 'cpu\x00', 0x0, {0x401}}, @common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x14, 0x266a, 0x200000000, 0x1}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x1, @ipv4, @ipv4=@loopback, @gre_key=0x78, @gre_key=0xfffffffffffeffff}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6f8) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00c15b75000000000000"], 0xb) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r1, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) readv(r2, &(0x7f0000002780)=[{&(0x7f0000000380)=""/226, 0xe2}, {&(0x7f00000000c0)=""/174, 0xae}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/238, 0xee}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000000280)=""/3, 0x3}, {&(0x7f0000002580)=""/105, 0x69}, {&(0x7f0000002600)=""/225, 0xe1}, {&(0x7f0000002700)=""/67, 0x43}, {&(0x7f00000002c0)=""/13, 0xd}], 0xa) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003000)='/dev/snapshot\x00', 0x8000, 0x0) write$P9_RCREATE(r3, &(0x7f0000003040)={0x18, 0x73, 0x1, {{0x10, 0x4, 0x5}, 0x7f}}, 0x18) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x4e21, @loopback}], 0x10) 10:56:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040), 0x4) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000080)=0x100) 10:56:50 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x400000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0xfffffdef, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:50 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000100)=0x3ff) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000040), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000440)=0xe8) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f0000000140)=""/155, &(0x7f0000000200)=0x9b) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000480)={@ipv4={[], [], @broadcast}, 0x55, r3}) 10:56:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x5801, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0h\x00', 0x2000000c0ffffff}) 10:56:50 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f30ffff", 0x2000000c0ffffff}) 10:56:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6d01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0xc0, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 311.208063] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.225057] gfs2: invalid mount option: locktable= [ 311.230119] gfs2: can't parse mount arguments 10:56:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0xec0, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x68, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 311.280115] gfs2: invalid mount option: locktable= [ 311.285149] gfs2: can't parse mount arguments 10:56:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x2000, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x4001, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) connect(r0, &(0x7f0000000080)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x80) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x40000000000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 311.372514] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:51 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\v\x00\x00\x00Ta*\x00\x00\x00\x00\x00\x00\x00'], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) ioctl(r0, 0x72, &(0x7f0000000080)="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") 10:56:51 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:51 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x101000) bind$bt_rfcomm(r0, &(0x7f0000000080)={0x1f, {0x8, 0x781, 0x2, 0x800, 0x697, 0x200}, 0x10000}, 0xa) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040), 0x4) 10:56:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x3e0, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x7b01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x4, 0x301000) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000140)="867300") ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000100)={0x57, 0xfffffffffffffc00, 0x1, {0xc9447af, 0xffffffff}, {0x9, 0x2}, @ramp={0x254, 0x7fffffff, {0x0, 0x1, 0x400, 0x53}}}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x40) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000080)) unshare(0x2000400) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x7400000000000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x10, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xf0080000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x20000184, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 312.101303] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 312.110796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 312.120131] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.126517] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:51 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) socketpair$inet(0x2, 0x800, 0xba97, &(0x7f0000000000)) listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/172, 0xac) 10:56:51 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6600, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) unshare(0x2000400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000180)={'vcan0\x00', @dev={[], 0x16}}) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000040), 0x4) getsockopt$inet_tcp_int(r2, 0x6, 0x24, &(0x7f0000000000), &(0x7f0000000080)=0x4) 10:56:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x4800, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0xb, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 312.325371] gfs2: invalid mount option: locktable= [ 312.330422] gfs2: can't parse mount arguments [ 312.349216] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.358330] gfs2: invalid mount option: locktable= [ 312.361793] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.363303] gfs2: can't parse mount arguments [ 312.369656] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.396429] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 312.410298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 312.429957] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.436359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.456221] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.478990] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.485427] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:52 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000000000"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x1, 0x4) r2 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={r1, 0x6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x6800, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f30ffff", 0x2000000c0ffffff}) 10:56:52 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040), 0x2) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) 10:56:52 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x9, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:52 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f300200", 0x2000000c0ffffff}) 10:56:52 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x101000, 0x0) write$P9_RREAD(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0b000000750000005ecfab2edb1aa41fecb9b6ece73196c8b1ca652f6bd7ce47ff320d12dde7b5f6c7dcd86a"], 0xfffffffffffffdb7) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r1, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r1, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) read$eventfd(r0, &(0x7f0000000080), 0x8) 10:56:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x9, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x2000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 312.952927] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:52 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'eql\x00', 0x2}) unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0xe, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xfffffdfd, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x700000000000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x12, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xfffffdfc, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 313.185975] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:53 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="0b01000075000000008000"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={r0}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x3}, &(0x7f0000000100)=0x8) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000400)=0x58, 0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={r2, 0xf5}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r1, 0x3) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r3 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r3, 0x111, 0x3, 0x1, 0x4) recvfrom$packet(r3, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r3, 0x111, 0x3, 0x0, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) r4 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x1, 0x4000) ioctl$KVM_GET_DEBUGREGS(r4, 0x8080aea1, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x6) 10:56:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2400, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x6, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xfffffffd, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:53 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f30731f", 0x2000000c0ffffff}) 10:56:53 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x400000002000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x6000000000000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:53 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x10160403ff) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:53 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2401, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x2, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 313.824714] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.831200] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xf008000000000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x2f, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x6c00000000000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x7, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 314.056993] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.165046] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.172779] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 314.181789] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.188206] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.195900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 314.204198] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.210591] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:54 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x2, 0x40000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000000c0)={r1, 0xaa, "15a8984b11d7cc4ae07183de65fd81e100c6f84368ac28f2a49fed33e1b1cad13cdc356b3f58dd6d9ba78dcc06ba186dc7a73b6c9ed1885245e9d7d13e11c1b2eeda1102f5b13479c3e893f9fadbd6e1e951ad7799abd428593fe3a1cc738b8b1caa1d4b8ca552ad113942a17c4ccb8840ab22acc1852a2b22312b2004e807f8cd5a68307945e2a748f26a33008253f351bd7be12bf59ed5462af8275d97d7706ef9be5a3381f954a83c"}, &(0x7f0000000280)=0xb2) r3 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r3, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x3f000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0xa, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xfe01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00H', 0x2000000c0ffffff}) 10:56:54 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x8}, 0x10) unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000080)={0x7, {{0x2, 0x4e24, @multicast1}}}, 0x88) 10:56:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:54 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:54 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xb500, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x8, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x2, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 314.729384] gfs2: invalid mount option: locktable= [ 314.734423] gfs2: can't parse mount arguments 10:56:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x67, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x3, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 314.810414] gfs2: invalid mount option: locktable= [ 314.815486] gfs2: can't parse mount arguments [ 314.850160] gfs2: invalid mount option: locktable= [ 314.855207] gfs2: can't parse mount arguments 10:56:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x4, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x74, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x48000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 314.924556] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.011867] gfs2: invalid mount option: locktable= [ 315.016888] gfs2: can't parse mount arguments [ 315.050783] gfs2: invalid mount option: locktable= [ 315.055826] gfs2: can't parse mount arguments [ 315.062791] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.073522] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 315.103983] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.110357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.118387] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.124773] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.133135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 315.141384] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.147777] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.158790] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.176394] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.182759] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.254393] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.261822] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.268205] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xec00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x5, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x600, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:55 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r2 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r2, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000000480)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x7}) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r3, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r4 = socket(0x10, 0x2, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x0, &(0x7f0000000140)="37e0f44bc069b9691ea4c4f2aa0749") mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r5 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x4, 0x40, 0x0, 0xffffffffffff4aac, 0x20, 0x1, 0x800, 0x2, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0xffff}, 0x240, 0x1, 0xfffffffffffffff8, 0x7, 0xea7, 0xffff, 0x7}, r5, 0x9, r2, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r4, r6, &(0x7f0000000000), 0x80000002) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) r8 = getegid() fchown(r7, 0x0, r8) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xffffffffffffffff}, 0xc, &(0x7f0000000140)={&(0x7f0000001840)=ANY=[]}, 0x1, 0x0, 0x0, 0x80000000000000}, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') 10:56:55 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cb20710145251000070f47006001c365c680ec749bd293102bbd53d649e5a69d04c04b98adb3748cffcb42a7a000dda40aeb4621e27bd0fb9fc7eb0b0ced3308db758a9c9ef72539ec8090018f619888a69852ec2f79d") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:55 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f30fa00", 0x2000000c0ffffff}) 10:56:55 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @rand_addr=0x100000000}, 0x2, 0x0, 0x2, 0x1}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)="1a1b01e3fb008a8e0cc48d18301e90b700a55c6a86edb558960ca62296f155af3579b0cfbc312f073b4656", 0x2b}], 0x1, &(0x7f0000000380)=[{0xb8, 0x29, 0x0, "1c2df439f693d8a519b276dff33118d28677945c48f8bfde30cc6071be57524efee73d7174e6f50d8327215bdcb470e0c138b262dba361dafdb36d7836eab881b705e474982b067cc17cca3e58558b5721f6bf22aa6254927f210025ee60addca6815d0c26cd10f7d7d9c786954bab8f6fe5501f0c3b819e93c51a34beabfd2ba8245943759642e71e8a2a0daac76f8bd5209ea52122ee561c42811a71990b762fb59f"}, {0xb8, 0x11d, 0x7, "8330dd87538e55df414fa54571ce4c1de2ff5d0580d0288e0ba6f818b3e2015970d90466e9e96b8739d38dbc958d56af4d63b6d42372600489a875602e295e95f7b7c9084e664e7a6f1faa7a09b6bbfaeee8aacd5c5e73f1428ce64db8dc4a7229beeb8cb5d6bc3ea278f026cefbc8fa314323d0c5e60cd4daef06183ea8ba16a9a6a1bb5140712004c88b6a8e1b13baf45172b9f85c78843cadebd57fb858a86d97e7b586c5745e"}, {0x1010, 0x1, 0xfffffffffffffff8, "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"}, {0x68, 0x0, 0x7f, "0394956a38902117f4a7636519933a1a2d0591cb21fff3d17ef36710fdcef28f3d2f179a2cf5435a42a128c4096dfcd6d38764b9221e9569937f9ee035d9e95858f21f3324656037597166d18b6711e0e65f8d40c3"}], 0x11e8, 0x800}, 0x4000) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000002c0)={0x6b, 0x5, 0x0, 0x6, 0x6, 0xb9, 0xad, 0x7, 0x0, 0x2, 0xff}, 0xb) 10:56:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x4800, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x200000d0, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 315.575019] gfs2: invalid mount option: locktable= [ 315.580058] gfs2: can't parse mount arguments 10:56:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x6, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 315.651765] gfs2: invalid mount option: locktable= [ 315.656791] gfs2: can't parse mount arguments [ 315.662639] hrtimer: interrupt took 28647 ns 10:56:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x51, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0xd, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 315.760232] gfs2: invalid mount option: locktable= [ 315.765278] gfs2: can't parse mount arguments [ 315.773899] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.785499] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 315.812766] gfs2: invalid mount option: locktable= [ 315.813259] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.817796] gfs2: can't parse mount arguments [ 315.824103] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xedc000000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:55 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6e01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:55 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x200000020003fe) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:55 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r2 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r2, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000000480)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x7}) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r3, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r4 = socket(0x10, 0x2, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x0, &(0x7f0000000140)="37e0f44bc069b9691ea4c4f2aa0749") mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r5 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x4, 0x40, 0x0, 0xffffffffffff4aac, 0x20, 0x1, 0x800, 0x2, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0xffff}, 0x240, 0x1, 0xfffffffffffffff8, 0x7, 0xea7, 0xffff, 0x7}, r5, 0x9, r2, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r4, r6, &(0x7f0000000000), 0x80000002) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) r8 = getegid() fchown(r7, 0x0, r8) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xffffffffffffffff}, 0xc, &(0x7f0000000140)={&(0x7f0000001840)=ANY=[]}, 0x1, 0x0, 0x0, 0x80000000000000}, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') [ 315.880044] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.910833] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.917288] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:55 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f30ffff", 0x2000000c0ffffff}) 10:56:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xfdffffff00000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xf6ffffff, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x2010, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00 ', 0x2000000c0ffffff}) [ 316.176225] bond0: Releasing backup interface bond_slave_1 [ 316.205327] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.291565] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 316.301225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.309627] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.316005] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:56 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) r2 = memfd_create(&(0x7f0000000080)='@bdevtrusted$\x00', 0x3) ioctl$TIOCSBRK(r2, 0x40044591) poll(&(0x7f00000000c0)=[{r1, 0x10}, {r1, 0x80}, {r0, 0x100}, {r1, 0x301}], 0x4, 0x5) 10:56:56 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x6c, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xdd01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:56 executing program 4: r0 = socket$inet6(0xa, 0xffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x9, 0xffffffffffff7fff, 0x60, 0x8001, 0x9}, 0x14) accept4$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000400)=0xffffffffffffff4a, 0x81800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@mcast1, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14, 0x11}, @in6=@mcast1, 0x4e23, 0x72, 0x4e24, 0x0, 0xa, 0x80, 0x80, 0x0, r2, r3}, {0x6, 0x6, 0x36, 0x8770, 0x2, 0x34, 0x40, 0x101}, {0x5d, 0xfffffffffffff31f, 0x7, 0x1}, 0x5, 0x6e6bb6, 0x1, 0x1, 0x3, 0x3}, {{@in=@remote, 0x4d6, 0x7f}, 0xa, @in=@multicast2, 0x0, 0x3, 0x0, 0x1, 0xffffffffffff85e4, 0x8001, 0x7fffffff}}, 0xe8) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:56 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:56 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r2 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r2, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000000480)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x7}) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r3, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r4 = socket(0x10, 0x2, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x0, &(0x7f0000000140)="37e0f44bc069b9691ea4c4f2aa0749") mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r5 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x4, 0x40, 0x0, 0xffffffffffff4aac, 0x20, 0x1, 0x800, 0x2, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0xffff}, 0x240, 0x1, 0xfffffffffffffff8, 0x7, 0xea7, 0xffff, 0x7}, r5, 0x9, r2, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r4, r6, &(0x7f0000000000), 0x80000002) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) r8 = getegid() fchown(r7, 0x0, r8) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xffffffffffffffff}, 0xc, &(0x7f0000000140)={&(0x7f0000001840)=ANY=[]}, 0x1, 0x0, 0x0, 0x80000000000000}, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') [ 316.397110] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.404523] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.410889] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.459018] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 316.478561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.491142] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.497545] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0xf, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:56 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'trusted.', "2c402676626f786e657430b829747275737465646370757365746d643573756d6d643573756d766d6e65743047504c706f7369785f61636c5f6163636573735e6d696d655f747970656367726f757063707573657424776c616e31285b00"}) unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:56 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x48, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:56 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r2 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r2, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000000480)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x7}) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r3, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r4 = socket(0x10, 0x2, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x0, &(0x7f0000000140)="37e0f44bc069b9691ea4c4f2aa0749") mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r5 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x4, 0x40, 0x0, 0xffffffffffff4aac, 0x20, 0x1, 0x800, 0x2, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0xffff}, 0x240, 0x1, 0xfffffffffffffff8, 0x7, 0xea7, 0xffff, 0x7}, r5, 0x9, r2, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r4, r6, &(0x7f0000000000), 0x80000002) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) r8 = getegid() fchown(r7, 0x0, r8) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xffffffffffffffff}, 0xc, &(0x7f0000000140)={&(0x7f0000001840)=ANY=[]}, 0x1, 0x0, 0x0, 0x80000000000000}, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') [ 316.531306] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.540304] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.546700] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xe300, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:56 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0xc, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 316.643871] gfs2: invalid mount option: locktable= [ 316.648953] gfs2: can't parse mount arguments [ 316.667567] gfs2: invalid mount option: locktable= [ 316.672624] gfs2: can't parse mount arguments 10:56:56 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x7000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x2000, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 316.754554] gfs2: invalid mount option: locktable= [ 316.759661] gfs2: can't parse mount arguments [ 316.771706] gfs2: invalid mount option: locktable= [ 316.776715] gfs2: can't parse mount arguments [ 316.819532] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.831532] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.861064] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.867483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.894702] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.901107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.985903] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.993532] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.999905] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.008445] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.016453] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.022835] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:56 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080)={0xdec}, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) r2 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x101441, 0x140) ioctl$TIOCSBRK(r2, 0x40044591) getpeername$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) 10:56:56 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x1000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1b00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x2, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:56 executing program 4: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20800, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) 10:56:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:56 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f300003", 0x2000000c0ffffff}) 10:56:56 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xc001, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:57 executing program 4: r0 = socket$inet6(0xa, 0xa, 0xb) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffff, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="14001e00fe80000000000000000000000000001d08009000000004008412f594de0a86dd98e798a0d5c32195429dcf0d3782f2b4c82a3b516e9681f4e4eccb9062d2ff7ce7b39918e1e61d036b8b055f5c8bfc647098c48f8cebdd45adf1b8b6fe1fa4e7a904a347e55ac870a1e9cd0a5a70bb9d65fc774c4479f4483d2ca7e90a949e32df25d63e6d6f94f97e6d2d530cabfa74e866c2d152f9e965cb1ca6dc9ae5c9c41e10245ed5f9edf5214394681fefa384a2e46df1cd0082349eea173d09eda9c4d23fabdec32680459f4122fee6fc471fe22cdc4570e3c13ebc3fa46480c9e5421ba3a442c50de67016a4a7d2fe31dbf48dd8eeedb743f0c1161fd9b5ddc91706754222cfca20e0abffbd4017a951b9e1fe02deba080096000000000020cd3ea6637ef9279c7d160595cf2a61ae2d2c04d566468cb9ecefcb0ac2159fa7ec18f859f2437b03762150569f8964f48106fab204dd266fc246020e8e9425e94cf0b52c4a83ad58067e311ee2abc71d13e6af8e2f310c0c0b550e596edb1448f7c81d33265b81a29d89c8ead3b04cc19e193a571da49676ed4f697b77d6309c21e031946cf85eb3775acd60a9188e5cd77dc0d5ee36c213da6c743883ab7bd81e23b3f1f9419c574c7b6f1a806447ff29ceef95251fafb4b6612ac9b01120347843c526574c538af3881f0db7aa5dcb150215fb29e1d10313782a6ecbb927413aa20b7c72e12d39dc66a21fea3820a5ae9ec1af25b3a64e2b70ee7381eef3db7f7cc190d54ce76f9a72a8771e73ab164641c818af5e0278e4096536388cc1ad3dd6e11eba3f201dc0c58a3b2bb5ce4ea3570a6eb247b4715cb222721321e8cbf9f92bb818e53d16f2470ddedade7fec3a3f40178b638c5bca057b4b9de1357cf12cfe3e448efd09d783a92c83df78bd011ff2ebe4759c05b09d6dc82ea7bc1da5e22203f201e9b4d9133c66bd88fe26df8624af5dd21b4276644d6074b7a0ee61bebb401d839609da35faf8bf51126cf01da02aa6ebeaae4e3f57a3b56ebdc76e025273bb60b0d6122f73e3722e62a99143fe29ed6fbc4c3d1edb0933c402f7363fbd4af0f2b6fdcc5238abf542bdd6aa66891e3626862a745f9616e4cb2fe360f148b28c4b7390d1a05d3363be41bb7ed07ab167397fb4c31bc2b670232db1dfbd563100aa0ee6f1bdf852ee7c7d83c45daf97fb8356269302e75a064c95794e61982218030195705f90dd83119bebb953a42d06cde57b36bf86b44158d7a689b75645ac5b8dee0af8327f210327c135de1bca4806a39cb1c39ca1867622f4c17741424283fe01f931a3677a3285e28d68292512815f768f6e3925b3ad3d2b7062337db5db043a24212c6b735a662e1e93cbc74b7292ef77b54a43ef886e46934b9f43c82fb4d481ff8b1841cfa815e51298c8600bc92b4de9600f045360f7158aa2b1a0483c1df656ac38e1b185d8e56d02d1245c67ef8078ce10c919f5aed0ec02e06bb195a0abd9a79540b2bac50880a0fd68ee753d40e2c092aba7846813cb2404a4f0588d6c6d798dcb723928dbc08e5a4478d47db1aae43a8d9088f9f5a58ae87462267611cb238c09a40d459f0207e74d88f274165e526c5d00d32cc1053a14c779755d99aa6b9cfb8321f056e8bace789ebf72f86f2e6b0ce2b1659717fcd609682464623cffc85654c4c64ccce6f38af7f45bb31ca4b68963fe7edcb920410b4f9852be9d4c1303329a786bb179bee04236ce409f6dc94da8d6585a1dd11056487c697321e2ce2267457066853783b865356472efc7bac0feed4ef807168bca4abfa33f894f1d9702793f7d3a39ff84bc8ab38144b720ef819fe796a1ad1f55ba6641257b708d62dc85e6cc7117a9cb5560e4df027c5c04fe7a28c85af35c5d19c5876db3c532c00e5015ab11f41174613c96ab4776ac52ce6a6f68990a7f4cfb75a1d0ea56da7c4a67335f7fc4c00efa8c9bd5a8e2085839876e36e7b49432c118c3157491b62b9ebb51fc3bb6a24d472e39795c60dcc0283500adad19ba798785b130f0c11de7896675c247aff85a608fb76749970614ecce1227e4eefef78b8c65bb44f928c8244eb7d280e6260ff1cbcf1144528e6bdbd92330c2f6251a6e3140c6721f8ecc756a0c3776e71a17fae52d2d0fc26844445b07e8a7c77a06b7662f96155742ec45e17ab6212d280d2ac04f1178af02cad52eeaa1b0b8efda88f6afd5adaf2a7b56afbe7a6268f892e7aadef76fbe5f15d12218326bb4e0d88029e2e36b1abd2cad145f3b6123546826441370cdc3c985200566a04dc3945ab17e33ed587f575ed7a650dc6a6a2edcb3eaf61a9efb1ff372f9381f625f2f72a49b38747d3e23ba12fe90eed7e41d83a8fe59a6d5063d5daf06cf1d20405b92a6d49aa6f2e92c4ff95110c13c075d334d04375b142b4fad70825b1a4c2f235a80d6a1838ad5a0ab22316d142fcc3c87ea00a3c40eb056289b5010bd0d95aea0844f64797de14e118dcc2f0cea916fc4d9e129b0f5de2b707dda0223344df1823b5e47692dd819bc080ba7d3ce9b5171fb131a4b3bcce0a6ebc4bd33d6633878a57c7eec5e8bb334654e9a9b1b6f99321157374f4276fcd351af0adb4b72bf410e501effd93ee0c65b42889d69ef6d450de49bd1ab25dabc19fb0c6751eced9f27c9849cc0ea5bccff6082a1da4c4751e5640077a4786ed8fdbe3df18a8ac0e943f510718a2b5dfc7858c5a9370b2b84d3887a3af0d94221353bc7eae234413748306c0d6c07c74caec5b2e01132b4bdcf3d80e11d9f3cfaba69b9a9cbbc5358a9efd421b1eea79915a3e2dadf0d3e1de71bac4966932dda32906854c9c4fefda0ae151755c4dbf5e4ed4d4b74afe2f5cebdc8c1da59a176478e7adc25a40af64a8a11197112c6b4d6f29c49d22ca75212f3c6900033ec058a1b338cc1cd93ddfe61ce5e45639505f4a2963e19fd722943748ec33fedf78f0d897e5c9140890863521ea96ed043713d5de681c36589b9273c7e2dc142822522622a3065e3f624ac3d7bb128ee12209d94b12e947af9185f77dbfc4cc2b531fbe9013259c926d048953aad26cff3c588bc399f5a831ca79321ed8030ea412f1f918b315e17e4abaeb56be654ae06f0369477280e369c687c5ca039d0358de8511565ffa4a68d663b022ad86075fd13a10a462414fa9807439f0a731dd1e21a934dc3453a0e80e2b81f8f2988894d40d9c37e4039e748a7fcf954ea1e93228bfcb30a6e8ccf4288ca6864baaa07a99bc8574fb6e383d858fa81e62644c0c03637320de979f5872728b3765166a1de0e37f8306258fd547ddda125dc0f9c8c30560460a4d3c89df779a8ee0ba48dff855b3d9568ed000563ea8c0213889941c04b3f811bceb5e8c5186ea5ab06dbfe8b30c935f8cbb755f138c788b67d0994fde45ac78892cdf29f94de643a8800f71a7f95851ca2f3fc38287fe57c2423a34574929785121ac42bf8b120c7be10b19c71a82ff421cc5cf2904987170c2f6a1feb42fcc915fcd5c43100f860232c028d48d3b63f4becf772cb3b7acf50cf4efbd2defcd0aed4e3dbfd5311949e7ace5b7359f7fa516593536a33597f02cbab837ca0ad60747b1e91d76806c0f2e6dfd050ae941ca0408d11c54a4a8259e701630582011b7237dc8147cfa39815ec5ad5d91a0decf6b7136f43d4fcdce4947b119fa04df92757fbf42cf3b97aa1eb91701ea350d453b6bd6cb44169c96546044613d519bb0df7f750edfca674254e4e18b3e88954477607fab8deffa6dff2e189a66456f7c55f9553520625cd1a130e89a07b99e18504f7361323a1a327808f05a3fdf2175d2bfb608a4629534c6795e0a25b145aeb9bd3eb6776dfe2094035d3fe9bd895d817f0092f0cfbaf051e4f07b49c7190430e14353b0dfd4523d95dfe774a06100972bc400805e9a19f4495d7b70c7e5754cb7c77fdead4417fdfaaedecfe8a561135114108d619ae2d09bbe118f3c8bc9710e39bed77a1d7f680cf30e6b5ad38c22da7c814f023abf857fba36e4ba615150b3e20215242c06af706ee239c5f47fb769acc8ed3fd846632d454d41de086e16ffef7ed81ddd70ec4768d242911dca4963f88d519fc14d00fe2cc9d638cfd3fe64ff1d1d422eb34e584854ac1d1024acf9e2fad2f306648bd011982d6c7aef51add72f477e3356aa643648d001f6da922fc70de022f46312605ea423966df17638ee5ed8c59b1ed8e28e1202476e20fd361ec5a0d22e5be08cc669d3494a44c2e0928d0b8c379b8991c34627b24035d36aea9149f4786451af3dc93fc67a80306aae5bfed810ec4428a096a4e91907119f674291db29252307c1b951cf3ac226e28a28b8fed25de9728a62314bcddb86dd5149be6d8c503f90d18049cf5f924baa072048ec0747b4652ce816a1c55eaf9e73c7432e6e13b38527a471a97b0ad8fc904ffe852005011b551f5827e54010000d560f442d0beee95c63bb945b21d31a704d31f9b56fbd272e74e9f7efe341b6797c1756d38d78fbb5e9f57aec8ba5d3ee104aa0c14fac4cea0b9cfd0ee05f10e0966aef28520fb176208ded47323678eb0b147cb948d356d19c05cf474d70fb37ce193007f003ba6dcc9aa78be5816ce19cb5ab301d89f9272caf32c5903e1815c2ff686dd8cc722bcb0fb5daa08546dc1ccb6436e06d42097da8613c4d4ff66352be841ce755a232c657ea87c2c45055eeb0800bbd388037bb76db1ccc3137757ae873ff3442e9fdd4395a500eccda21021992bfc9f60f785620badff6ce1faa977ee2f5fb8101e09da00c270206670e426487466c1e5253f78d271a8e6bed1d2db199780090bf2cd44bd3e1665e49bed4d02cb38518d1f7b7ce9f108e0c4fabcf5f6cb93adf675e132f5b5930a733b88e90435d730de7ddefbff9fa93e542acdb4012f7246cf18a3be9955b15e04e8fc8a4386014997893c8b1abb790962ef63caae5b9ba46f020a7c4c5a335a27018550047e356484c1f09d9bacc28ef6457c49fbc0fbbedab8144991a22274e05476d4132bf084d02bb0bccf6807cc04c54bc4fcfc74950cbf62d040662b2762e453c1859a2e5c9e3b4351dc60b8508d325f6b0deebec39fefa1b04b11fdfacd3c47107100f88d60620158689802379a76b7b0691f7017923d8b81c9b3b10517c6ba96f8fcf4a1421a88586b90338917db9902d9dac6963d01ba5b6c7e93160f615d62c93f751832b116e2019bf6833af936d326c8ce325fa5231872e316c38136fe4ab56a46daffc4f74c4f4a9f8cf2afafbbd0e5710f8259c4f992b04d39085929b607027f84fc200e253dee57b15ed949f1cc1444efde5dc5f5d1ccd8aab167c3836504576d165750aafa4b8f4fc2bfc2fabd3c56c51fe361484b636720ccd84927560fbabf8d7b72e31a80a71383e9ba24c7984ceb9b32348f91438c6e5bb576938f908aa9022580bfc4b53d3adbdec6e7c1049a6a037a05eec99ab9ce1ea7fdb91f0fc75d5612b994dca515df7c296b3d964e8cbfb01d12fcb612a057a45c436df3d8254537291711948e87b06c4cf2a3d7c7724ec46f7f0600e8bd798e75c6a20294ae4e99b9b8280c3842a68d670fe4a1bc84a3b70ff5ab870287c4264b1bd0ff22672e29e4082fc57150f8be2aaeec7a152356f8099ef70ebf6b06fdd6d6f82f36a75735c2d1976a3b970c0adb34434d870b8b76c965cb6454543c4d4c264bbc0565d20f59daaee7d9ad9da46e5cb94ef9b14de2f789465f8e56028b4aa8c630956c3542fedf60e8f5a2bb4a9a8c4b57c9568ad8313a0b39ccdeabfc7f74feaac8e1e374d7bd4e4a0a4dee5ebf7f24ef2a34f9ab0da1cc19f810643b602fca66f6691f2bf417a19b8c28b0149bf1f87a1bcea1166a5c4b36ff19f533f3fe7e6986d25ceb61dae265bddfa41df0203f6a676d310599fa5877c0b6ea94bf0d773d0624108a08c15b67b8384aabeee1d491c1584e3d3b69043a0a320fe3d57780e49949e506b8685d438a3a223addfb84ef703afa6bb465d2e2777767be78c1a7e96eb7667080610a87424983e197d9afd3f5cde458f01d3e15fe51a66d673dfd83c3a03e3d8cac67665ad78e3584204d138a37c47833714c92fd9c2ed4a3b8122394d4b112d943d991ff1a48b23b0679aca2a5ef8e07f77211352eab147450944dd64d52abe75677fa907e3d8545714113efb8bf413acc8e1b22b5ff562143e52946984b50fcb79b18a847d223fe5bed07bdbb88028c3d630402acf5885ec2470835db5c1c884d76ccde129ddfee17c516b6726e8f1ff06b26f12c3b5a9483afd0f41170568558be0db5fa91c95aa7cf7bd870278b8ff78af6208757f2a8a800e3581eae61f7cf46a950e9af384e130dcf7159f90219b51e70e4e2de7e7e4aef5c15b5712483c6fa606a27e3b4b11b986e5bbc7cd6ef8762f245bbd8f9a839dc448143669e1119297657a5df0d7c4cdeba0767574e3237336aee1efeda51541f6f7bb961a9806237bee2f55a598290322847eaccbab0d15299fd05181e893335b053f9dab1609f61ada941398649b79e1b5961c31c10b2bbcb4ecccb8aac912d46781be8b468c8c05a6db3db91dfda937b43da4316296eaad31dcc000000"], 0x2384}, 0x1, 0x0, 0x0, 0x40}, 0x4) recvmsg(r0, &(0x7f0000002940)={&(0x7f0000000140)=@un=@abs, 0x80, &(0x7f00000028c0)=[{&(0x7f00000001c0)=""/125, 0x7d}, {&(0x7f0000002680)=""/82, 0x52}, {&(0x7f0000002700)=""/183, 0xb7}, {&(0x7f0000000240)=""/25, 0x19}, {&(0x7f00000027c0)=""/242, 0xf2}], 0x5, 0x0, 0x0, 0x3f}, 0x1) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000040), 0x4) [ 317.285621] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.298792] gfs2: invalid mount option: locktable= [ 317.303839] gfs2: can't parse mount arguments [ 317.320909] gfs2: invalid mount option: locktable= [ 317.325993] gfs2: can't parse mount arguments 10:56:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x51, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:57 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x68000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:57 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8000, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14, 0x80000) connect$packet(r2, &(0x7f0000000100)={0x11, 0x1e, r3, 0x1, 0x40, 0x6, @remote}, 0x14) 10:56:57 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x6c00, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 317.438503] gfs2: invalid mount option: locktable= [ 317.443551] gfs2: can't parse mount arguments [ 317.464750] gfs2: invalid mount option: locktable= [ 317.469731] gfs2: can't parse mount arguments 10:56:57 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x300, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 317.598686] gfs2: invalid mount option: locktable= [ 317.603712] gfs2: can't parse mount arguments [ 317.633826] gfs2: invalid mount option: locktable= [ 317.638840] gfs2: can't parse mount arguments 10:56:57 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xffffffff00000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 317.645721] bond0: Releasing backup interface bond_slave_1 [ 317.762372] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.770048] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 317.778242] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.784959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.792770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 317.801839] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.808238] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.816535] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.828674] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.835039] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.916218] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.924684] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.931102] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:57 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00829db33623dab22a0000753184fb4b164fdad253f6ca5c2e2efddaae51ee9610bc34f1dd9a9f94d9828c7838330000000000000000"], 0xb) r0 = socket$inet6(0xa, 0xa, 0x8010000000000087) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x8, 0x600100) openat$cgroup_subtree(r1, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) getsockopt$sock_int(r2, 0x1, 0x3f, &(0x7f00000002c0), &(0x7f0000000380)=0x4) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000003c0)={0x8, 0x32, 0x11, 0x19, 0x5, 0x2, 0x4, 0x148, 0x1}) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000280)={0x1, 0x6, 0x7f, 0x0, 0xfff, 0x9, 0x3, 0x8, 0x1, 0x0, 0x0, 0xfc, 0x0, 0x8, 0x3, 0x4, 0x9c90, 0x2, 0x7}) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000140)) 10:56:57 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f30fdfd", 0x2000000c0ffffff}) 10:56:57 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xffffff7f00000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:57 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x6400, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00t', 0x2000000c0ffffff}) 10:56:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x76748c59, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:57 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x400000000000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 318.125556] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:57 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xba00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:57 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000180)={0xb}, 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r1 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r1, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x703000) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) listen(r0, 0x7) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) 10:56:57 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x60000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 318.282695] gfs2: invalid mount option: locktable= [ 318.287748] gfs2: can't parse mount arguments [ 318.318357] gfs2: invalid mount option: locktable= [ 318.323417] gfs2: can't parse mount arguments 10:56:58 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101401, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x1, 0xa) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f00000000c0)=0x1, 0x4) 10:56:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 318.329086] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.339907] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 318.358895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 10:56:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x74000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x7901, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 318.378507] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.384895] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.418457] gfs2: invalid mount option: locktable= [ 318.423582] gfs2: can't parse mount arguments 10:56:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x40000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 318.456425] gfs2: invalid mount option: locktable= [ 318.461446] gfs2: can't parse mount arguments [ 318.517439] gfs2: invalid mount option: locktable= [ 318.522474] gfs2: can't parse mount arguments [ 318.534237] gfs2: invalid mount option: locktable= [ 318.539261] gfs2: can't parse mount arguments 10:56:58 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:58 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) accept4$unix(r1, &(0x7f0000000200), &(0x7f00000002c0)=0x6e, 0xf40aecf706ab4a79) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r2 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffa) keyctl$read(0xb, r2, &(0x7f0000000100)=""/200, 0xc8) unshare(0x20003ff) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00h', 0x2000000c0ffffff}) 10:56:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x20000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 318.568979] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.577280] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.583672] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x700, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 318.653430] gfs2: invalid mount option: locktable= [ 318.658499] gfs2: can't parse mount arguments [ 318.674470] gfs2: invalid mount option: locktable= [ 318.679575] gfs2: can't parse mount arguments 10:56:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x8f0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 318.720559] gfs2: invalid mount option: locktable= [ 318.725606] gfs2: can't parse mount arguments [ 318.736281] gfs2: invalid mount option: locktable= [ 318.741317] gfs2: can't parse mount arguments [ 318.749684] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.766753] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.773188] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.910888] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.918817] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 318.929239] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.935631] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.944473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 318.953691] bridge0: port 1(bridge_slave_0) entered blocking state 10:56:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x339, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xb601, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:58 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0xd7fc, &(0x7f0000000280)="025cc80700145f8f764070") syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)={[{@check_strict='check=strict'}, {@cruft='cruft'}]}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x802, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000140)=0x7, 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400000, 0x0) signalfd4(r2, &(0x7f0000000180)={0x94}, 0x8, 0x80800) [ 318.960084] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.970866] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.005411] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.011864] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:58 executing program 3: write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000000000000000000fb7133d08724979a7b96a0d9ae090000005b8ccb"], 0xb) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e22, @dev}]}, &(0x7f0000000200)=0x10) listen(r0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x2, 0x4) r2 = accept4(r0, &(0x7f0000c71ff0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x10, 0x0) recvfrom$packet(r2, &(0x7f0000000300)=""/89, 0x59, 0x2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xffffffffffffff22) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_UIE_ON(r3, 0x7003) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000100)={r1, 0x8}, &(0x7f0000000140)=0x8) 10:56:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xf6ffffff00000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:58 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000017, &(0x7f0000000040)=0x22, 0xfffffffffffffdad) 10:56:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x76748c59, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:58 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:56:58 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x12}, 0x4}, {0xa, 0x4e23, 0x20, @loopback, 0x28}, 0x2, [0x3, 0x7fffffff, 0x7b8, 0x2, 0x2, 0x80, 0xfb7, 0x4]}, 0x5c) 10:56:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x7a00000000000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 319.123469] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.162734] bridge0: port 1(bridge_slave_0) entered blocking state 10:56:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00\f', 0x2000000c0ffffff}) 10:56:58 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x9d00, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 319.169284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.180832] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1300, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:58 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000027c0)=0x14) r3 = geteuid() sendmsg$nl_xfrm(r1, &(0x7f0000002c40)={&(0x7f0000000080), 0xc, &(0x7f0000002c00)={&(0x7f0000002800)=@allocspi={0x3dc, 0x16, 0x304, 0x70bd25, 0x25dfdbfb, {{{@in=@local, @in=@multicast2, 0x4e20, 0x2, 0x4e22, 0x0, 0xa, 0xa0, 0x20, 0x33, r2, r3}, {@in6=@ipv4={[], [], @multicast1}, 0x4d2}, @in6=@local, {0x40, 0x3, 0x8, 0xd5, 0x2, 0x845, 0x401, 0x3}, {0xfffffffffffffffb, 0x8001, 0x2, 0x2}, {0x5, 0xfffffffffffffffb, 0x3}, 0x70bd27, 0x3507, 0xa, 0x4, 0x40, 0xc7}, 0x5, 0xd}, [@user_kmaddress={0x2c, 0x13, {@in6=@local, @in6=@mcast2, 0x0, 0x2}}, @algo_aead={0x138, 0x12, {{'generic-gcm-aesni\x00'}, 0x758, 0xc0, "f8f6ea1a3f4b5720829acab6d25b2c4d9f5bfa155d70a91831f2df0c4df1ac107664af3483e3809a37661372d9e4cc9e840671ce33eea19cd619e96973007b722d247d4984e92338bf45e5683d7f0a4bd65192c1d46b05e40d73712ddadc2ec3f136e942dc1e44c35bd681683d3147bb73f94aec18c21cce5f27a40c7c46f0826c3e4efe3af36f48b679741f194a532c6f7c20b76e8f5c308bd4affa36f0bfefdf21122851951dde77c4b7b2f6d6326bc5ceb3de64b58e0623e6ec6e00821163e2130cb52521ad4862ffc83a709173ceb4454f46862f33cc5a9657cec9827260323bafb15cc9daf3caa39a"}}, @coaddr={0x14, 0xe, @in6=@loopback}, @etimer_thresh={0x8}, @migrate={0x164, 0x11, [{@in=@local, @in=@remote, 0x0, 0x1, 0x0, 0x0, 0x2, 0xa}, {@in6=@local, @in=@multicast1, 0x0, 0x1, 0x0, 0x34ff, 0x2, 0xa}, {@in6=@mcast1, @in6, 0xff, 0x3, 0x0, 0x34ff, 0xa, 0x2}, {@in=@multicast1, @in=@multicast1, 0x2b, 0x1, 0x0, 0x3502, 0xa, 0x2}, {@in=@broadcast, @in=@dev={0xac, 0x14, 0x14, 0x21}, 0x7f, 0x0, 0x0, 0x3506, 0x0, 0xa}, {@in6=@local, @in6=@mcast2, 0x32, 0x0, 0x0, 0x34ff, 0x2, 0x2}, {@in=@rand_addr=0x57, @in=@local, 0x6f, 0x6, 0x0, 0x3504, 0xa, 0x2}, {@in=@remote, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1f}}, 0x7c, 0x3, 0x0, 0x3505, 0x2, 0xa}]}]}, 0x3dc}, 0x1, 0x0, 0x0, 0x40000}, 0x10) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x4c00000000000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 319.230663] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.237128] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.257429] bridge0: port 1(bridge_slave_0) entered disabled state 10:56:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0xb, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:59 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x4c000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:59 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x4c, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 319.395910] gfs2: invalid mount option: locktable= [ 319.400968] gfs2: can't parse mount arguments [ 319.412241] gfs2: invalid mount option: locktable= [ 319.417279] gfs2: can't parse mount arguments 10:56:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x76748c59, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 319.463100] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.473259] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.479701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.494467] gfs2: invalid mount option: locktable= [ 319.499468] gfs2: can't parse mount arguments [ 319.506403] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 319.516382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 319.525786] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.532204] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.543687] gfs2: invalid mount option: locktable= [ 319.548692] gfs2: can't parse mount arguments [ 319.685673] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.693353] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.699766] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x7300, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:59 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f30ffff", 0x2000000c0ffffff}) 10:56:59 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x8, 0x2400) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@rand_addr, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}}}, &(0x7f0000000000)=0xe8) connect$nfc_llcp(r2, &(0x7f0000000200)={0x27, 0x1, 0x1, 0x2, 0x3, 0x7fffffff, "c7a77956b16947b2263c1a47ae4b0d53802bb02ef0ca3f72daa8b005c59bc6c4321d68707ea045fd818f15c1975704bfb8c33fc7eaf61acce7aaf551322f90", 0x29}, 0x60) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000080)={r3, @multicast2, @multicast1}, 0xc) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x7, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:56:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x5, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:59 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x2000000000000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f300005", 0x2000000c0ffffff}) 10:56:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x2000000000001, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x40, 0x0) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f00000002c0)={0xffffffff, 0x1000, 0x1}) r3 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000687000)=0x5c802861, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="a0000000b823396634ba4fcd005c22c6e770fdbb13f83c5bc080dde2f63d219fdc1dd148e550ffab38d55a76c763fda0c3f97c6da31c367375eaa8a680066ea69319ab1fdeefb92e339d455ede4262995e2febb59d4739111518d681e64f2fd0f7bf4988a2dcd000d73a13aec108f22f08821b5b68401dae6340fd46c5dbaa15121c66e23dc64c0f46968648a5c89f28b9993f5c58ab8a27f3f13616e21ce7b38ccdd9c01531902d8b11f90b"], &(0x7f00000001c0)=0xa8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000200)={r4, 0x87aa}, 0x8) bind$inet6(r3, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl(r0, 0x0, &(0x7f0000000300)="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") sendto$inet6(r3, &(0x7f00007a8fff), 0x0, 0xfffffefffffffffe, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000080)=0x9, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080), 0x0, 0x20000000, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) 10:56:59 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = socket$inet(0x2, 0x4, 0x2) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='ifb0\x00') setsockopt$inet_int(r0, 0x0, 0xd0, &(0x7f0000000100)=0x4000000240002, 0x3) lseek(r0, 0x0, 0x3) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0', [{0x20, 'ifb0\x00'}, {0x20, 'ifb0\x00'}, {0x20, "27757365722d766d6e65743073656c696e75787da92e5d5c"}, {0x20, 'ifb0\x00'}], 0xa, "7c5a1b287b50df58013be28dfbe75c76ac88818abbc08d725709e1561390fae1b51c169eb5c3bb794f9b1354af4c82d3e0382745a7e079a39dfd9184fefb42fe1530b17dfbbbd6bdc21c201feea63c22748db6d73dca1a6cefe0d9d2aad908efe676846e"}, 0x9a) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000140)=0xffffffff, 0x4) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000080)) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000240)) 10:56:59 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x6000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000005680)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000056c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000003800000000000000000b00000000000000656d3185c6646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 320.049722] gfs2: invalid mount option: locktable= [ 320.054774] gfs2: can't parse mount arguments [ 320.076566] gfs2: invalid mount option: locktable= [ 320.081601] gfs2: can't parse mount arguments 10:56:59 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x7400, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:56:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000005680)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000056c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000003800000000000000000b00000000000000656d3185c6646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) [ 320.109799] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.121025] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.130025] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.136431] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:59 executing program 1: personality(0x5000007) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x800000000000, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 10:56:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0xa, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:56:59 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x220001) unshare(0x2000400) socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040)=0x400, 0x4) 10:56:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xe801, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:56:59 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xc0ed0000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 320.299432] gfs2: invalid mount option: locktable= [ 320.304456] gfs2: can't parse mount arguments [ 320.350477] gfs2: invalid mount option: locktable= [ 320.355540] gfs2: can't parse mount arguments [ 320.387106] bridge0: port 1(bridge_slave_0) entered disabled state 10:57:00 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:57:00 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x3}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000040)={0x4000, 0xf000, 0x80, 0x3, 0x100000000}) connect$inet6(r0, &(0x7f00000000c0), 0x18) 10:57:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x25, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:57:00 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x7a000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:57:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:57:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x3401, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:57:00 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r1 = dup2(r0, r0) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000000)) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000040), 0x4) [ 320.395660] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.402076] bridge0: port 1(bridge_slave_0) entered forwarding state 10:57:00 executing program 1: capset(&(0x7f0000000180)={0x19980330}, &(0x7f00009b3000)) r0 = socket$inet(0x2, 0x80000, 0x7f) ioctl$sock_netdev_private(r0, 0x89f7, &(0x7f0000000300)="5da41920b3085ac0e0681e160fcd7e368431e85d8e5bb61b1dafffa509124a0e34ec49d2791fe0822767909042b065f9e6") perf_event_open(&(0x7f000001d000)={0x200000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x81f0, 0x1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], &(0x7f00000000c0)=0x101) set_tid_address(&(0x7f0000000340)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000140)={0x6, 0xffffffffffffffff}) [ 320.489304] gfs2: invalid mount option: locktable= [ 320.494360] gfs2: can't parse mount arguments 10:57:00 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) r3 = epoll_create(0x8001) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f0000000040)={0x1, 0x0, 0x100000001, 0x4, 0x2}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000480)={0x90000001}) epoll_wait(r3, &(0x7f00000000c0)=[{}], 0x1, 0x47) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 320.542759] gfs2: invalid mount option: locktable= [ 320.547746] gfs2: can't parse mount arguments 10:57:00 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x8cffffff00000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 320.626244] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.637093] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 320.645781] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 320.656146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.668911] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.675286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.682532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.690871] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.697237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.827671] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.835338] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.841739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.850439] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.858515] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.864920] bridge0: port 1(bridge_slave_0) entered forwarding state 10:57:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000005680)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000056c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000003800000000000000000b00000000000000656d3185c6646576656d3100000000000000000000000000000000000000000001000000000000002c00000000000000000000000000000000000000000000001c000000000000002b73797374656dcc6370757365746367726f7570246367726f75701500000000"], 0x90) 10:57:00 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x200000000000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:57:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x9, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:57:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:57:00 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f300400", 0x2000000c0ffffff}) 10:57:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xc401, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:57:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080)={0x9, 0x1, 0x1, 0xffff, 0x80000001}, 0xc) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00)=[{{&(0x7f0000000400)=@l2, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000000)=""/117, 0x75}, 0x7}], 0x1, 0x0, &(0x7f0000000cc0)) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000000680), 0x3ba, &(0x7f0000002000)=[{0x10}], 0x10}}], 0x2, 0x8000) 10:57:00 executing program 4: r0 = socket$inet6(0xa, 0xa, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x10020003fd) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0xfffffffffffffffa) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) symlinkat(&(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000180)='./file0\x00') setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040), 0x4) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f00000001c0)={0x1, 0x0, 0x6}) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f00000000c0)) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f0000000080)={0x6, 0x3, 0x8000, 0x5}) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000100)={0x0, 0x7}, 0x2) 10:57:00 executing program 1: r0 = socket(0x10, 0x80002, 0xfffffffffffffffd) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100), 0x83) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x8c}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x1000, "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"}, &(0x7f0000000080)=0x1008) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000001180)={r1, 0x10000, 0x7, 0xff, 0x5, 0x7, 0x5, 0x7, {r2, @in={{0x2, 0x4e22, @local}}, 0x4, 0x4, 0x9, 0x0, 0x7}}, &(0x7f00000000c0)=0xb0) 10:57:00 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xedc0, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:57:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040), 0x4) ppoll(&(0x7f0000000000)=[{r0, 0x80}, {r0, 0x11}, {r0, 0x8000}, {r0, 0x2001}, {r0, 0x100}], 0x5, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000140)={0xfffffffffffffff8}, 0x8) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x22, 0x800) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f00000003c0)=0xd4) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x21, 0x420004) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000080)=0x80000001, 0x8) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000002c0)=""/216) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e22, 0x1c48, @local}}, 0x7, 0x3, 0x3, "bb94f7b01fcd0dfd8a6560b731eaf91ba379f969097f5650494bf2c04f4f9176ed35ee2496005aa08f53850679f02e792363a4c1be8104e06feea422e99a0098ae2a98f3077b1d33b099996ac39fb446"}, 0xd8) 10:57:00 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x7368, 0x10000) socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000100)=""/90, &(0x7f0000000180)=0x5a) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r2 = socket$inet(0x2, 0x3, 0x3) getsockopt$inet_opts(r2, 0x0, 0xb, &(0x7f0000000000)=""/128, &(0x7f0000000080)=0x80) 10:57:00 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x7a00, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:57:00 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x10000, 0x200800) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000140)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) accept(r1, &(0x7f0000000080)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f0000000000)=0x80) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000040), 0x4) open$dir(&(0x7f00000001c0)='./file0\x00', 0x240, 0x4) 10:57:00 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x4, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:57:00 executing program 1: r0 = socket$inet6(0xa, 0x800000000000007, 0x0) ioctl(r0, 0x8912, &(0x7f00000005c0)="0a5cc80700315f85714070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) pipe(&(0x7f0000000080)) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000040)=0x800, 0x4) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x7, &(0x7f00000010c0), &(0x7f0000000000)=0x60) [ 321.277586] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.288650] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.311870] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.313071] gfs2: invalid mount option: locktable= 10:57:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x9a01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:57:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000080)=ANY=[]) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x3, 0x0, 0x11, &(0x7f0000000000)="d8c458ce64354ae542ccfa3064ae0e6b69"}) recvmmsg(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f0000000780)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000009c0)=""/149, 0x95}, {&(0x7f0000000a80)=""/187, 0xbb}], 0x2, &(0x7f0000000b80)=""/227, 0xe3}, 0x1}], 0x1, 0x0, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) sendto(r2, &(0x7f0000000000)="06", 0x1, 0x0, &(0x7f00000000c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80) sendmmsg(r2, &(0x7f0000000840), 0x3d0, 0x0) 10:57:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x2000, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 321.318294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.323236] gfs2: can't parse mount arguments [ 321.350749] gfs2: invalid mount option: locktable= [ 321.355793] gfs2: can't parse mount arguments [ 321.567420] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.579578] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.586001] bridge0: port 1(bridge_slave_0) entered forwarding state 10:57:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:57:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8902, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r2 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) sched_setparam(r3, &(0x7f00000000c0)) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:57:01 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x3, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:57:01 executing program 3: r0 = socket$inet(0x2, 0xf, 0x5e) fcntl$lock(r0, 0x6, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xff00000000000000}) 10:57:01 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000564000)=@abs, 0x6e, &(0x7f0000451ff0)=[{&(0x7f0000007000)="002a932f01000000cf960802e02348f800000000001c0003f2a576", 0x1b}], 0x1, &(0x7f00001f9fe0)}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000400)='/dev/sg#\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000007000)={0x0, 0x0, 0x80da14}) open_by_handle_at(r0, &(0x7f0000000040)={0x36, 0x5, "c7ee1ae86827077e4e9a0ee4408d12d36114d8f34e7417719d2bf1da99e4d64b436f5e4fd2ffa5c3400f662a1074"}, 0x2) sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 10:57:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x118, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:57:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x8101, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:57:01 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={"6272696467655f736c6176655f3000fd", 0x2000000c0ffffff}) 10:57:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x9, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) exit(0x0) [ 321.649666] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 321.670266] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 321.684963] gfs2: invalid mount option: locktable= [ 321.690054] gfs2: can't parse mount arguments 10:57:01 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x200000, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000100)={0x7, 0x79, 0x1}, 0x7) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x40800000000000, 0x4800) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f00000002c0)=@nl=@proc, 0x80, &(0x7f0000001700)=[{&(0x7f0000000340)=""/166, 0xa6}, {&(0x7f0000000400)=""/146, 0x92}, {&(0x7f00000004c0)=""/219, 0xdb}, {&(0x7f00000005c0)=""/65, 0x41}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/173, 0xad}], 0x6, &(0x7f0000001780)=""/159, 0x9f, 0x6}, 0x20) r3 = add_key(&(0x7f0000001840)='blacklist\x00', &(0x7f0000001880)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$update(0x2, r3, &(0x7f00000018c0)="cd9ebdb667336713b5e9557ccfe8689ae4b6b5032ab8e739a04308c9b6a6c0d4eb275407d887154a677c0e46d14c7d69f874318f7cdb3d308371d25ab9ed43e044210b5b3f9ff2558e0e47928e07c654d00c", 0x52) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x20) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000001940)=0x0) process_vm_writev(r5, &(0x7f0000002080)=[{&(0x7f0000001980)=""/87, 0x57}, {&(0x7f0000001a00)=""/145, 0x91}, {&(0x7f0000001ac0)=""/213, 0xd5}, {&(0x7f0000001bc0)=""/78, 0x4e}, {&(0x7f0000001c40)=""/141, 0x8d}, {&(0x7f0000001d00)=""/109, 0x6d}, {&(0x7f0000001d80)=""/161, 0xa1}, {&(0x7f0000001e40)=""/191, 0xbf}, {&(0x7f0000001f00)=""/172, 0xac}, {&(0x7f0000001fc0)=""/144, 0x90}], 0xa, &(0x7f0000002200)=[{&(0x7f0000002140)=""/24, 0x18}, {&(0x7f0000002180)=""/109, 0x6d}], 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000240), &(0x7f0000000280)=0x10) 10:57:01 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040), 0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x2, {0xa, 0x4e23, 0xffffffff00000000, @loopback, 0x7fffffff}, r2}}, 0x38) [ 321.698976] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.705383] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.721540] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.733197] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.739602] bridge0: port 1(bridge_slave_0) entered forwarding state 10:57:01 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xfdfdffff00000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:57:01 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:57:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x8, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) 10:57:01 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x1f000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:57:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xcb01, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 321.935636] gfs2: invalid mount option: locktable= [ 321.940689] gfs2: can't parse mount arguments [ 322.004818] gfs2: invalid mount option: locktable= [ 322.009848] gfs2: can't parse mount arguments [ 322.023855] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.113663] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.120100] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.146311] bridge0: port 1(bridge_slave_0) entered disabled state 10:57:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:57:01 executing program 1: r0 = getpgrp(0x0) r1 = gettid() r2 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000080)) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000000040)) rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000a75000)={0x0, 0x0, 0xfffffffffffffffa}) 10:57:01 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x400000) accept4$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14, 0x800) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") unshare(0x2000400) fchmodat(r0, &(0x7f0000000100)='./file0\x00', 0x78) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000040), 0x4) 10:57:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x63, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 322.162099] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.168506] bridge0: port 1(bridge_slave_0) entered forwarding state 10:57:01 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x6c000000, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:57:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xe201, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:57:01 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='ns\x00') getdents64(r1, &(0x7f0000000340)=""/57, 0x39) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000340)=[{0x18, 0x0, 0x7, "8905"}], 0x18}}], 0x2, 0x0) ioctl$TIOCCBRK(r1, 0x5428) [ 322.216582] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.250576] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.257019] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.282856] gfs2: invalid mount option: locktable= [ 322.287939] gfs2: can't parse mount arguments 10:57:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xa101, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 322.326082] gfs2: invalid mount option: locktable= [ 322.331132] gfs2: can't parse mount arguments 10:57:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet(0x2, 0x3, 0x3) getsockopt$inet_opts(r1, 0x0, 0x18, &(0x7f0000000000)=""/128, &(0x7f0000000080)=0x80) r2 = socket(0x2, 0x803, 0x20) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=@ipv4_newaddr={0x68, 0x14, 0x200, 0x70bd2d, 0x25dfdbfc, {0x2, 0x1f, 0x401, 0xfd, r3}, [@IFA_BROADCAST={0x8, 0x4, @rand_addr=0x5}, @IFA_LOCAL={0x8, 0x2, @loopback}, @IFA_FLAGS={0x8, 0x8, 0x40}, @IFA_CACHEINFO={0x14, 0x6, {0x401, 0x1, 0xe252, 0x5}}, @IFA_BROADCAST={0x8, 0x4, @multicast1}, @IFA_LABEL={0x14, 0x3, 'veth0\x00'}, @IFA_FLAGS={0x8, 0x8, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0xee2f3135e199263}, 0x20000045) 10:57:02 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:57:02 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xffffff7f, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:57:02 executing program 1: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000200)={@local, @rand_addr=0x59f, @rand_addr=0x7fffffff}, 0xc) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23}, 0x10) r1 = dup2(r0, r0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r0, 0x11a, 0x1, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2=0xe000000a, @loopback}, 0x28) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000100)={0x0, @multicast1, 0x4e20, 0x2, 'sh\x00', 0x1, 0xffffffffffffff00, 0x2a}, 0x2c) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) read(r2, &(0x7f0000000180)=""/11, 0x5) write$P9_RLERRORu(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYPTR, @ANYBLOB="863bffec3b58825abac86cbe6e93b328fa611bf232afe128f731e432c2df40130af370782f1d063b5e7bfcae8f15dc338b785c2b000000000000", @ANYRESOCT=r2, @ANYRESOCT=r1, @ANYRESHEX=0x0, @ANYBLOB="9a7d21e8b2c50775c37fea7e67"], 0xb5) 10:57:02 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40000, 0x0) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000040)={[], 0x0, 0x8, 0x7fff, 0x0, 0xbeb, 0xd000, 0x1f000, [], 0xfffffffffffffffb}) unshare(0x8000000) socket$inet_smc(0x2b, 0x1, 0x0) 10:57:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x76748c5f, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 322.478864] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.489465] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.495912] bridge0: port 1(bridge_slave_0) entered forwarding state 10:57:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x9101, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) 10:57:02 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0x1f00, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) [ 322.675870] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.684405] IPVS: set_ctl: invalid protocol: 0 224.0.0.1:20000 [ 322.694451] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 322.703536] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.715367] bridge0: port 1(bridge_slave_0) entered blocking state 10:57:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bridge_slave_0\x00'}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 10:57:02 executing program 5: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000003380), 0xf008, &(0x7f0000003440)={[{@locktable={'locktable'}}]}) 10:57:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0xb801, &(0x7f0000000ff0)=[{0x30}, {0x80000006}]}, 0x10) [ 322.721796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.728615] kasan: CONFIG_KASAN_INLINE enabled [ 322.733252] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 322.740640] general protection fault: 0000 [#1] SMP KASAN [ 322.746178] CPU: 0 PID: 28665 Comm: syz-executor1 Not tainted 4.18.0-rc7-next-20180802+ #30 [ 322.754670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.764043] RIP: 0010:smc_ioctl+0x5d4/0x1250 10:57:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = dup2(r0, r0) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @multicast2}, 0x8) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000000)=0x1ff) [ 322.768463] Code: 48 c1 ea 03 80 3c 02 00 0f 85 7c 0c 00 00 4c 8b ab 98 04 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d 7d 20 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e ca 0b 00 00 41 8b 45 20 49 8d [ 322.787374] RSP: 0018:ffff8801948375c8 EFLAGS: 00010202 [ 322.792745] RAX: dffffc0000000000 RBX: ffff88019a6cacc0 RCX: 1ffff10032906ed9 [ 322.800029] RDX: 0000000000000004 RSI: 1ffff10032906ef9 RDI: 0000000000000020 [ 322.807331] RBP: ffff8801948379b0 R08: ffffed0032906eda R09: ffffed0032906ed9 [ 322.814607] R10: ffffed0032906ed9 R11: ffff8801948376cf R12: 1ffff10032906ebd 10:57:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x10, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 322.821882] R13: 0000000000000000 R14: 0000000020000040 R15: ffff880194837688 [ 322.829161] FS: 00007f6cf0725700(0000) GS:ffff8801db000000(0000) knlGS:0000000000000000 [ 322.837400] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 322.843280] CR2: 0000001b33b21000 CR3: 00000001cb85f000 CR4: 00000000001406f0 [ 322.850554] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 322.857826] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 322.865097] Call Trace: [ 322.867703] ? __account_cfs_rq_runtime+0x770/0x770 [ 322.872732] ? smc_connect_rdma+0x9d0/0x9d0 [ 322.877066] ? __account_cfs_rq_runtime+0x770/0x770 [ 322.882096] ? set_next_entity+0x2dd/0xb00 [ 322.886342] ? trace_hardirqs_on+0x10/0x10 [ 322.890592] ? trace_hardirqs_on+0x10/0x10 [ 322.894847] ? pick_next_task_fair+0x999/0x16e0 [ 322.899536] ? run_rebalance_domains+0x4c0/0x4c0 [ 322.904301] ? finish_task_switch+0x1d3/0x870 [ 322.908811] ? lock_downgrade+0x8f0/0x8f0 [ 322.912975] ? finish_task_switch+0x18a/0x870 [ 322.917477] ? kasan_check_read+0x11/0x20 [ 322.921636] ? do_raw_spin_unlock+0xa7/0x2f0 10:57:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x324, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 322.926052] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 322.930643] ? compat_start_thread+0x80/0x80 [ 322.935057] ? trace_hardirqs_on+0xd/0x10 [ 322.939214] ? _raw_spin_unlock_irq+0x27/0x70 [ 322.943712] ? finish_task_switch+0x1d3/0x870 [ 322.948219] sock_do_ioctl+0xe4/0x3e0 [ 322.952023] ? compat_ifr_data_ioctl+0x170/0x170 [ 322.956785] ? retint_kernel+0x10/0x10 [ 322.960680] ? __sanitizer_cov_trace_switch+0x11/0x90 [ 322.965876] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 322.971072] sock_ioctl+0x30d/0x680 10:57:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000b40), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x1, 0x9effffff00000000, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8, 0x5, 0x1}]}}}]}, 0x44}}, 0x0) [ 322.974708] ? dlci_ioctl_set+0x40/0x40 [ 322.978693] ? ksys_dup3+0x690/0x690 [ 322.982410] ? nf_setsockopt+0xa9/0xd0 [ 322.986306] ? dlci_ioctl_set+0x40/0x40 [ 322.990286] do_vfs_ioctl+0x1de/0x1720 [ 322.994191] ? ioctl_preallocate+0x300/0x300 [ 322.998606] ? __fget_light+0x2f7/0x440 [ 323.002585] ? __schedule+0x1ec0/0x1ec0 [ 323.006558] ? fget_raw+0x20/0x20 [ 323.010017] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 323.015560] ? fput+0x130/0x1a0 [ 323.018876] ? __x64_sys_futex+0x47f/0x6a0 [ 323.023118] ? security_file_ioctl+0x94/0xc0 [ 323.027527] ksys_ioctl+0xa9/0xd0 [ 323.030983] __x64_sys_ioctl+0x73/0xb0 [ 323.034878] do_syscall_64+0x1b9/0x820 [ 323.038770] ? finish_task_switch+0x1d3/0x870 [ 323.043273] ? syscall_return_slowpath+0x5e0/0x5e0 [ 323.048209] ? syscall_return_slowpath+0x31d/0x5e0 [ 323.053127] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 323.058151] ? __switch_to_asm+0x34/0x70 [ 323.062218] ? __switch_to_asm+0x34/0x70 [ 323.066266] ? __switch_to_asm+0x40/0x70 [ 323.070325] ? __switch_to_asm+0x34/0x70 [ 323.074382] ? __switch_to_asm+0x40/0x70 [ 323.078436] ? __switch_to_asm+0x34/0x70 [ 323.082480] ? __switch_to_asm+0x40/0x70 [ 323.086528] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 323.091366] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.096542] RIP: 0033:0x456a09 [ 323.099746] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.118633] RSP: 002b:00007f6cf0724c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 323.126336] RAX: ffffffffffffffda RBX: 00007f6cf07256d4 RCX: 0000000000456a09 [ 323.133589] RDX: 0000000020000040 RSI: 000000000000894b RDI: 0000000000000013 [ 323.140854] RBP: 0000000000930320 R08: 0000000000000000 R09: 0000000000000000 [ 323.148105] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 323.155356] R13: 00000000004d0ec8 R14: 00000000004bf0e8 R15: 0000000000000004 [ 323.162631] Modules linked in: [ 323.165817] Dumping ftrace buffer: [ 323.169337] (ftrace buffer empty) [ 323.173210] ---[ end trace ab2361947095d931 ]--- [ 323.177988] RIP: 0010:smc_ioctl+0x5d4/0x1250 [ 323.182415] Code: 48 c1 ea 03 80 3c 02 00 0f 85 7c 0c 00 00 4c 8b ab 98 04 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d 7d 20 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e ca 0b 00 00 41 8b 45 20 49 8d [ 323.201334] RSP: 0018:ffff8801948375c8 EFLAGS: 00010202 [ 323.206714] RAX: dffffc0000000000 RBX: ffff88019a6cacc0 RCX: 1ffff10032906ed9 [ 323.213996] RDX: 0000000000000004 RSI: 1ffff10032906ef9 RDI: 0000000000000020 [ 323.221272] RBP: ffff8801948379b0 R08: ffffed0032906eda R09: ffffed0032906ed9 [ 323.228542] R10: ffffed0032906ed9 R11: ffff8801948376cf R12: 1ffff10032906ebd [ 323.235815] R13: 0000000000000000 R14: 0000000020000040 R15: ffff880194837688 [ 323.243099] FS: 00007f6cf0725700(0000) GS:ffff8801db000000(0000) knlGS:0000000000000000 [ 323.251333] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 323.257224] CR2: 0000001b33b21000 CR3: 00000001cb85f000 CR4: 00000000001406f0 [ 323.264500] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 323.271779] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 323.279058] Kernel panic - not syncing: Fatal exception [ 323.284807] Dumping ftrace buffer: [ 323.288336] (ftrace buffer empty) [ 323.292024] Kernel Offset: disabled [ 323.295631] Rebooting in 86400 seconds..