, 0x8912, 0x400200) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:40:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) keyctl$get_persistent(0x3, r2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) keyctl$get_persistent(0x3, r4, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) keyctl$get_persistent(0x3, r6, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() r9 = socket$inet(0x2, 0x2, 0x676) r10 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) fstat(r9, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) shmctl$IPC_SET(r10, 0x1, &(0x7f0000000840)={{0x0, 0x0, r11, r12, r11, 0x0, 0xb}, 0xb8fb, 0xbb, 0x3, 0x8000, 0x0, 0x0, 0x81}) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {}, [{0x2, 0xb}, {0x2, 0x1}, {0x2, 0x2}, {}, {0x2, 0x4}, {0x2, 0x2, r2}, {0x2, 0x7, r4}, {0x2, 0x0, r6}], {0x4, 0x4}, [{0x8, 0x2, r7}, {0x8, 0x3, r8}, {0x8, 0x1, r11}], {}, {0x20, 0x2}}, 0x7c, 0x2) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 582.975828][T15352] gfs2: can't find protocol lock_no+ock 05:40:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:17 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1700, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 583.167813][T15372] gfs2: can't find protocol lock_no+ock [ 583.213797][T15372] gfs2: can't find protocol lock_no+ock 05:40:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvram\x00', 0x40, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000300)={r3, 0x1, 0x8001, r2}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000040)={0xe8, 0x6, 0x4, 0x20, 0x1, {r4, r5/1000+10000}, {0x5, 0x1, 0x81, 0x2, 0x1, 0x3, "2c9d32c7"}, 0xae, 0x1, @offset=0x3, 0x2, 0x0, 0xffffffffffffffff}) bind$alg(r6, &(0x7f0000000940)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000180)={{0x3be, 0x1f, 0x6, 0xf8f1}, 'syz1\x00', 0x48}) setxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@known='com.apple.FinderInfo\x00', &(0x7f0000000280)='syz1\x00', 0x5, 0x2) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={r8, r10, 0x3}, 0x14) 05:40:20 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1f00, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:20 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0xf000000) [ 585.780157][T15406] gfs2: can't find protocol lock_no+ock 05:40:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 585.843066][T15406] gfs2: can't find protocol lock_no+ock 05:40:20 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x2000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x4) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$NFQNL_MSG_VERDICT(r4, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x178}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) 05:40:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 586.040229][T15438] gfs2: can't find protocol lock_no+ock [ 586.107643][T15438] gfs2: can't find protocol lock_no+ock 05:40:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x710401, 0x0) 05:40:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:20 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x2010, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:40:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000040)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 586.347575][T15468] gfs2: can't find protocol lock_no+ock [ 586.407071][T15468] gfs2: can't find protocol lock_no+ock 05:40:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:23 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x3f00, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="10284e774d7a9f0f44994192d4b15d513dda444e3c64816b727f0dd3bade978e8190309a56a92795ca9ced603a2b80de58deb3ef6db0262c52bbb22960748a657a9aa70d376a2dae62c6a66cd50a3c52d31c0b6e3e777a10ea446fb6a1fe669127d24e2d9f7f14b3738de5f1f581fd73d06e8317db54266cbc12b0d6511b2fc1639f677a36ab21c76b424207ef81c529f11382e6ea2dc2c08555c0179a917b40bd35a5a0d0c9a39aeb25ba2c94", 0xad) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8983, &(0x7f0000000000)={0x8, 'bond_slave_1\x00', {'team_slave_0\x00'}, 0xa82a}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:40:23 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x10000000) 05:40:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 588.837015][T15502] gfs2: can't find protocol lock_no+ock 05:40:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r4, 0xc0205649, &(0x7f0000000140)={0xa20000, 0x8, 0x3, r0, 0x0, &(0x7f0000000100)={0x990a91, 0x7, [], @p_u32=&(0x7f00000000c0)=0xa}}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r5, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0x6a, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[]}, 0x1, 0x0, 0x0, 0x4900}, 0x4008081) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x5b) [ 588.915498][T15502] gfs2: can't find protocol lock_no+ock 05:40:23 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r4, 0xc0405519, &(0x7f00000000c0)={0x7, 0x0, 0x1, 0x4500, '\x00', 0x7ff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r5) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000000)={0x3f, 0xa, 0x4, 0x20, 0x2, {}, {0x3, 0xc, 0x2, 0x0, 0x40, 0x93, "5ef63262"}, 0x2, 0x1, @userptr=0x1, 0x5, 0x0, r5}) r6 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) bind$alg(r6, &(0x7f0000000940)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(aegis128-generic,cbcmac(anubis))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 589.084657][T15535] gfs2: can't find protocol lock_no+ock [ 589.142835][T15535] gfs2: can't find protocol lock_no+ock 05:40:23 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:40:23 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4600, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 589.350970][T15555] gfs2: can't find protocol lock_no+ock [ 589.405096][T15555] gfs2: can't find protocol lock_no+ock 05:40:23 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4800, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 589.597805][T15573] gfs2: can't find protocol lock_no+ock [ 589.700791][T15573] gfs2: can't find protocol lock_no+ock 05:40:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:26 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x3f000000) 05:40:26 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4c00, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 591.975477][T15594] gfs2: can't find protocol lock_no+ock [ 592.043012][T15594] gfs2: can't find protocol lock_no+ock 05:40:26 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4c01, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 592.225037][T15615] gfs2: can't find protocol lock_no+ock [ 592.281025][T15615] gfs2: can't find protocol lock_no+ock 05:40:26 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5703, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:26 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 592.483806][T15631] gfs2: can't find protocol lock_no+ock 05:40:26 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x6000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x204680, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000040)) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r4, 0xc01064c7, &(0x7f00000005c0)={0x7, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(0xffffffffffffffff, 0xc00464c9, &(0x7f0000000600)={r5}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000000c0)={r5}) 05:40:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000000)=0x2, 0x4) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) [ 592.740834][T15646] gfs2: can't find protocol lock_no+ock 05:40:27 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x40000000) 05:40:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f00000001c0)) r2 = getpgrp(r1) waitid(0x1, r2, 0x0, 0x1, &(0x7f0000000080)) 05:40:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, 0x0) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:29 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x6800, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x120080, 0x0) r2 = dup(r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = semget$private(0x0, 0x2, 0xd) semctl$GETZCNT(r5, 0x1, 0xf, &(0x7f00000001c0)=""/247) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r4, 0x80184151, &(0x7f0000000180)={0x0, &(0x7f00000000c0)="4888ba4bd0e32193bf7f2ec917b5c9da585c8d695336f2a2a20d01b524ad51d2f5ae93826dde8dd165e32a49b78ab79b5fc3226cb3ba8771612d46068cc929e39b699ed932f1551031e1714e85662aba027d66f8c469d1b4a14ef887f7a0a9267ca7ad4dd46d09c1e65e93e4941a9d9488721d9d6f6dca6e50c32f47b6d765297890fcba0491eb7107f8565e5f4160e5cd56cdb70bc160ac465eb1d6c5141496347760a26b158d74069fe0dd", 0xac}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_G_AUDOUT(r7, 0x80345631, &(0x7f00000002c0)) ioctl$VIDIOC_ENUMINPUT(r2, 0xc050561a, &(0x7f0000000000)={0xfa, "566c179cae73ca9c5fd7913c40b8fedd5f6d2585bfe4fb5a40b3c1a7a7e7caf4", 0x2, 0x20000000, 0x0, 0x2, 0xa20, 0x4}) [ 594.968774][T15670] gfs2: can't find protocol lock_no+ock 05:40:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:29 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x8dffffff) 05:40:29 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x6c00, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 595.117439][T15687] gfs2: can't find protocol lock_no+ock [ 595.181517][T15687] gfs2: can't find protocol lock_no+ock 05:40:29 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:40:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000480)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='k\x00', @ANYRES16=r1, @ANYBLOB="ee0d0018012b13dbdf25070000000801804000000000"], 0x3}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r1, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x280088d4}, 0x1) 05:40:29 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x7400, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 595.555012][T15712] gfs2: can't find protocol lock_no+ock 05:40:29 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvfrom$rxrpc(0xffffffffffffffff, &(0x7f0000000100)=""/187, 0xbb, 0x20, &(0x7f00000001c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @remote}}, 0x24) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f0000000080)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r5, 0x4018620d, &(0x7f00000000c0)={0x73622a85, 0xa, 0x3}) ioctl$USBDEVFS_RESETEP(r3, 0x80045503, &(0x7f0000000040)={0x1}) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r6, 0x6612) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, 0x0, 0x0) 05:40:29 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x7a00, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f00000001c0)) sched_getscheduler(r1) r2 = socket$inet(0x2, 0x2, 0x676) r3 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) fstat(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000840)={{0x0, 0x0, r4, r5, r4, 0x0, 0xb}, 0xb8fb, 0xbb, 0x3, 0x8000, 0x0, 0x0, 0x81}) mount$9p_xen(&(0x7f0000000000)='syz\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x24b3a101959785c2, &(0x7f00000000c0)={'trans=xen,', {[{@mmap='mmap'}, {@access_any='access=any'}, {@dfltgid={'dfltgid', 0x3d, r4}}, {@access_any='access=any'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'vmac64(aes-generic)\x00'}}, {@dont_appraise='dont_appraise'}]}}) [ 595.690372][T15725] gfs2: can't find protocol lock_no+ock [ 595.758449][T15725] gfs2: can't find protocol lock_no+ock 05:40:32 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x8901, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e23, @empty}}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0xe, 0x1, 0x7, &(0x7f0000000040)=[0x0, 0x0], 0x2}, 0x20) 05:40:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, 0x0) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:32 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0xf0ffffff) 05:40:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 598.083954][T15746] gfs2: can't find protocol lock_no+ock 05:40:32 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x8d01, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 598.290074][T15768] gfs2: can't find protocol lock_no+ock [ 598.352359][T15768] gfs2: can't find protocol lock_no+ock 05:40:32 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:32 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x9101, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 598.602847][T15786] gfs2: can't find protocol lock_no+ock 05:40:33 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xa000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 598.677509][T15786] gfs2: can't find protocol lock_no+ock [ 598.810493][T15799] gfs2: can't find protocol lock_no+ock [ 598.873649][T15799] gfs2: can't find protocol lock_no+ock 05:40:33 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xb600, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:33 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0xffffff8d) [ 599.029280][T15813] gfs2: can't find protocol lock_no+ock 05:40:33 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xb901, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 599.191670][T15824] gfs2: can't find protocol lock_no+ock [ 599.251415][T15824] gfs2: can't find protocol lock_no+ock 05:40:33 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xba02, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 599.378965][T15837] gfs2: can't find protocol lock_no+ock 05:40:33 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xc903, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 599.449840][T15837] gfs2: can't find protocol lock_no+ock [ 599.540104][T15849] gfs2: can't find protocol lock_no+ock [ 599.602746][T15849] gfs2: can't find protocol lock_no+ock 05:40:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, 0x0) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:35 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xedc0, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 601.176360][T15866] gfs2: can't find protocol lock_no+ock 05:40:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:35 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0xfffffff0) 05:40:35 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:35 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xf403, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 601.651422][T15888] gfs2: can't find protocol lock_no+ock [ 601.712696][T15888] gfs2: can't find protocol lock_no+ock 05:40:36 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xfa01, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 601.868824][T15906] gfs2: can't find protocol lock_no+ock [ 601.915808][T15906] gfs2: can't find protocol lock_no+ock 05:40:36 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xff00, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 602.021261][T15919] gfs2: can't find protocol lock_no+ock [ 602.071200][T15919] gfs2: can't find protocol lock_no+ock 05:40:36 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x100000000000000) 05:40:36 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1703e, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 602.282371][T15936] gfs2: can't find protocol lock_no+ock 05:40:36 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1703f, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 602.518187][T15945] gfs2: can't find protocol lock_no+ock 05:40:36 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17040, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 602.643634][T15953] gfs2: can't find protocol lock_no+ock [ 602.715267][T15953] gfs2: can't find protocol lock_no+ock 05:40:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) 05:40:38 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17041, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 604.277907][T15967] gfs2: can't find protocol lock_no+ock 05:40:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:38 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0xf00000000000000) [ 604.325594][T15967] gfs2: can't find protocol lock_no+ock 05:40:39 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000900)={0x48, 0x0, &(0x7f0000000880)=[@reply={0x40406301, {0x3, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x70, 0x18, &(0x7f00000007c0)={@ptr={0x70742a85, 0x0, &(0x7f0000000680)=""/66, 0x42, 0x0, 0x31}, @ptr={0x70742a85, 0x1, &(0x7f0000000700)=""/159, 0x9f, 0x0, 0x1a}, @fda={0x66646185, 0x5, 0x0, 0xb}}, &(0x7f0000000840)={0x0, 0x28, 0x50}}}, @exit_looper], 0xd0, 0x0, &(0x7f00000019c0)="3a4d871ed9cc19167dd554c9cd3d3c51ffb8a727ce5caf701b9ece322a255d2956d3419af885b84cc5e092c44fb9b4f723313b5a26b5089f674a2028ee77e7d25ad9b24db7432519d9dac7593f1714591713986d72cda309fc39162cdb9661166aa6e6ad329b56e054316ac2e7356b8c86140f93c445e45b3c3aa70c895ed8020093c231da172ea5c9daa8caa2dcaa6ec95479379a17a45b2a469a4b0d0946d2766d240b0de92b675bbfb59ee3990c8ec7ca70b1424d8b881246ef9c7dbaff83ea81e853a88e3e618b615b12090ea0cb"}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r5, 0x8, 0x70bd2d, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a='\xa0\\\xa8Ol\x9c\x8e8S\xe2\xfdzp\xae\x0f\xb2\x0f\xa1R`\f\xb0\bE\x17O\b\ao\x8dxC'}, @WGDEVICE_A_FLAGS={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x48010) bind$alg(r0, &(0x7f0000000940)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x22) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f00000001c0)='bfs\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x7, &(0x7f00000005c0)=[{&(0x7f00000009c0)="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", 0x1000, 0x8}, {&(0x7f0000000240)="886926c59fda8a3024a0fa5bb2003edd3929207be126a90fc61fc941c690d581df06865688a070d6d7de839308fffde722efbdd1a423f70b040169a9d43e10e3584d0d3f3d4262e7c5c4102e62824bdef5aaf226ee5ac43522b43b26726fd8bbe7247c58ac3a35bd5bd9214d37d843f2de50b57fbc77c18ff7340ed61581bea81938b8ada473cf86f6269498bbb518ce25d13a31ceee111e21ac6ae05f643ec19ea4d21447ef93dc5bc0a6b820c3c768dc92", 0xb2, 0x2b27}, {&(0x7f0000000300)="a3e472a0329c811c10a128bda6e934150180570467484ded4582c05fe6cc0a61cbf9f5cacead90779a4bb71fce9ebb1eab", 0x31, 0x8000}, {&(0x7f0000000340)="09e5ec83fd88a55d00fbbd24bca30170f6b57deb1615e08ee223c16788dd7a9371e1c1cb98fc3f8b5d8ba18e84b1978fe545a551bf8d10c44bb6d4c48e34b995fc4c9df2bce9180447381c58ddd1996e816ed955b23a9afbf2a0081da2814cce95", 0x61}, {&(0x7f00000003c0)="03d31cefa3636ead31a193fd46cec215c21faff4bbe53efa2d9c1b1f97bd2c5b8e072a2f907060d5f13ade0768a370d81ae4c53d71f950e7ffe8e7bedd310c6da5b5b3c43eac4d4724892b9535ee1e64a74df71cf0f5faa5706850afab8b8ab76093c5f0df576c5b9d08df35d9500b415073d967723b3efbf91a", 0x7a, 0x8}, {&(0x7f0000000440)="cd9b0946de434c4f50898b5fce4c307e87bd7254677e25082667bbf6eb9dae49a943535b1ae36777ce7922ef6b76d4300090ed6758b0fb99c3e7b410ca292dddc67d7190addeb97f44fef0240b3001cc473b65bfa3b13bcb3677427ba7a5c23e418d8d1ddf1cb26e690ee7de39b4c0a6ba2b12e12e445bcb3bafb4eacb014d845cc6cdbd7d0b7cf3362226c861bfa1b42df397d0ca0d7e74516bd4c4d6a443f5c8a5057c5b5614d10c1fae2797bb137d7dc4fcd3b3676cdaf2a488dca7b3543068f1047ab35b37adc3f916205f7deb6250a7d9b399718369d9c55208a5c6da4ccbca50c92a2bb8004a8a9ee783ce7d95b14945ac5719fb53d2", 0xf9}, {&(0x7f0000000540)="892b870be50ac4f11faf39ae85f9567cca08cdd834ef626efbbb6aeac40c0dcf2259d1ba43fa5b80c9cd1fdcb9b2068bdb0fb104e88a01e4e37d0353924fe974639c120978f9d9b840ad1bca114a8032440fca5fd6309e19651109", 0x5b, 0x6}], 0xeb16619bd2d14531, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$FUSE_GETXATTR(r7, &(0x7f0000000180)={0x18, 0x0, 0x8, {0x9}}, 0x18) 05:40:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:39 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17042, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x25) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 604.760000][T15999] gfs2: can't find protocol lock_no+ock [ 604.854220][T15999] gfs2: can't find protocol lock_no+ock 05:40:39 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17043, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x25) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) [ 605.073700][T16037] gfs2: can't find protocol lock_no+ock [ 605.144322][T16037] gfs2: can't find protocol lock_no+ock 05:40:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) 05:40:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xffffffffffffff15) 05:40:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x25) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 05:40:41 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x1000000000000000) 05:40:42 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17044, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:40:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWSET={0x48, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_DESC={0xc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x4}]}]}], {0x14}}, 0x70}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x200, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x549800, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) keyctl$get_persistent(0x3, r5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) keyctl$get_persistent(0x3, r7, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@mmap='mmap'}], [{@appraise='appraise'}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/cachefiles\x00'}}, {@fowner_gt={'fowner>', r5}}, {@obj_type={'obj_type', 0x3d, '##wlan0self!vmnet0[\\(\\'}}, {@dont_measure='dont_measure'}, {@fowner_lt={'fowner<', r7}}]}}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@assoc_value, &(0x7f0000000180)=0x8) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) [ 607.790094][T16079] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 607.819807][T16080] gfs2: can't find protocol lock_no+ock 05:40:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 607.838368][T16079] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 607.869488][T16080] gfs2: can't find protocol lock_no+ock 05:40:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:40:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) open_by_handle_at(r3, &(0x7f0000000000)={0x56, 0x1, "8cd902e07a884f8400591e2521db6a336bdd920f310612fe95a3f7578241feb25335ba3eef47b4b4b728599940a070e50cef5d7f130b447b33dedcfd79ea340cf1a7a1b30a69c04ea21e488fb1ba"}, 0x80000) r4 = dup(r1) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r5, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x2004c001}, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$alg(r4, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(morus1280-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:40:42 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17045, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 608.041303][T16107] gfs2: can't find protocol lock_no+ock [ 608.101447][T16107] gfs2: can't find protocol lock_no+ock 05:40:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000000)=0x10200, 0x4) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x48, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@TCA_RATE={0x6, 0x5, {0x4, 0x1}}, @qdisc_kind_options=@q_etf={{0x8, 0x1, 'etf\x00'}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x0, 0xb}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x10080) bind$packet(r2, &(0x7f0000000040)={0x11, 0x4, r4, 0x1, 0x81, 0x6, @random="e46687c3eede"}, 0x14) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:40:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:40:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) 05:40:44 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x2efdc68fc9d87db0) 05:40:44 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17046, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 610.402476][T16137] gfs2: can't find protocol lock_no+ock [ 610.405400][T16143] ptrace attach of "/root/syz-executor.4"[16138] was attempted by "/root/syz-executor.4"[16143] [ 610.479203][T16137] gfs2: can't find protocol lock_no+ock [ 610.533942][T16160] ptrace attach of "/root/syz-executor.4"[16159] was attempted by "/root/syz-executor.4"[16160] 05:40:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:40:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000040)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:40:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:40:45 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17047, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 610.933549][T16175] ptrace attach of "/root/syz-executor.4"[16172] was attempted by "/root/syz-executor.4"[16175] [ 610.934719][T16174] gfs2: can't find protocol lock_no+ock 05:40:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) eventfd(0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x205, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000080)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = getpid() sched_setscheduler(r4, 0x0, &(0x7f00000001c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f00000000c0)={{0x1, 0x6, 0x2, 0xe76, 'syz0\x00', 0xb671}, 0x4, 0x2, 0x8001, r4, 0xa, 0xfffffa67, 'syz1\x00', &(0x7f0000000040)=['user+\x00', '$\x00', 'hash\x00', '\\+\x00', 'vboxnet1\\\x00', 'wlan1%\x00', '{eth1wlan1GPL\x00', '\x00', '\x00', '/dev/hwrng\x00'], 0x3c, [], [0x5, 0x8, 0x20, 0x20]}) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r6, 0x800442d2, &(0x7f0000000280)={0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @local}]}) [ 611.003224][T16174] gfs2: can't find protocol lock_no+ock 05:40:45 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17048, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 611.147702][T16195] ptrace attach of "/root/syz-executor.4"[16192] was attempted by "/root/syz-executor.4"[16195] [ 611.218168][T16199] gfs2: can't find protocol lock_no+ock [ 611.280821][T16208] ptrace attach of "/root/syz-executor.4"[16205] was attempted by "/root/syz-executor.4"[16208] [ 611.282071][T16199] gfs2: can't find protocol lock_no+ock 05:40:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 05:40:47 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x3f00000000000000) 05:40:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:40:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f00000000c0)=0x9, 0x4) r3 = semget$private(0x0, 0x3, 0x0) semctl$IPC_STAT(r3, 0x0, 0x2, 0x0) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000000)=""/145) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 613.475603][T16230] ptrace attach of "/root/syz-executor.4"[16228] was attempted by "/root/syz-executor.4"[16230] 05:40:48 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17049, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r0) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:40:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:40:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x4, 0x40000) recvfrom$l2tp6(r1, &(0x7f0000000040)=""/242, 0xf2, 0x40010043, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x20) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000640)='./file0\x00', 0x60c000, 0x4) bind$alg(r2, &(0x7f0000000680)={0x26, 'aead\x00', 0x0, 0x0, 'ccm-aes-ce\x00'}, 0x58) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$btrfs(&(0x7f0000000300)='btrfs\x00', &(0x7f0000000340)='./file0\x00', 0xfcf, 0x2, &(0x7f0000000400)=[{&(0x7f0000000380)="2b2c89f74cd5fdd5d0b2e8847ee8f5d2a818c0383646b71d019637b01cf77310cb3b9570aa835d8dffe049765b020e1cb7762933e1a5c292a87ee4451567eb17d6795a63f15020ba1a4a", 0x4a}, {&(0x7f0000000480)="75d48343438fd8c3cfbffc70224f75f5465d7fe6393ec065121a280bdc673f4de7fa91345f8b2f6650f2365faacf0fa34662883a36456b3905ce2b997c45176c7563f914622e4da65cc8e1b3fdb52f4e9feecb8fc60decae28415b2098f63ba4de109deb35da844e2be7d7316fe49ac2a350f3e18697427988f9e8bd3d7dc46dd286f30edd2e30a6dabb1e19bebe11ceb0b2db4bdff60b0b330297ce07c8ab9c824c3b3ab2e4a0aaef268ba8bad2c60aa93a60f1f9cb22b49c9c1e2310decb24fafc8ed3ea11a62d7ffede33be7441f5fab8ab893678ec3d4cb1572d10251585dcf0bf", 0xe3, 0x6e7}], 0x10, &(0x7f0000000580)={[{@datacow='datacow'}, {@compress_algo={'compress', 0x3d, 'lzo'}}, {@barrier='barrier'}, {@commit={'commit', 0x3d, 0x179}}, {@compress_algo={'compress', 0x3d, 'no'}}, {@skip_balance='skip_balance'}, {@nospace_cache='nospace_cache'}, {@subvolid={'subvolid', 0x3d, 0x6}}, {@skip_balance='skip_balance'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@audit='audit'}]}) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r7, 0x800c6613, &(0x7f0000000700)=@v1={0x0, @aes256, 0x3, "950624d7f8da12aa"}) r8 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000780)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CAPI_INSTALLED(r8, 0x80024322) sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000000a00000004000380"], 0x18}}, 0x0) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000740)) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xb0, r5, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5f}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5b}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x10001}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x17}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x8}}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3b}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x800}, 0x2400c850) [ 613.948955][T16241] gfs2: can't find protocol lock_no+ock [ 614.084454][T16241] gfs2: can't find protocol lock_no+ock 05:40:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) close(r1) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x1) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000040)) 05:40:48 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1704a, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 614.192692][T16269] gfs2: can't find protocol lock_no+ock 05:40:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xb, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$NBD_SET_SOCK(r1, 0xab00, r3) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 614.249777][T16269] gfs2: can't find protocol lock_no+ock 05:40:48 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x4000000000000000) 05:40:50 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1704b, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x0) keyctl$describe(0xf, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0xffff, 0x10000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat(r7, &(0x7f0000000100)='./file0\x00', 0x10140, 0x88) r9 = getpid() sched_setscheduler(r9, 0x0, &(0x7f00000001c0)) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x144, 0x0, 0x300, 0x70bd27, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r3}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r9}}]}, 0x144}, 0x1, 0x0, 0x0, 0x28004090}, 0x40010) keyctl$reject(0x13, r1, 0x0, 0x2, r2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:40:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 05:40:50 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x8dffffff00000000) [ 616.476789][T16299] gfs2: can't find protocol lock_no+ock 05:40:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:40:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r0) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:40:51 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1704c, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 05:40:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:40:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8983, &(0x7f0000000080)={0x8, 'xfrm0\x00', {'veth1_to_team\x00'}}) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x7, 0x2b, 0xf, 0x9, 0xb, 0x1, 0x6, 0xbf}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syslog(0x0, &(0x7f0000000000)=""/47, 0x2f) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xffffffffffffff6f) 05:40:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r0) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 617.051335][T16326] gfs2: can't find protocol lock_no+ock [ 617.145019][T16326] gfs2: can't find protocol lock_no+ock 05:40:51 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1704d, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 617.266815][T16354] gfs2: can't find protocol lock_no+ock 05:40:51 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0xb07dd8c98fc6fd2e) 05:40:51 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1704e, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 617.315223][T16354] gfs2: can't find protocol lock_no+ock [ 617.388874][T16368] gfs2: can't find protocol lock_no+ock [ 617.462287][T16368] gfs2: can't find protocol lock_no+ock 05:40:51 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1704f, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 617.580185][T16384] gfs2: can't find protocol lock_no+ock 05:40:51 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17050, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 617.630854][T16384] gfs2: can't find protocol lock_no+ock [ 617.739742][T16396] gfs2: can't find protocol lock_no+ock [ 617.818666][T16396] gfs2: can't find protocol lock_no+ock 05:40:52 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17051, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r3, &(0x7f0000000400)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r5, @in, [0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x8, 0x951, 0x800000000007ff, 0x0, 0x5, 0x0, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000100)={r5, @in={{0x2, 0x4e23, @remote}}, 0xfffd, 0x1}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000040)={r5, 0x2d, "7711054fdfa7c5b4e3b726f4eae1a2bbbee79c8ae33ff953638bc6f53b51a734ba7adc89e4b6cee146e4e9c8d2"}, &(0x7f0000000080)=0x35) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000000)={r5, 0xfff}, 0x8) accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 617.941257][T16413] gfs2: can't find protocol lock_no+ock 05:40:52 executing program 5: socket$alg(0x26, 0x5, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40142, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xf) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7ff, 0x800) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="580000000614000826bd7000fddbdf2508000100018000000800010000000000080001000000000008000100010000000800010002000000080001000200000008000100010000000800010020000000080001000100000018b642"], 0x58}, 0x1, 0x0, 0x0, 0x40800}, 0x40) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x60, 0x0, 0x404, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@private1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x600000}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x8004}, 0x0) [ 618.002379][T16413] gfs2: can't find protocol lock_no+ock 05:40:54 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17052, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:40:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x5) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={0xffffffffffffffff, r2, 0xb, 0x2, r5}, 0x14) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) creat(&(0x7f0000000140)='./file0\x00', 0x30) r7 = dup(r6) syslog(0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KDGETKEYCODE(r7, 0x4b4c, &(0x7f00000000c0)={0x8, 0x4}) [ 620.080859][T16439] gfs2: can't find protocol lock_no+ock 05:40:54 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0xf0ffffff00000000) 05:40:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:40:54 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x4000000000000000) [ 620.163093][T16439] gfs2: can't find protocol lock_no+ock 05:40:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400001, 0x0) bind$alg(r3, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-arm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:40:54 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17053, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UFFDIO_ZEROPAGE(r4, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) [ 620.357856][T16473] gfs2: can't find protocol lock_no+ock [ 620.420748][T16473] gfs2: can't find protocol lock_no+ock 05:40:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'blake2s-256-x86\x00'}, 0x49) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:40:54 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17054, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 620.566315][T16493] gfs2: can't find protocol lock_no+ock [ 620.628192][T16493] gfs2: can't find protocol lock_no+ock 05:40:55 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17055, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 620.798802][T16509] gfs2: can't find protocol lock_no+ock [ 620.855139][T16509] gfs2: can't find protocol lock_no+ock 05:40:55 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17056, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 620.967031][T16523] gfs2: can't find protocol lock_no+ock [ 621.020489][T16523] gfs2: can't find protocol lock_no+ock 05:40:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:40:57 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r5, &(0x7f0000000400)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r7, @in, [0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x8, 0x951, 0x800000000007ff, 0x0, 0x5, 0x0, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000100)={r7, @in={{0x2, 0x4e23, @remote}}, 0xfffd, 0x1}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000040)=ANY=[@ANYRES32=r7, @ANYBLOB="2d0000007711054fdfe7c5b4e3b726f4eae1a2bbbee79c8ae33ff953638bc6f53b51a734ba7adc89e4b6cee146e4e9c8d2"], &(0x7f0000000080)=0x35) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000000)={r7, @in6={{0xa, 0x4e21, 0x4, @dev={0xfe, 0x80, [], 0xe}}}, 0x1, 0x1, 0x0, 0xffffff00, 0x8001}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={r8, 0x100}, &(0x7f0000000140)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r9 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r9, 0x0, 0x30007, 0x0) 05:40:57 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17057, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 623.173428][T16546] gfs2: can't find protocol lock_no+ock 05:40:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:40:57 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x3f00000000000000) 05:40:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x400, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000000780)={0x0, &(0x7f0000000700)=[&(0x7f00000000c0)="27dc5765a2c059d60caff85e41c693fa566a21598a2fbe5dd0179e74f10a1cc781e429921aafd573b44021c1dd43ba2d59b2db702353d08b5bfaf3328aebab26d555e50dee7d503f13f35158bc104f2a9f469ae5defc9c27bbf60999f79c7cdb87fc0387e0c0a41cbc676ad3a1b0bfc766de06348f33845cf2d439d6fe1b5b64e63d5a5b689c2355f621841537539f4eab137afceab2e42f83f080522bc5c0e091bb3971c93e464f31009a69f8", &(0x7f0000000180)='\a', &(0x7f00000001c0)="cdb7e534a99fba1a6a023010be927f639ff0fc09b9d2068d437d5527301298c47a042f434974006e146fd0cd5f13b5dedc3e07982290d7c402c11ea4f086b24e06bb35b487914fb564ffb0b1a295407a59b60baf1eba295bd1da2a611d21e99243695a15eb33875767807e1caf8c6e05f1e3d93d38b12dfec24d4009849633860894b3b7883ca37d4309ae8b426fc8eea63343ed169c0c98cfa33468591315a5c50ef41e01790ce0122b4a7772efbd0b08e1b320adc661d112c4bd5f5560", &(0x7f0000000280)="ee6468315a2e414a95a1387983ddb97e33a541dc1d8dd400f938d937eb660593e14be3d85878539f9fa3415628e6068f2d8b525704b7fa103b384dab46af1f478e083204e0b682658f30e12f3917435a68d34f75d91405add9512e60bb9231bb373a9f532fd819bcb92e21865bc94b5f52148d851892541a1fb72ede30781eac7b76e6284371aa049329b5cc539dc8b7c19ccb84c28d2b2aef2d1e8d02c6f76bf16e76cac618b94de8434468a8817a8d959482e9b22bd03e18c1931ae1791288665974fa8c7374419336ccfeede8debb1e4a0c9bcd1e6a006115d9b74323cdc5", &(0x7f0000000380)="8735c81532be515b44b179b8661ee400cdf9d84ea7a525a1e29348473ac73f83374b3b52dc2e8c3f447ff2e180b56218a9531c0c8404c3faea54f3000c4ebf013bcf5017c0ab200d2e1cf95582e4215ed72ab03563eeca4287f10ec5022c554648619dae968d16c04aafcd90dfecabc5996fb35732245697c0356da776dec5c624afaf1220083e376bbb16facddf8c30c1d8450f6c5b07d9350157b4fd", &(0x7f0000000440)="7d056bbe19da0048ea18a2425cf3cba7e6c3ad69d7b994319f0f116a7f9df6456b3eddf82e5b00ecb00d6566e768fb2748d0535b37a20f7457006dfc7ebdd8ddf7e9203f400ee521a6cfbf55508fff7b05d150753560382753b13cee9af0d3d29deb828369b012b86ef7be7d83d19cbd58b1919aef5d1f6e7d2d43bd21c034d03355503fce25c2d42d51993a2b14057734654afda01c3710", &(0x7f0000000500)="fb75346dea", &(0x7f0000000540)="5f163390056ab34399344f3cd59d486820bbf413792144c2bf63770322d8e40bc260ae663c3145fd17a7b54d020daa32af7354ed6b201080ae7e4455dc1fc8b0feedd45cd01a9eeeebdb1c1fa1e4b183b00c59e17523d2c0aadb19c36588392be4af0f9c5d021c07e7e28897d89c34007cf95227ab8f9937ead16525cf889c4512f8089bc36ab7526cd253ed6b1f7f448ad17f8961a7423e219d22074e5721e90f1465c496cf214ccc4f934a5ef6893d3a5ff73dc4521eee6bd1c77528bf777c55085f16047af079f4b036bc58952b17", &(0x7f0000000640)="cfa0ba35ee296ff1476684706adf8233a28716ffa8d152b5431d825f268f5790b9dcb5a76421a085890004a8d98b90d6e936febe56c119c04009b874b7d0c12c0d47488d800986d4edc30a665d9ade0c50582a9afc28dd4877d11cb032b268854f49d07a8d37dee639854e48fc0fdeff9331ea13f20064e15cfe2f3cd53502b0cf47250d9ffb3a9a1d5b7134c9445c2c6610911d27438f"]}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) r4 = socket$inet(0x10, 0x2, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000260007031dfffd946f610500000000000543000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/sysvipc/msg\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r7, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000800)=0x10) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, 0x0, 0x0) [ 623.230368][T16546] gfs2: can't find protocol lock_no+ock 05:40:57 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17058, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000000000)='gtp\x00') bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 623.442330][T16573] gfs2: can't find protocol lock_no+ock [ 623.497595][T16573] gfs2: can't find protocol lock_no+ock 05:40:57 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17059, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:40:58 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1705a, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 623.666333][T16591] gfs2: can't find protocol lock_no+ock 05:40:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x1000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup3(0xffffffffffffffff, r5, 0x0) ioctl$KVM_SET_PIT2(r6, 0x4070aea0, &(0x7f0000000080)={[{0x3, 0xfff7, 0x2, 0x4, 0x0, 0x7, 0x9, 0x88, 0x3f, 0x9, 0x6, 0x2, 0xfff}, {0x3, 0xa538, 0x5, 0x7, 0x6, 0x81, 0xc1, 0x7, 0x9, 0x4, 0x0, 0x3, 0x782}, {0x1, 0xfffe, 0x0, 0x2, 0x9, 0x81, 0xfb, 0x7, 0x3f, 0x7, 0x7, 0x0, 0xfffffffffffffffd}], 0x2}) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001440)=[{&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000240)="7f1550604f31a2b42de03e6fd0c557cc0fc4bb44266382e2f98c26735569feeed780fb9d48a828bbc044a0766f6e2b60f6d7e19b7911bd760e490fa17f756be348e4f2c493a287dac504a8c0ef70e42ba12cf41dd595fa1a15a0340e6c99d52cb4ca62bf21ad075d05a983574388f9307b5c0384b7f930ff455628e10f752974da834a529559805392b8e5d64f45bfa09e36779808dbb402625927fd8f5d4f7b8ae3aaa36c2e366054915035826b0b4693c0ac5e3c3f3006acbb03d03fe9e1d31ea8863452e44e41e907e7fedc264ffd1a3432061e7cd9c879a63079a567db0ae90a31420b0cbe", 0xe7}, {0xffffffffffffffff}, {&(0x7f0000000340)="64dc1cb8e81b2e5ce8596375de986ebc0199bea2cf5140ccc94fadb6a40a5797c904f5aaf14dd988a82b869a46bb236ed50df3fc30840802e31598fd3c79b48764a7e93031b633a0bb2f53f3c67825b542ce0089a9b5a9afdac55e22da4b4d40f08cf3648be8341ae4303999db67c10c76b1ac22795d80c6c2c3b56313102f98cc7fc35746", 0x85}, {&(0x7f0000001500)="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", 0x162}, {&(0x7f00000001c0)="f76227b96560ad3e21e7dd028c15e40c1fc2eb987034b53ac6fdc22a65", 0x1d}, {&(0x7f0000000400)="8c06f568f8c4fb8ba3439872cc1f4726360ee15120fc8116263e5dd7edffe5bd934d3ea1c16a0c7b59b570ad929ee0a46b608554fb53eff0c3d0a801ac7ca5858d88478d634378a2425d959aa1d803831ff2ef88f6c3ba7187e5857f744301cfe02cbcaaa62ebc09cdae7f7194e2263b22272dc6b37e6a8eb3bc77170d3f7748b79e559c1c875575a728a17d257ab457597b74737adb48844b86e4677a19d791d2ce7dbce734a2a72945a5aeef3a838402cb6e9bd7427869de6347449298bcb7825027429778f3e7d5d84b0772398570b7c25a584145de9547f41b692b41424f9adf3817b0ac441ab1cdd1ae928ee4ddb6cd8edc83c8", 0xf6}, {&(0x7f0000000500)="2945e2ab0f6c279419f367f574b96c34f7fc08818d71426bb57acfec431690e423972a2ab2f6976bf6af8088979489f1db40c03115fc741ae2c8c8846b0d79a98f15c43ee2d4621077a61815a7b12b2ff3d655bdaf4de46f6e5b6635ea78ca86919f7fa289d7e0aa6ff009bd28cad9ed60adfe26a4bda636bc36a5b4d771c7158c7f85fb95688b173fe016e1e2db52e8173155b07cfb79e2754024ed5c531ec555de46887c127e5b4e2665c05363f1afd2202a229d88ac9fc5caae41ef3686bcc242e227a4c1e82cebfb9f510be2349831570dbcb84efe8583d9d1f74028cead34fa2553bf7a75fdab27e6", 0xeb}], 0x7, 0x0, 0x0, 0x40}, {&(0x7f0000000680)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000a80)=[{&(0x7f0000000700)="894a30ac8adcf0a4e17a66a6cdb367408acc9a96a132f4d7429c2e2932a92f608792a2d923eff325fc0f174dcbe17828f11e3be5efa6d9eb64d7532a31761b0e1f036c9fe9af0eef8bc010063e3ef0184b379bfe0b6150f4755df70fc153ca7c85391123db39d3ec9c94db69d0d29e239019ddd2550288012a02a46865ff967b5bef801f8c0031704bd71c297bc5ebd73551946e236d69d95b7070ddfdf804353b33d7c44ee0e4105ab1af1ebc9995f10f48654d3401059ddb1ff5584cb6cff64eb120a00717d3f1711fa1c189f9aa49aa", 0xd1}, {&(0x7f0000000800)="a87e20877e02e8e617d89c4c8314201e", 0x10}, {&(0x7f0000000840)="7cca15fc17300ddbbfa2b30ad5e4aba7e116237003b34b0dac8d35926071e2878a15d45412c9843078", 0x29}, {&(0x7f0000000880)="71eeda76d0ddf82b12ebe7643411395e287a7ee8c1651e1ff649019558a5693eb2464a830c1864048b0638157025fa9fc95632128e6534c39741c25a3fa64a2e1e95801b049e0b48a89bc830cb590c69b1fa807b33bc3ee2621d3afd5a924a78f4f83e4a4a92b5a9831bfc0192f9e6d68d1f3a71f75d", 0x76}, {&(0x7f00000009c0)="e03086271adb9109f66caba060559445f354b34c843378392bcaa3250f0025484ec40d90b4c02f6c2ddaf823f0709391fa0e82ad2265f8e148aee47add000d52ac6b7c24d4953a9cb285722217d7dff5257ba97c69d50ba598551de6512d43d81d9d945f8f653cc4e02a7214776a6707f964a60d16b070c223e3312abbe81bb12b81f841a7b38851dbe6df33b2fb", 0x8e}], 0x5, &(0x7f0000000cc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r1]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r4, r7, 0xffffffffffffffff, r8, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff, r9]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}], 0xe0, 0x80000}, {&(0x7f0000000dc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001280)=[{&(0x7f0000000e40)="1f7ce6eb69610def522883c8c119b29ce6bba17568998ff3027554a415d6721e89a3c296516c3c9615971b8dbb22393627c23a28e3a40b0f35f2ecdd70343e63ace6a871d9dd79f60e4f76810426ffcd7cac28c72815f1444aecca6340ae035804a84636bf9bb688f1222508e558cdee3f70615ad45e336a5cfb65df65c53365790472e4e6d82efe1ba3f13baac23e5095724d7944ea2f52fb850818da83a15b960d74038a9ae63181ffad272b4269a2b24ff4570497d9bcef0a6114ba8cc25330fbb4cf0d6a8045234fa449999e5601d4c3bada5aabb18d00a89557a334866a", 0xe0}, {&(0x7f0000000f40)}, {&(0x7f0000000f80)="7d015a8bcbc702e3ce7bfa926f4ac08bd0e91c7188ef594386cb5c2a9fbc8c069c816a172bbc07f495bcae663fe0a16479fbc3d1646887382cc1b952904a7488bfb0b96125a117e12dee760540b0c50ea84037bc4c55e562bb56e87f43dd637980c12f0b3c48d05e13901adb873d0448328b27aa807719d28dad32bad49b9a6825f4f03102edaf938d8f1eb3179e6378bab02cad10bda91ef0ba01a82496af26fccfacdbd5b83c0b2b2ab323c26462eaddb5a2258c800861de8b85e9e2a27359c33d2a", 0xc3}, {&(0x7f0000001080)="d901d47201889ed6c8211f4f66f9b959df1f607acb70ef81506f309ec45c47382b874177f1ff609774d5c09e56", 0x2d}, {&(0x7f00000010c0)="dc6ea77032a2f46e215e2a99563824c7ca2be01737a04f2de5681cf14ff1612f2d0af52b763cb9eab4c887ed72b48645af1175647467fdffd60494d74610d2c51530415bfcdc35f01e345378d8dff8e5bacb618037926688dc946775a3a8260f4fff05ef544a833eb1341bfb84ad23cd19f8b3f990cc317ccd31f6bdd58dd9c0304d3f320d00c6f19e113785b3ab724191cc6e7469d3303c352a5c286a45d617c321b1", 0xa3}, {&(0x7f0000001180)="49690ba00ed047473bccdfe354177c3cd0073bbb3631c199b946ed7b6ed7105c959b42dce1ec0519a690a7082e5b37aeb00bb8659d0e2af5ad21dbdc59d91b48bf5d727ea910728c029fb2ad0d9feb2ccac4df83d98d9a2a3badfe5eedba7c64e34770a3d4db4248cf77651abe3ce2801b385850b1251e5f50fe4a6c867624aba3d9c7cb999df0fc188d7296aca77a6b94bd828d8576f7d4c841d17265a56028360a6a5649b826eb5a6b636b31161fb7b68f9ccfc153206d369b1a4136a87087caa94b5a95c2016f6f29f21e7b0082c49443c9811e386c0c9c7d109fc410242f88", 0xe1}], 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000001d2180000000000180eaf1519a7707e6a64cae8696de58b9bde3c62846eca", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000001000000", @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000001000000b8a80952ce520adf25a5303e731798915af4cbdead", @ANYRES32, @ANYRES32], 0xe0, 0x40040}], 0x3, 0x0) ioctl$SIOCGSTAMPNS(r10, 0x8907, &(0x7f0000000040)) [ 623.776148][T16598] gfs2: can't find protocol lock_no+ock [ 623.842355][T16598] gfs2: can't find protocol lock_no+ock 05:40:58 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1705b, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 624.033258][T16617] gfs2: can't find protocol lock_no+ock 05:41:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:00 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xc08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1fffffffffffffff}, 0x10, 0x0, 0x7, 0x4}, 0x0, 0x0, r4, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r5 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 05:41:00 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1705c, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 626.213688][T16636] gfs2: can't find protocol lock_no+ock [ 626.264551][T16636] gfs2: can't find protocol lock_no+ock 05:41:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:41:00 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17058, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) fcntl$setsig(r0, 0xa, 0x24) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:00 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x20000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair(0x1e, 0x80000, 0x3f, &(0x7f0000000000)) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x4300, 0x0) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x61) [ 626.401284][T16658] gfs2: can't find protocol lock_no+ock 05:41:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x400, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x80184153, &(0x7f0000000780)={0x0, &(0x7f0000000700)=[&(0x7f00000000c0)="27dc5765a2c059d60caff85e41c693fa566a21598a2fbe5dd0179e74f10a1cc781e429921aafd573b44021c1dd43ba2d59b2db702353d08b5bfaf3328aebab26d555e50dee7d503f13f35158bc104f2a9f469ae5defc9c27bbf60999f79c7cdb87fc0387e0c0a41cbc676ad3a1b0bfc766de06348f33845cf2d439d6fe1b5b64e63d5a5b689c2355f621841537539f4eab137afceab2e42f83f080522bc5c0e091bb3971c93e464f31009a69f8", &(0x7f0000000180)='\a', &(0x7f00000001c0)="cdb7e534a99fba1a6a023010be927f639ff0fc09b9d2068d437d5527301298c47a042f434974006e146fd0cd5f13b5dedc3e07982290d7c402c11ea4f086b24e06bb35b487914fb564ffb0b1a295407a59b60baf1eba295bd1da2a611d21e99243695a15eb33875767807e1caf8c6e05f1e3d93d38b12dfec24d4009849633860894b3b7883ca37d4309ae8b426fc8eea63343ed169c0c98cfa33468591315a5c50ef41e01790ce0122b4a7772efbd0b08e1b320adc661d112c4bd5f5560", &(0x7f0000000280)="ee6468315a2e414a95a1387983ddb97e33a541dc1d8dd400f938d937eb660593e14be3d85878539f9fa3415628e6068f2d8b525704b7fa103b384dab46af1f478e083204e0b682658f30e12f3917435a68d34f75d91405add9512e60bb9231bb373a9f532fd819bcb92e21865bc94b5f52148d851892541a1fb72ede30781eac7b76e6284371aa049329b5cc539dc8b7c19ccb84c28d2b2aef2d1e8d02c6f76bf16e76cac618b94de8434468a8817a8d959482e9b22bd03e18c1931ae1791288665974fa8c7374419336ccfeede8debb1e4a0c9bcd1e6a006115d9b74323cdc5", &(0x7f0000000380)="8735c81532be515b44b179b8661ee400cdf9d84ea7a525a1e29348473ac73f83374b3b52dc2e8c3f447ff2e180b56218a9531c0c8404c3faea54f3000c4ebf013bcf5017c0ab200d2e1cf95582e4215ed72ab03563eeca4287f10ec5022c554648619dae968d16c04aafcd90dfecabc5996fb35732245697c0356da776dec5c624afaf1220083e376bbb16facddf8c30c1d8450f6c5b07d9350157b4fd", &(0x7f0000000440)="7d056bbe19da0048ea18a2425cf3cba7e6c3ad69d7b994319f0f116a7f9df6456b3eddf82e5b00ecb00d6566e768fb2748d0535b37a20f7457006dfc7ebdd8ddf7e9203f400ee521a6cfbf55508fff7b05d150753560382753b13cee9af0d3d29deb828369b012b86ef7be7d83d19cbd58b1919aef5d1f6e7d2d43bd21c034d03355503fce25c2d42d51993a2b14057734654afda01c3710", &(0x7f0000000500)="fb75346dea", &(0x7f0000000540)="5f163390056ab34399344f3cd59d486820bbf413792144c2bf63770322d8e40bc260ae663c3145fd17a7b54d020daa32af7354ed6b201080ae7e4455dc1fc8b0feedd45cd01a9eeeebdb1c1fa1e4b183b00c59e17523d2c0aadb19c36588392be4af0f9c5d021c07e7e28897d89c34007cf95227ab8f9937ead16525cf889c4512f8089bc36ab7526cd253ed6b1f7f448ad17f8961a7423e219d22074e5721e90f1465c496cf214ccc4f934a5ef6893d3a5ff73dc4521eee6bd1c77528bf777c55085f16047af079f4b036bc58952b17", &(0x7f0000000640)="cfa0ba35ee296ff1476684706adf8233a28716ffa8d152b5431d825f268f5790b9dcb5a76421a085890004a8d98b90d6e936febe56c119c04009b874b7d0c12c0d47488d800986d4edc30a665d9ade0c50582a9afc28dd4877d11cb032b268854f49d07a8d37dee639854e48fc0fdeff9331ea13f20064e15cfe2f3cd53502b0cf47250d9ffb3a9a1d5b7134c9445c2c6610911d27438f"]}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) r4 = socket$inet(0x10, 0x2, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000260007031dfffd946f610500000000000543000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/sysvipc/msg\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r7, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000800)=0x10) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, 0x0, 0x0) [ 626.490036][T16667] gfs2: can't find protocol lock_no+ock [ 626.554625][T16667] gfs2: can't find protocol lock_no+ock 05:41:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)={0x1c4, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_PUBL={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xffffffff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x42}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfde5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8001}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}]}, @TIPC_NLA_NET={0x28, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x18000000}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xbd6b}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6f}]}, @TIPC_NLA_SOCK={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x40008}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER={0xd4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x886}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x80}, 0x80) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000000)={0x80000001}, 0x4) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:00 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x40000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 626.749551][T16689] gfs2: can't find protocol lock_no+ock [ 626.795263][T16699] ptrace attach of "/root/syz-executor.3"[16698] was attempted by "/root/syz-executor.3"[16699] [ 626.821788][T16689] gfs2: can't find protocol lock_no+ock 05:41:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:03 executing program 5: ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, &(0x7f0000000000)={0x2, 0x88}) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x200080, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0xf) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r3, &(0x7f0000000080)="6bd18609fb6a354214a881875f7914c470c5d884c419096636e881f64bf001753c538244d343576e07a5343af3e2e9a112c2f0662f984487ae5d5247f1e86ec61609ce993a92e2d0e3cda58b38b156ddc570ec10237bb76261e3803663992b2bd5653060c7e7393502a502fd683c71e013f4aaf4f1a1352e261f335a2ad1437c917ca3236e28df1dae00ace5d8e57524a136df2035a56112328569dc024ccf81c72d4ca7c9453cfbb5a0df97641a154ddbf56b4ffdab3d0bf878c60bbffb29bfcdabc5434d37ba2d05b2fc5b9a54a72c8ec21aa7841948ba05adbfcc0dd6bff51041ae5390a69f8b66edc7140bbe02d1e64dd916a1f819", &(0x7f0000000180)=""/44}, 0x20) 05:41:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWSET={0x48, 0x9, 0xa, 0x6234f84c1300dfc9, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x28}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_DESC={0xc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x4}]}]}], {0x14}}, 0x70}}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x200, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x549800, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) keyctl$get_persistent(0x3, r5, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) keyctl$get_persistent(0x3, r7, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@mmap='mmap'}], [{@appraise='appraise'}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/cachefiles\x00'}}, {@fowner_gt={'fowner>', r5}}, {@obj_type={'obj_type', 0x3d, '##wlan0self!vmnet0[\\(\\'}}, {@dont_measure='dont_measure'}, {@fowner_lt={'fowner<', r7}}]}}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@assoc_value, &(0x7f0000000180)=0x8) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) [ 629.297112][T16721] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 05:41:03 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:03 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xe0000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept4$nfc_llcp(r2, &(0x7f0000000000), &(0x7f0000000080)=0x60, 0x80000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:03 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x100000000000000) 05:41:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000009c0)={r3, 0x1000, "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"}, &(0x7f0000000080)=0x1008) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 629.529089][T16732] gfs2: can't find protocol lock_no+ock [ 629.611761][T16732] gfs2: can't find protocol lock_no+ock 05:41:04 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x400000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:04 executing program 5: ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000000)=0x40) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000580)='/dev/bsg\x00', 0x101000, 0x0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f00000005c0)={0x72, 0xca}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) [ 629.786652][T16755] gfs2: can't find protocol lock_no+ock 05:41:04 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 629.949283][T16766] gfs2: can't find protocol lock_no+ock [ 630.013967][T16766] gfs2: can't find protocol lock_no+ock 05:41:04 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x2000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 630.202463][T16779] gfs2: can't find protocol lock_no+ock [ 630.268706][T16779] gfs2: can't find protocol lock_no+ock 05:41:06 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x3000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x24, 0x0, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY_FRAG_THRESHOLD={0x8, 0x3f, 0xffffffff}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x48, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@TCA_RATE={0x6, 0x5, {0x4, 0x1}}, @qdisc_kind_options=@q_etf={{0x8, 0x1, 'etf\x00'}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x0, 0xb}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x10080) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x48, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@TCA_RATE={0x6, 0x5, {0x4, 0x1}}, @qdisc_kind_options=@q_etf={{0x8, 0x1, 'etf\x00'}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x0, 0xb}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x10080) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x48, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}}, [@TCA_RATE={0x6, 0x5, {0x4, 0x1}}, @qdisc_kind_options=@q_etf={{0x8, 0x1, 'etf\x00'}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x0, 0xb}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x10080) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x64, 0x0, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'team_slave_1\x00'}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'gretap0\x00'}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r2}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000}, 0x80) [ 632.314932][T16801] gfs2: can't find protocol lock_no+ock [ 632.357520][T16801] gfs2: can't find protocol lock_no+ock 05:41:06 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xf403, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:06 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:06 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:06 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x140a, 0x100, 0x70bd26, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x4004) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xef44d37eae44e5ba}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="3c010000", @ANYRES16=r4, @ANYBLOB="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"], 0x13c}, 0x1, 0x0, 0x0, 0x4}, 0x4000081) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000180)={@remote, @local, 0x0, 0x9, [@local, @broadcast, @loopback, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x14}, @rand_addr=0x64010100, @multicast2, @local, @empty]}, 0x34) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) [ 632.566953][T16828] gfs2: can't find protocol lock_no+ock [ 632.586277][T16830] gfs2: can't find protocol lock_no+ock 05:41:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x220000, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:07 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xc903, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 632.699415][T16828] gfs2: can't find protocol lock_no+ock 05:41:07 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) epoll_create1(0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$rose(r2, 0x104, 0x6, &(0x7f0000000080)=0x7, 0x4) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) r5 = socket$inet(0x2, 0x2, 0x676) r6 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) fstat(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) shmctl$IPC_SET(r6, 0x1, &(0x7f0000000840)={{0x0, 0x0, r7, r8, r7, 0x0, 0xb}, 0xb8fb, 0xbb, 0x3, 0x8000, 0x0, 0x0, 0x81}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) keyctl$get_persistent(0x3, r10, 0x0) write$P9_RSTATu(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="5e79d77329a50498db08bfb51a0164da02007d010000003b00080000000000080000000000000000000000000000b076090000000400000000010000000000001800050068617369000300656d3100001400766d61633634286165732d67656e6572", @ANYRES32=r4, @ANYRES32=r7, @ANYRES32=r10], 0x64) [ 632.791355][T16851] gfs2: can't find protocol lock_no+ock [ 632.859113][T16851] gfs2: can't find protocol lock_no+ock [ 632.869545][T16858] gfs2: can't find protocol lock_no+ock 05:41:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000440)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e508445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503055db6a8e3b651b3302c24e6d149e8368ee6d3bafbc417256d042b4b87cb1bf46169ad1a593da66b2c6f453180f2c51be35c431e1af07e54c1251334415135422fa81b015a7a746c1979827e3d32057d408016cdc2b641a42626bbf8b7970a5638e9e48783ff80ded5b5184b69d41e60ba9e2ff7ef3e85b4419db2b064d64f833dc2035a6cc3ea28335ad94eb5ba974d9799ce94565559e6a7636b725c4c3dc1702af3c0f3d9dc77f6d404b7c8ff2cec1b4e703451a1d2750d9a22e9f4b5e27da765d228f09bbd30088ac9dff793ec759161849cf4217f5684bff8eddd65be61d3ed2dcc7bae8ab5e1260c3a90cdb37626c4871098802b34f271d8a091b0517bd1588b43cf21b2e3fe676e34d115a56d450d50a97ac7e2ea5904f9695dbde822dba41ac3a1190d63ef486a1829d38b005f9458a82533a555a2f674eea95af7ef7f0cf9654e0ed8d2ab722ca065fd97e6518b76a39cc1b04dc49c395f3aad5e05c76c1881f6a85fee6c6fba8340692eb0b7f3f948350e6947dac635cfef9e4ff4d3f756802cbd97e8c5845b25bc5a021d9875277f197d1bce55661e6961dd788a444962e33fa582a01d0bd61aaa22a76adf68b3169d3f0b49", 0xfff6, r1) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:07 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x6000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:07 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x6800, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 633.070263][T16878] gfs2: can't find protocol lock_no+ock [ 633.136456][T16886] gfs2: can't find protocol lock_no+ock [ 633.145791][T16878] gfs2: can't find protocol lock_no+ock 05:41:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001fe) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000000)=0x4) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) r7 = getpid() sched_setscheduler(r7, 0x2, &(0x7f0000000100)=0xfffffffe) r8 = syz_open_procfs(r7, &(0x7f0000000080)='environ\x00') setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r8, 0x84, 0x12, &(0x7f00000000c0)=0x80000001, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000006, 0x10, r6, 0x4000001e80) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000040)={0x7ff}, 0x4) 05:41:09 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:09 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4600, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:09 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x7000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:09 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_CLAIMINTERFACE(0xffffffffffffffff, 0x8004550f, &(0x7f0000000000)=0x76) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="0005bccb76a38700f8fffffffffeffff", 0x10) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x1, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0xf, 0x6, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x1}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x3}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x24000050}, 0x8080) 05:41:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:09 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0xa04a02, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000080)={0x980000, 0x4, 0xf9, r0, 0x0, &(0x7f0000000040)={0x9909d4, 0xdd9b, [], @ptr=0x2}}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000100)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f00000000c0)={0x40, 0xb21, 0x9, 0x8}) [ 635.598892][T16918] gfs2: can't find protocol lock_no+ock [ 635.629663][T16927] gfs2: can't find protocol lock_no+ock 05:41:10 executing program 5: prctl$PR_GET_FPEMU(0x9, &(0x7f00000000c0)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(aegis256)\x00'}, 0x58) socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x157c, 0x20002) recvmmsg(r1, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/38, 0x26}, {&(0x7f00000005c0)=""/249, 0xf9}, {&(0x7f0000000140)}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000340)=""/227, 0xe3}], 0x5, &(0x7f00000004c0)=""/159, 0x9f}, 0x8001}], 0x1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001cc0)={{{@in=@private, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f00000006c0)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000001e00)={@mcast1, @mcast1, @remote, 0x7ff, 0x2881, 0x8, 0x100, 0x1, 0x80000003, r2}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000000300), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000240)={0x3, 0x70, 0x6, 0x3, 0x61, 0x1, 0x0, 0x1589, 0x40010, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x100, 0xca2, 0x4, 0x3, 0x29, 0x4, 0x3}) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPCONNDEL(r5, 0x400442c9, &(0x7f0000000080)={0xfff, @remote}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="10284e774d7a9f0f44994192d4b15d513dda444e3c64816b727f0dd3bade978e8190309a56a92795ca9ced603a2b80de58deb3ef6db0262c52bbb22960748a657a9aa70d376a2dae62c6a66cd50a3c52d31c0b6e3e777a10ea446fb6a1fe669127d24e2d9f7f14b3738de5f1f581fd73d06e8317db54266cbc12b0d6511b2fc1639f677a36ab21c76b424207ef81c529f11382e6ea2dc2c08555c0179a917b40bd35a5a0d0c9a39aeb25ba2c94", 0xad) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8983, &(0x7f0000000000)={0x8, 'bond_slave_1\x00', {'team_slave_0\x00'}, 0xa82a}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 635.755196][T16927] gfs2: can't find protocol lock_no+ock 05:41:10 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x8000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:10 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xe00, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:10 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x9000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 635.940702][T16966] gfs2: can't find protocol lock_no+ock [ 635.993288][T16971] gfs2: can't find protocol lock_no+ock 05:41:10 executing program 3: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x191, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 636.122558][T16983] gfs2: can't find protocol lock_no+ock 05:41:12 executing program 3 (fault-call:14 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:12 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:12 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xa000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {}, {0x0}]}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000080)={r2, 0x18}) r3 = socket$alg(0x26, 0x5, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r5, 0x111, 0x2, 0x1, 0x4) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) 05:41:12 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$MON_IOCQ_RING_SIZE(r6, 0x9205) ioctl$KVM_REINJECT_CONTROL(r4, 0xae71, &(0x7f0000000000)={0xe3}) r7 = getpid() sched_setscheduler(r7, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x41c1, 0x24064, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, @perf_config_ext, 0x100, 0x0, 0xfffffffe}, r7, 0x0, 0xffffffffffffffff, 0xa) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r8 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r8, 0x0, 0x30007, 0x0) 05:41:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:13 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xa7fd1ec, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) dup(r0) 05:41:13 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xb000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x82801, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r6 = dup3(r1, r5, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) connect$unix(r8, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ioctl$DRM_IOCTL_GET_UNIQUE(r6, 0xc0106401, &(0x7f0000000040)={0x2a, &(0x7f0000000000)=""/42}) 05:41:13 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xc000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:13 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xd000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:16 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:16 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xe000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:16 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDCTL_DSP_NONBLOCK(r4, 0x500e, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 05:41:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x2, @random="17d16d641a34", 'dummy0\x00'}}) 05:41:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 641.797713][T17055] ptrace attach of "/root/syz-executor.1"[17049] was attempted by "/root/syz-executor.1"[17055] 05:41:16 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xe030000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x4e20, 0xfffffffa, @private2={0xfc, 0x2, [], 0x1}, 0x2}}, 0x0, 0x0, 0x2e, 0x0, "5d4e6b17c80edd0e4790956d5eba828c57de09a6ee140aafc5222d497926337ece18083103b8a2ae685d91767ed834a05475167f55223bec8622776261f04d05d30434d71d088db2d4568662dd863caa"}, 0xd8) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:16 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xf000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 641.914303][T17067] ptrace attach of "/root/syz-executor.1"[17065] was attempted by "/root/syz-executor.1"[17067] 05:41:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 641.997038][T17076] ptrace attach of "/root/syz-executor.1"[17074] was attempted by "/root/syz-executor.1"[17076] 05:41:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x21, 0x0) 05:41:19 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000040)=[r3], 0x1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x200, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) 05:41:19 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x10000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:19 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x80000001}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000080)={r3, @in6={{0xa, 0x4e21, 0x3, @mcast2, 0x80}}}, 0x84) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r4 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) 05:41:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) keyctl$get_persistent(0x3, r3, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000040)={0xa7, 0x7ff, {r1}, {r3}, 0x2}) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x3e9, 0x20, 0x70bd28, 0x25dfdbfe, {0x21, 0x0, 0x1, r4, 0x3, 0x8, 0x2, 0x0, 0x6cf3}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x15}, 0x40) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:19 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x11000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:19 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x12000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x6, 0x0, [{0x864}, {0x3f2, 0x0, 0x6}, {0x97e, 0x0, 0x80000001}, {0x9f6, 0x0, 0x9}, {0x11e, 0x0, 0xb6}, {0xbc0, 0x0, 0x8}]}) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:19 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x13000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) 05:41:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:22 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x14000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x7e, 0x0) 05:41:22 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x80, 0x0) setsockopt$sock_int(r2, 0x1, 0x26, &(0x7f0000000040)=0x30, 0x4) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, &(0x7f0000000080)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) 05:41:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x650440, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:22 executing program 5: socket$alg(0x26, 0x5, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r5) syncfs(r5) socket$rxrpc(0x21, 0x2, 0xa) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000000)) 05:41:22 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x15000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:22 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x16000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000080)={0x0, 0x9, 0x4, 0x70000, 0x101, {0x0, 0x2710}, {0x7, 0x8, 0x20, 0x3, 0xff, 0x6, "3bb5ae2f"}, 0x40, 0x2, @fd, 0x5, 0x0, 0xffffffffffffffff}) bind$alg(r3, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:25 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x17000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:25 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_ifreq(r0, 0x8936, &(0x7f0000000080)={'veth1_to_bridge\x00', @ifru_names='veth0\x00'}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_G_FBUF(r4, 0x8030560a, &(0x7f0000000040)={0x1, 0x0, &(0x7f0000000000)="2854cfef16bdfd4f6ca3e15940a9a9369fb7d984261ecc352d8758028a3cb91de6bd46050cdb0f4e034ccecf60ee2a77e7dbca8a59e4ca38ddb4b5c529c7", {0x5, 0x3, 0x36314d59, 0x1, 0xa5, 0x0, 0xa, 0x9}}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) getsockname(r5, &(0x7f0000000100)=@xdp, &(0x7f0000000180)=0x80) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000240)="4c8db73a61156df7c77da6ab0fce358dea01a28fe8932e5e5031dc6d6532b5d2d0cb5c96af9a4081a3bd7f778dd3e6a38349de1b54f19477af53874c734518679d3327ed9b66d1e5ba9840752fae74fd1fb1595ef67d2e8001831f3ce24e4d9833c289648e6c2e90da284ec13167e865ea671df3cf0bd325e1998cc9", 0x7c}, {&(0x7f0000000340)="a9247e4465a5bfff6d36d4b93c924c21d0d71ec209bc9db84eaa1b1fb1a2e690461955974e7dde0691f3f3b34aef8ebb02509e6d6d87e54fdbad437c9ba8af76a48a9c78f8b9fc4581b47f27f5df2c2f8b986204266a31fba26d4bcd0550e4f4c84490b6ce32923c5f1123dd60392e1d72dee29b93adf115d371fd5165f8096766cadf0b40f9cf774064ed", 0x8b}, {&(0x7f00000001c0)="3efff595cbe9236b1a98913a53c61dc19a1f03d371e3d4f3264c6d513a03fbf4fe97ff7f46f335b90774a8d4b01983aefe5eff231e037f070f6e", 0x3a}], 0x3, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f00000000c0)={'veth1_virt_wifi\x00', 0x1d5}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r6 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r1, 0x0, r6, 0x0, 0x30007, 0x0) 05:41:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$SIOCX25GCALLUSERDATA(0xffffffffffffffff, 0x89e4, &(0x7f0000000080)={0x28, "ea54c54f0dee0c299e4d67c1f6552c6d1d1b5bd26bcffdc9417675f0e6a07820c4b31923fd9d4f049def32e04c68ac6da9c2c90dcf5b608df0be66d8689c98f7007b6b775b0f1cbd609f1358c7bd20ff33b4d0ebffe735bebcada7104573e803a7b51873f9372a77e92c4c1ae52aad9d1185cff7d8dd01550f2f4ae5019b7efe"}) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'blake2s-160-generic\x00'}, 0xfffffefd) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x4000, 0x0) 05:41:25 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x24101, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:25 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1f000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:25 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x20000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) 05:41:25 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x20100000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:25 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x3e700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:28 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x3f000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x60ff, 0x0) 05:41:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x68) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_DECODER_CMD(r3, 0xc0485660, &(0x7f00000000c0)={0x3, 0x2, @raw_data=[0x1, 0x7f, 0xb0, 0x7, 0x40, 0x8001, 0x8, 0x8, 0xdf28, 0x7, 0x7f, 0xffffffff, 0x0, 0x7, 0x10000, 0x2c]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @random="3093b34e1938"}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x3, &(0x7f00000003c0)=ANY=[@ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRES16=r4, @ANYRESDEC, @ANYRESHEX], @ANYRES16, @ANYRESHEX], &(0x7f00000002c0)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x41100, 0x0, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r6, 0x0, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r6, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x6, 0x3}, 0x0, 0x0, &(0x7f0000000440)={0xfffffffe, 0x0, 0xfffffffb, 0x7}, &(0x7f0000000480)=0x1000020, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0xe, 0xb, &(0x7f0000001780)=ANY=[@ANYRESHEX=0x0, @ANYRES32, @ANYBLOB="00000000ff0300009500007f00002cfe5f09636ac21fedc09a7aa91020024e4ee9293ff67c07bf4d2d743082dcfeab0f1957069e2d6ff7f91b0643353fcfbc2e2b13f61e31ada71df7"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x1009, &(0x7f0000001800)=""/4105, 0x41100, 0x8, [], r5, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x2, 0x6, 0x8}, 0x10, r7}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x10, &(0x7f0000003ac0)={&(0x7f0000003a40)=""/90, 0x3e, r7}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)=""/104, 0x68, r7}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x10, &(0x7f0000000200)={&(0x7f0000000140)=""/177, 0xb1, r7}}, 0x10) 05:41:28 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$unix(r0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:41:28 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x3f700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x41, 0x1, 0x3}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000080)="decfbf84cfe01ea26ff75476897262acf56e01024d80e25234a5bfebadb06a4db9777d82b4a542c24c7037e1c54b60d631c46a5b7b8d7c0a56026b6da151d3f8ef2405b3a715346c25721bd164db98cbb11d856ec26122a0d1266e2fba7f8d07c5f0b7778d65fab6ecbb62c146c6e7ea11facd435909c9bfc52259", 0x7b}, {&(0x7f0000000100)="4a96f8a8f92b93b8d7dbc56f2577d9aac1a6bd3999bce147adf88dac14d62b8f7fff5a1decab3efcc1c2f6e2c25dd7f50e6b110eb4f76b85609c37788124675999f75c007f56d4b2e09febb9bb3dbb618546b061021be7e8da2c56aa779ec94fe9fb0481fca714a94aa1fb1c05cb00cb784adeb8731d66b4ff4f7f32242725153725063f316d067be832b5d43dea0f755071e855d6879a48d7f38a2699d02238904a78523e8ed5071679229055e99c5bdf647fff2e5ffccee18020bf26d2d8efea77ff", 0xc3}, {&(0x7f0000000200)="27898ac4c21e0bfdebb6f8ff77b46bb32905089409ec7b5007c8626a3b572cc45e9dabad6906d1dce90e21107fccb58975766b0ec0f0369bdf36b5f75555afa2c621665718544160d329e2faa8e53330c76c6005dc58de15e6e23ae0056ddb2e9d43e2bb0655a623013290b773ee61e78b799fef0962d82bbad3301ffe65a8e33f542a10ca5ce22e3a5f75ac1eb5a1fceeef90cffa48629c0911ff343592902db3792eebfcf128c1aff0210e3f0d5de05c121e0085", 0xb5}, {&(0x7f00000002c0)="d692ae8f936363a20a89d3dd3e58825ae437df0f7094f93f981df8bc12f00db444c0d2b0273cf0dbff70ec3b63c5d2c5686bcde0d59a865070d59d718bd92d485a0f95299c0e3fdcff720da375d211256c71ea96e2086a6828570d087a70017df94031d6ce37383a9348a7778b5d6304c26a7557d83d5a794541efe05328f17e8d545bdb87fd4f6a2fb738b87ef7d2", 0x8f}, {&(0x7f00000009c0)="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", 0x1000}], 0x5, &(0x7f0000000400)=[@txtime={{0x18, 0x1, 0x3d, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x36a}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x387}}, @txtime={{0x18, 0x1, 0x3d, 0xf445}}, @timestamping={{0x14, 0x1, 0x25, 0x8001}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}], 0xc0}, 0x20004000) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000700)={0xa30000, 0xfc, 0x0, r3, 0x0, &(0x7f00000006c0)={0x990a61, 0xff, [], @p_u16=&(0x7f0000000680)=0x8}}) r5 = getpid() sched_setscheduler(r5, 0x0, &(0x7f00000001c0)) write$cgroup_pid(r4, &(0x7f0000000740)=r5, 0x12) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dlm_plock\x00', 0x200200, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r2, 0x800442d2, &(0x7f0000000600)={0x3, &(0x7f0000000500)=[{0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @remote}]}) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 05:41:28 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x40000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x810000, 0x0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000080)={0x0, 0x9231, 0x20, 0x80000001, 0x1, 0x9a}) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x0, 0x40080c1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r4, 0x4008ae48, &(0x7f0000000000)=0x100000) 05:41:28 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x40700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:28 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x41700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:28 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x42700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @random="3093b34e1938"}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000022000000350000000000907c8587e2e813c40000"], &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r5, 0x0, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r7, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x6, 0x3}, 0x0, 0x0, &(0x7f0000000440)={0xfffffffe, 0x0, 0xfffffffb, 0x7}, &(0x7f0000000480)=0x1000020, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0xe, 0xb, &(0x7f0000001780)=ANY=[@ANYRESHEX=0x0, @ANYRES32, @ANYBLOB="00000000ff0300009500000000002cfe5f09636ac21fedc09a7aa91020024e4ee9293ff67c07bf4d2d743082dcfeab0f1957069e2d6ff7f91b0643353fcfbc2e2b13f61e31ada71df7"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000680)=""/4096, 0x41000, 0x8, [], r4, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x2, 0x6, 0x8}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xd, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x109c}, [@alu={0x4, 0x0, 0xb, 0x0, 0x6, 0xfffffffffffffffc, 0xfffffffffffffff0}, @alu={0x4, 0x0, 0xd, 0x9, 0x8, 0x50, 0x1}, @map={0x18, 0xa}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xae}, @map={0x18, 0xb}, @ldst={0x2, 0x3, 0x1, 0xb, 0xa, 0x0, 0xffffffffffffffff}, @alu={0x0, 0x0, 0x5, 0xb, 0x1, 0x0, 0x8}]}, &(0x7f0000000080)='syzkaller\x00', 0xffffff01, 0xd, &(0x7f00000002c0)=""/13, 0x41100, 0x8, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000001700)={0x5, 0xe, 0x6, 0x2}, 0x10, r8, r7}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000003b00)={0xffffffffffffffff, 0x10, &(0x7f0000003ac0)={&(0x7f0000003a40)=""/90, 0x5a, r8}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)=""/104, 0x68, r8}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r8, 0x4) acct(&(0x7f0000000040)='./file0\x00') 05:41:31 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x43700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:31 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup(r4) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet6_mreq(r7, 0x29, 0x1b, &(0x7f0000000140)={@private2, 0x0}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={@loopback, 0x1d, r8}) r9 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_STOPDAEMON(r9, 0x0, 0x48c, &(0x7f0000000100)={0x1, 'veth0\x00', 0x4}, 0x18) bind$alg(r7, &(0x7f0000000940)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-cast6-avx\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r10 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r10, 0x0, 0x30007, 0x0) 05:41:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x7700, 0x0) 05:41:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:31 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x44700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:31 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x45700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) sendfile(r0, r0, &(0x7f0000000000)=0x9, 0x4000000000000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:31 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x46000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:31 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x46700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:34 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x47700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="fb20b7350d6ac282fead1db250bba7d2b5b753f5017751d4976a1f42a87038701d3253c3afd50b495eb95d", 0x2b) 05:41:34 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x200000000, 0x6, &(0x7f0000001ac0)=[{&(0x7f0000000200)="13a3db860541823bb4d0c95cf1fab7a680a00988a2d52cd5d545159394c3f041a722f283756129204df731d56a5ed290c3bd421422877a66cf0b445d4aa2f1b01db3db4a018d3329ec342fadf9f13683cabd920a4b4a258e7c1cb59429afca628bf46e081d7c86cb8854a0f189480bef17205a27f23765e9b9092e0410b6b122af0c2451ac8c3150032f753f85cb811ebeef3abe1885e4e66a5ff63e1a82726841b3b80f6f5119f6a511bca81bbe281554dd324e5cccee5375afdcf78909204eda68456a68637b", 0xc7, 0x9}, {&(0x7f00000009c0)="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", 0x1000, 0x10001}, {&(0x7f00000006c0)="0f2a6f6fb9d8f4c910ee949f2f0fdc48321cc308e533dfc44291ea20aeb9f6ac05b1b0e0a661a18096f8ef5304b3365f09e1da72c938c4deab57a097e2708bb635d8068b8f3aa8df36f5ec26ce913dbdcb9660466f275b071f675fdacefbae37e50aebea7edd99f1ae2eb21d0b889f4339f082518df2bffed82e61d6feeba38eb49d8eb8f662841a297689ae40c13b99b76e40922b85e8c887751d6f2aa0d3c9938fa63c4d5466cc4d1b62a4de13fa30a7443761b5033658984c88802ecb46e21ab6611e235318c4e1c07a97799e06806f4ca405c764e843315b8ebae4109d77d1de7efe37c09868", 0xe8, 0x6}, {&(0x7f00000007c0)="2fff78590af72d9bd7aa3386db38979d6ea89fdb8772e1716639cf6463540ecb7e3793d05a2bd222eedf5e6203ce9a4f4cfbb53e03e092bce9f9f345a99144f80836e96075d053e98a79e54c325acc3409c7507bfdd122e9b86985e2de69ee8696a6db4cb5c34a54880ad892f2874b03df441b75c35fb857a49286beee6bd5c88b3184c7db840f0b3a288f3b32421f3385c5cfcd8171e78c2ceda60dcd1b2eb738fc7adf5b89ef5c744322b8dea9193bae8913d47cc83056e0783f31d69a44605f3764ab78e971627c1fc6dd88a967c2655b947b5e2bf3be6727", 0xda, 0x1}, {&(0x7f00000019c0)="736c03e5431c8bb524ca4cd7bb7d4b45d87acc668983df56a6d497beaa702216b969d9291376c167ec56d01f10b38f5ca85c6cbc32ed99dfdaaf511e9ae4ba8745642a96e99aebd07ceb94cff66cb66addf1dcd2b4badf1bdfd4c599c37f68efdd3c9284afb20845170733c51ec31f0fae921ab5a746439ddc1516da3118dc75dbca4fcdb85a3fdbb3970751819dd795c1164b068eb81465779f78c101649335fc07245bf63e7d99357da66ca76182ce3ce1656e3c258fa13318e33fe6797f3c669f4196ba36c638838d3d", 0xcb, 0x3}, {&(0x7f0000000340)="056e", 0x2, 0x7}], 0x800, &(0x7f0000000380)={[{@noquota='noquota'}, {@grpid='grpid'}, {@pquota='pquota'}, {@bsdgroups='bsdgroups'}], [{@context={'context', 0x3d, 'staff_u'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r4, &(0x7f0000000400)="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", 0x200, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r6, @in, [0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x8, 0x951, 0x800000000007ff, 0x0, 0x5, 0x0, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000100)={r6, @in={{0x2, 0x4e23, @remote}}, 0xfffd, 0x1}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000040)={r6, 0x2d, "7711054fdfa7c5b4e3b726f4eae1a2bbbee79c8ae33ff953638bc6f53b51a734ba7adc89e4b6cee146e4e9c8d2"}, &(0x7f0000000080)=0x35) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)={r6, 0xfffb, 0x1, [0x7fff]}, &(0x7f0000000040)=0xa) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:41:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x7e00, 0x0) 05:41:34 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x48000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 660.389110][T17354] xfs: Unknown parameter 'context' 05:41:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000001000000000000000c41000000140014"], 0x3}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r3, 0x200, 0x70bd26, 0x25dfdbfc, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x40800) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$alg(r5, &(0x7f0000000940)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:34 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x48700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:34 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x49700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x80200, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xfffffffffffffd40) 05:41:34 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4a700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) futex$FUTEX_WAIT_MULTIPLE(&(0x7f0000001b40)=[{&(0x7f0000000000), 0x1}, {&(0x7f0000000040)=0x2, 0x2}, {&(0x7f0000000080), 0x2}, {&(0x7f00000000c0)=0x1, 0x1}, {&(0x7f0000000100)=0x2, 0x3}, {&(0x7f0000000140)=0x1, 0x7df}, {&(0x7f0000000180)=0x40000000}, {&(0x7f00000001c0)=0x1}, {&(0x7f0000000200), 0x2}, {&(0x7f0000000240)=0x2, 0x1}, {&(0x7f0000000280)=0x2, 0x1}, {&(0x7f00000002c0)=0x2}, {&(0x7f0000000300)=0x2}, {&(0x7f0000000340)=0x2, 0x1}, {&(0x7f0000000380), 0x2}, {&(0x7f00000003c0)=0x2}, {&(0x7f0000000400)=0x1}, {&(0x7f0000000440)=0x1, 0x2}, {&(0x7f0000000480)=0x1}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=0x2}, {&(0x7f0000000540), 0x1}, {&(0x7f0000000580)=0x2, 0x1}, {&(0x7f00000005c0)=0x1}, {&(0x7f0000000600)=0x1, 0x2}, {&(0x7f0000000640)=0x2, 0x2}, {&(0x7f0000000680)=0x1}, {&(0x7f00000006c0)}, {&(0x7f0000000700)=0x2}, {&(0x7f0000000740)=0x1}, {&(0x7f0000000780)=0x2, 0x2}, {&(0x7f00000007c0)=0x1, 0x2}, {&(0x7f0000000800)=0x1}, {&(0x7f0000000840)=0x2}, {&(0x7f0000000880)=0x2, 0x1}, {&(0x7f00000008c0)=0x1}, {&(0x7f0000000900)=0x1, 0x2}, {&(0x7f00000009c0)=0x1, 0x1}, {&(0x7f0000000a00)=0x2, 0x1}, {&(0x7f0000000a40)=0x1, 0x4}, {&(0x7f0000000a80)=0x2}, {&(0x7f0000000ac0), 0x1}, {&(0x7f0000000b00)=0x1}, {&(0x7f0000000b40)=0x1}, {&(0x7f0000000b80)=0x1, 0x2}, {&(0x7f0000000bc0)=0x2, 0x1}, {&(0x7f0000000c00)=0x2, 0x1}, {&(0x7f0000000c40)=0x1}, {&(0x7f0000000c80)=0x1, 0x2}, {&(0x7f0000000cc0)=0x2, 0x1}, {&(0x7f0000000d00)=0x1, 0x2}, {&(0x7f0000000d40)=0x1, 0x1}, {&(0x7f0000000d80)=0x2, 0x2}, {&(0x7f0000000dc0)=0x1, 0x1}, {&(0x7f0000000e00)=0x2, 0x1}, {&(0x7f0000000e40)=0x1, 0x1}, {&(0x7f0000000e80)}, {&(0x7f0000000ec0), 0x2}, {&(0x7f0000000f00)=0x1}, {&(0x7f0000000f40), 0x1}, {&(0x7f0000000f80)}, {&(0x7f0000000fc0), 0x1}, {&(0x7f0000001000), 0x1}, {&(0x7f0000001040)=0x1, 0x1}, {&(0x7f0000001080)=0x1, 0x2}, {&(0x7f00000010c0)=0x2}, {&(0x7f0000001100)=0xfffffff7}, {&(0x7f0000001140)=0x1, 0x2}, {&(0x7f0000001180)=0x1, 0x2}, {&(0x7f00000011c0), 0x2}, {&(0x7f0000001200)=0x1, 0x1}, {&(0x7f0000001240)=0x1}, {&(0x7f0000001280)=0x1}, {&(0x7f00000012c0)=0x2, 0x1}, {&(0x7f0000001300)=0x2, 0x1}, {&(0x7f0000001340)=0x1}, {&(0x7f0000001380)=0x2, 0x1}, {&(0x7f00000013c0)=0x2, 0x1}, {&(0x7f0000001400)=0x1, 0x1}, {&(0x7f0000001440)=0x1}, {&(0x7f0000001480)=0x2, 0x2}, {&(0x7f00000014c0)=0x2, 0x1}, {&(0x7f0000001500)=0x2, 0x1}, {&(0x7f0000001540)=0x2}, {&(0x7f0000001580)=0x1}, {&(0x7f00000015c0)=0x2}, {&(0x7f0000001600)=0x2, 0x1}, {&(0x7f0000001640), 0x1}, {&(0x7f0000001680), 0x1}, {&(0x7f00000016c0), 0x1}, {&(0x7f0000001700)}, {&(0x7f0000001740)=0x2}, {&(0x7f0000001780)=0x2}, {&(0x7f00000017c0)=0x2, 0x1}, {&(0x7f0000001800)=0x2, 0x2}, {&(0x7f0000001840)=0x2, 0x1}, {&(0x7f0000001880)=0x2, 0x1}, {&(0x7f00000018c0)=0x1, 0x2}, {&(0x7f0000001900)=0x2}, {&(0x7f0000001940)=0x2, 0x2}, {&(0x7f0000001980)}, {&(0x7f00000019c0)=0x1, 0x2}, {&(0x7f0000001a00)=0x2, 0x1}, {&(0x7f0000001a40)=0x2}, {&(0x7f0000001a80)=0x1, 0x1}, {&(0x7f0000001ac0)=0x1, 0x1}, {&(0x7f0000001b00)=0x1, 0x2}], 0xd, 0x6b, &(0x7f0000002200)={0x77359400}, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:37 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4b700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:37 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$CAPI_GET_PROFILE(r3, 0xc0404309, &(0x7f0000000000)=0x7f) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r4, 0x0) keyctl$describe(0xf, r4, 0x0, 0x0) keyctl$setperm(0x5, r4, 0x2000000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r6) accept4(r6, &(0x7f0000000080)=@nfc, &(0x7f0000000140)=0x80, 0x80000) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0x3, 0x3ff, 0x7, 0x5, 0xfffffffb}) r7 = accept4(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r7, 0x0, 0x30007, 0x0) 05:41:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0xb700, 0x0) 05:41:37 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4c000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f00000004c0)={0x37c, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x7c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffe}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xffffffff, @private0={0xfc, 0x0, [], 0x1}, 0x22ce2036}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast2}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_NODE={0x44, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_SOCK={0x64, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1000}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xe46}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x27}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x200}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x20}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xd8c2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7ff}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xe8}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xf2a}]}, @TIPC_NLA_LINK={0x3c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffe}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0x58, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffff7c7}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xbb4}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7d}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}]}, @TIPC_NLA_BEARER={0x130, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x13, 0x1, @l2={'eth', 0x3a, 'syzkaller1\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x64010100}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x101, @private2, 0xab}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x3, @mcast2, 0x1f}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'ib', 0x3a, 'bridge_slave_1\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x9, @mcast2, 0x154}}}}]}]}, 0x37c}, 0x1, 0x0, 0x0, 0x80}, 0x8885) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000480)='cgroup.type\x00', 0x2, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$VIDIOC_G_PRIORITY(r3, 0x80045643, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x56d5) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_pts(r6, 0x400000) ioctl$TIOCMGET(r7, 0x5415, &(0x7f0000000000)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:37 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4c010000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:37 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4c700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:37 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4d700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:38 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4e700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:40 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4f700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:40 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x300c3, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0x1, 0x4) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000000)={{0x3b, @private=0xa010102, 0x4e24, 0x1, 'dh\x00', 0x39, 0x8, 0x1a}, {@private=0xa010102, 0x4e20, 0x10000, 0x7fff, 0x3, 0x8}}, 0x44) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) ioctl$SIOCRSACCEPT(0xffffffffffffffff, 0x89e3) splice(r1, 0x0, r5, 0x0, 0x30007, 0x0) 05:41:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fanotify_init(0x8, 0x2) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000000)={0x7, 0x5, 0x4, 0x80000, 0x0, {0x77359400}, {0x5, 0xc, 0xfd, 0xe9, 0xff, 0x9, "0166c734"}, 0x6, 0x2, @userptr=0x8, 0x8, 0x0, 0xffffffffffffffff}) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r4) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000100)={0x980000, 0x1, 0xfffffffe, r4, 0x0, &(0x7f00000000c0)={0x980924, 0x8, [], @p_u32=&(0x7f0000000080)=0x4}}) 05:41:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x207200, 0x0) 05:41:40 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x50700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:40 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x51700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x48, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@TCA_RATE={0x6, 0x5, {0x4, 0x1}}, @qdisc_kind_options=@q_etf={{0x8, 0x1, 'etf\x00'}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x0, 0xb}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x10080) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x48, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@TCA_RATE={0x6, 0x5, {0x4, 0x1}}, @qdisc_kind_options=@q_etf={{0x8, 0x1, 'etf\x00'}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x0, 0xb}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x10080) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001d80)={0x0, @multicast2, @dev}, &(0x7f0000001dc0)=0xc) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r8, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r10 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x48, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {0xffff, 0xffff}}, [@TCA_RATE={0x6, 0x5, {0x4, 0x1}}, @qdisc_kind_options=@q_etf={{0x8, 0x1, 'etf\x00'}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x0, 0xb}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x10080) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000001f80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001f40)={&(0x7f0000001e00)={0x11c, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKMODES_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKMODES_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKMODES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x4009890}, 0x4040844) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 666.552560][T17459] IPVS: set_ctl: invalid protocol: 59 10.1.1.2:20004 05:41:40 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x52700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:41 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x53700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:41 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x54700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:43 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x55700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) 05:41:43 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) write$binfmt_elf64(r3, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c4609097fd4e7000000000000000200060097000000ac000000000000004000000000000000f00000000000000003000000ff0f38000200050007004500030000007700000002000000000000000080000000000000c4000000000000000200000000000000010000000000000007000000000000000400000000000007000000000000000001000000000000d800000000000000000000000000000000ffffffffffffff0180000000000000f4b938eadd55d523e668e7aebda67d27efe22985dce10d9c4b6040ac91cc894f363df26d38b7da7fc38987eb023b43c5bc0987ced4f67384d8f3c317dd67792da8e7622b7ba98bd59ec226e06d2999fd22bd000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c0000001c00000000000000000000f789e5b99f720000000000000000000000000000000000000000000000000000000000000000000000000000000000e2222a3d721589540000000000000200009c4fa1e0760d2e2012fa5f0eb53800000000000000000000000000000000000f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007c9fa5367c03dca6eb180d9dcd037bf1114ffbc45b9481581a0462203f064945d0e557ec5060b11bf58f5d93b59aedd2e06e44b18528fcbfe8c74cf110f6f840ccf4da03729898b1924d26f8667e9ffb379bf970a3a20220a9d97bebcb22fb1c1f9f90abfc06d03ff7f12070f78481562885bad4377d7a3b7e1082544778151a64a119443db77b4e9c2518cfbfdb912e1a6596ae424500d1dc7b14203e132974ac8af908d9251d1317ec59de8e2076da26cbf6b1fc007d5a74baa6d791a553979e060ca9819b46c7f1433744a34655584828f46cb9f64adfa2f38c60578af13a071ce5998dd1502d1178e7f833385e859438c3dc969f1b323278c0cd3f0a0742d4421c7d326b8b08c98da4ab128cfc9472aaddb9b3b31ae720c401d5c96b1830daf673f5f6e4012ed0235a3479fdf68292d0e6fa03fb1109e7a107c7d9fbdf6a93c6ab3dc40268d3a9cf3c0905c1fdc40d526c64b3de04cf66f4b3ee73da404dd14c0e4957973c7c6a1c723b88c9c3a462c4e511a273f626632f70673c0abc36b4f5fc68fc265fa64df77020f7c341a7e1cf92e600b68282bec22e70f04080660e4469ed663d01049eae28de26a53c4ab941daf7fac91891a9d430ce59134fdaffdc704516fac18ac5c67337cad5993054f7b79d724d29cc30f7cb07ed6381c9176692095c"], 0x202) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000240)={0x0, @initdev, @private}, &(0x7f0000000280)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000480)={0x30, 0x5, 0x0, {0x0, 0x6, 0xc4d, 0x1}}, 0x30) r4 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_rdma(0x10, 0x3, 0x14) listen(r5, 0xdc1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r4, &(0x7f0000000340)={'#! ', './file0', [{0x20, 'vmac64(aes-generic)\x00'}, {0x20, 'proc'}, {}, {0x20, 'lo'}, {0x20, 'hash\x00'}, {0x20, 'hash\x00'}, {0x20, 'vmac64(aes-generic)\x00'}, {0x20, 'trustedeth0'}, {0x20, 'vmac64(aes-generic)\x00'}], 0xa, "8457515587c4f4eb5d5cabc815b5e96541dfb69634d75d5f44b65a0022d49f11e995d7fc303f4b5a8140ed5cef5a86d179fb0dc995a1c7e0ce86c6fd8e15a1fa9d5a46eef22455233eae1eb25d4ae62a2f88de37f44136d6ff558aa9d124c9439710eb29e0c68a84b3329bab34719424c6df0d703902885e55a88d1d9eddfe5e15d05c54e9f91f72"}, 0xf3) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000000)={0x5, 0x0, [{0x0, 0x4, 0x2, 0x0, 0x9, 0x1000, 0x1}, {0x0, 0x9, 0x4, 0x8001, 0x8, 0xc038, 0x1}, {0x0, 0x4, 0x1, 0x3, 0x200, 0x1c, 0x401}, {0x0, 0x5, 0x0, 0x7, 0x5d5, 0xff, 0x4}, {0x7, 0x401, 0x0, 0x0, 0x4fd, 0x5, 0x4c5f}]}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r6 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 05:41:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x400000, 0x0) 05:41:43 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x56700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) chmod(&(0x7f0000000000)='./file0\x00', 0x4) bind$alg(r0, &(0x7f0000000940)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(aegis128l,blake2s-224)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) sendto$packet(r4, &(0x7f00000001c0)="43ed0097c8ba47d2fde2a4e56e1943bdb2dffb021b474187eda94c91b275196b9b8c02be072652392204a71f572f8a26b70cb07a9dcf6f8ee0f3e3abd29556a338c7d599bfbbe9e0ee1d389b76eed62efd7084e5aaabfc1b03268ba240fde79f4bd7943ba43b84bdd1741e71f653534eceb46c0045f0eea15b552978e35d3a49", 0x80, 0x0, &(0x7f0000000440)={0x11, 0x19, r7, 0x1, 0xf9, 0x6, @multicast}, 0x14) ioctl$SG_GET_LOW_DMA(r3, 0x227a, &(0x7f00000000c0)) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000100)={0x800, 0x1ff}) keyctl$setperm(0x5, r1, 0x0) keyctl$describe(0xf, r1, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f0000000040)='}cpuset,^:keyringposix_acl_accessppp0$\x00', &(0x7f0000000080)) 05:41:44 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x57030000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:44 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x57700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:44 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x58700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:44 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000000)=""/103) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) 05:41:46 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x59700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:46 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0xa2c000, 0x0) ioctl$TCSETXW(r3, 0x5435, &(0x7f0000000040)={0x6, 0x1f, [0xfffc, 0xf6, 0x3, 0x5, 0x6], 0x6}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r4 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) 05:41:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x51a000, 0x0) 05:41:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:47 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5a700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:47 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5b700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:47 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5c700100, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:47 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x60000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:47 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x68000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:47 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x6c000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:47 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x74000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:49 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x200000000, 0x6, &(0x7f0000001ac0)=[{&(0x7f0000000200)="13a3db860541823bb4d0c95cf1fab7a680a00988a2d52cd5d545159394c3f041a722f283756129204df731d56a5ed290c3bd421422877a66cf0b445d4aa2f1b01db3db4a018d3329ec342fadf9f13683cabd920a4b4a258e7c1cb59429afca628bf46e081d7c86cb8854a0f189480bef17205a27f23765e9b9092e0410b6b122af0c2451ac8c3150032f753f85cb811ebeef3abe1885e4e66a5ff63e1a82726841b3b80f6f5119f6a511bca81bbe281554dd324e5cccee5375afdcf78909204eda68456a68637b", 0xc7, 0x9}, {&(0x7f00000009c0)="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", 0x1000, 0x10001}, {&(0x7f00000006c0)="0f2a6f6fb9d8f4c910ee949f2f0fdc48321cc308e533dfc44291ea20aeb9f6ac05b1b0e0a661a18096f8ef5304b3365f09e1da72c938c4deab57a097e2708bb635d8068b8f3aa8df36f5ec26ce913dbdcb9660466f275b071f675fdacefbae37e50aebea7edd99f1ae2eb21d0b889f4339f082518df2bffed82e61d6feeba38eb49d8eb8f662841a297689ae40c13b99b76e40922b85e8c887751d6f2aa0d3c9938fa63c4d5466cc4d1b62a4de13fa30a7443761b5033658984c88802ecb46e21ab6611e235318c4e1c07a97799e06806f4ca405c764e843315b8ebae4109d77d1de7efe37c09868", 0xe8, 0x6}, {&(0x7f00000007c0)="2fff78590af72d9bd7aa3386db38979d6ea89fdb8772e1716639cf6463540ecb7e3793d05a2bd222eedf5e6203ce9a4f4cfbb53e03e092bce9f9f345a99144f80836e96075d053e98a79e54c325acc3409c7507bfdd122e9b86985e2de69ee8696a6db4cb5c34a54880ad892f2874b03df441b75c35fb857a49286beee6bd5c88b3184c7db840f0b3a288f3b32421f3385c5cfcd8171e78c2ceda60dcd1b2eb738fc7adf5b89ef5c744322b8dea9193bae8913d47cc83056e0783f31d69a44605f3764ab78e971627c1fc6dd88a967c2655b947b5e2bf3be6727", 0xda, 0x1}, {&(0x7f00000019c0)="736c03e5431c8bb524ca4cd7bb7d4b45d87acc668983df56a6d497beaa702216b969d9291376c167ec56d01f10b38f5ca85c6cbc32ed99dfdaaf511e9ae4ba8745642a96e99aebd07ceb94cff66cb66addf1dcd2b4badf1bdfd4c599c37f68efdd3c9284afb20845170733c51ec31f0fae921ab5a746439ddc1516da3118dc75dbca4fcdb85a3fdbb3970751819dd795c1164b068eb81465779f78c101649335fc07245bf63e7d99357da66ca76182ce3ce1656e3c258fa13318e33fe6797f3c669f4196ba36c638838d3d", 0xcb, 0x3}, {&(0x7f0000000340)="056e", 0x2, 0x7}], 0x800, &(0x7f0000000380)={[{@noquota='noquota'}, {@grpid='grpid'}, {@pquota='pquota'}, {@bsdgroups='bsdgroups'}], [{@context={'context', 0x3d, 'staff_u'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r4, &(0x7f0000000400)="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", 0x200, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r6, @in, [0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x8, 0x951, 0x800000000007ff, 0x0, 0x5, 0x0, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000100)={r6, @in={{0x2, 0x4e23, @remote}}, 0xfffd, 0x1}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000040)={r6, 0x2d, "7711054fdfa7c5b4e3b726f4eae1a2bbbee79c8ae33ff953638bc6f53b51a734ba7adc89e4b6cee146e4e9c8d2"}, &(0x7f0000000080)=0x35) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)={r6, 0xfffb, 0x1, [0x7fff]}, &(0x7f0000000040)=0xa) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:41:49 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x7a000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:50 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0xa, &(0x7f0000000000)=[{0xe, 0x55, 0x20, 0x80}, {0x611, 0x1, 0xe2, 0x7}, {0x5, 0x7f, 0x8, 0x101}, {0x4, 0x8, 0x8, 0x8}, {0x5, 0xfa, 0xff, 0x6}, {0x0, 0x96, 0x88, 0x3}, {0xfff, 0x75, 0x4b, 0x2}, {0xb46e, 0x5, 0x1, 0x7}, {0xb13b, 0x1f, 0xff, 0x3}, {0x0, 0x1f, 0xf0, 0x8}]}) 05:41:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x719000, 0x0) 05:41:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:50 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x85000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:50 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x89010000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 675.864287][T17604] xfs: Unknown parameter 'context' 05:41:50 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x8cffffff, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:50 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x8d010000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:50 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x91010000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:50 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x97ffffff, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:50 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0xa, &(0x7f0000000000)=[{0xe, 0x55, 0x20, 0x80}, {0x611, 0x1, 0xe2, 0x7}, {0x5, 0x7f, 0x8, 0x101}, {0x4, 0x8, 0x8, 0x8}, {0x5, 0xfa, 0xff, 0x6}, {0x0, 0x96, 0x88, 0x3}, {0xfff, 0x75, 0x4b, 0x2}, {0xb46e, 0x5, 0x1, 0x7}, {0xb13b, 0x1f, 0xff, 0x3}, {0x0, 0x1f, 0xf0, 0x8}]}) 05:41:50 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xa0000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:53 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:41:53 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xb6000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:53 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0xa, &(0x7f0000000000)=[{0xe, 0x55, 0x20, 0x80}, {0x611, 0x1, 0xe2, 0x7}, {0x5, 0x7f, 0x8, 0x101}, {0x4, 0x8, 0x8, 0x8}, {0x5, 0xfa, 0xff, 0x6}, {0x0, 0x96, 0x88, 0x3}, {0xfff, 0x75, 0x4b, 0x2}, {0xb46e, 0x5, 0x1, 0x7}, {0xb13b, 0x1f, 0xff, 0x3}, {0x0, 0x1f, 0xf0, 0x8}]}) 05:41:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x722000, 0x0) 05:41:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:53 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xb9010000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:53 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xba020000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:53 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xc0ed0000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:53 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xc9030000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:53 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xe4ffffff, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:53 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xecd17f0a, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:56 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SIOCX25GCAUSEDIAG(r6, 0x89e6, &(0x7f00000000c0)={0x4, 0x16}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDFONTOP_SET_DEF(r4, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x5, 0x7, 0x1ce, &(0x7f0000000480)="6204b020fcf55d19e067f706a539d8061ca86f8624c1151dd41770eb1b6d129fd07c0c03b1152b16c2bbe65a42cfe490648c07e2b0dcf79e8343808bbf027e02de920807c90c27108dfc206f5b8ec202d9ed16ce0edb2f63a366362eb0f92c45cb153503c5b47964e1f7876d87357ca701de4f23f9812ef0a2cf24db3e22d495ce4ac16d0af006e896d6360afcc5eac4dfb6161d53fd16f2d6a95027fa5accd5d7a9c93e32b1d296f0c97c6911547d4008712ba54815c64898265b100043ee9780e176441d7332c6ff8e473726da3e20cccfcb5210e2a12ec1979312fc1e20b1c45539e0f710a09658231bcc8fe763f38e206349f8ce478ff45687ab0aa7ddb11207bdf57822f00bd37b7f2849dcbeba13a2496ff78c7f06b859910846b08469f82160f54868017aeb0f0eccadf4cb8a040b8cf9150b0265d3c7355ba94cb9eba9a7ac014c27587401eb2bb1503b27e78a4926c7c0f30fd38a04a75eee0cc5eda61df59bc3375f40862ad4c1cf6be26a8dc0511f46f17bc6384585e4e6eb09aa1b922f0969a6342502fe83dc7aa5b506316d19d7fd5f1c637154f23fb1dcfc57b26d1305fc4622dbd773fd6b18318164275ba5532dd62f761d21288572597b3222bc261cc16f83d72b026b9fc52902a03dc443bfff2eed6f1b377e9c6a26e2db56ba1ee060f951e81fb6470fa7f894d7b0ebf4072929604b076be6035a7a4bb204c20d25867874ae0039131a0d42298fd43b42b3a2eb156a5864e6117e2e101e96d1fead0445ebb5fb21a7c2f522797f91a100727392bbfee2a630dc611461bb7a8b47dc3e8b544f1e485d57523fbace362c9c6e92649f8151540f7f5331b48aec3b6923bc1e0df03b810a4d98c713e19516a4195cd8543457f715f02ee20ab2e79ac3023471073d821fa0c7b3ca7c6e362274dfe56144b768828942dff9a893993975e2e3246fa95f91c44dce73dfd644c83b21e02baac6410ea1ae6545774c7a5d5e6b07a63b106da48fafbbee017c1071df209df06026a74fdeaac19abed0ebfe314eaf0517844651417a6255eac1916cd772dd76eb27916fde426973cd6b80792a26b8fcbf511484d5f757d8bb54242f67563b4dc10dd45c49145dfbdaa9704a805f27d4b214f8a09b0cebbc4edced61230e90a574ac4c8e34a4e016d43dd5cb82f88314281421fd72bfc4c408f0dcded43faa851a49a6a5f367fe30f1ccd6f4211591836f72fcd07d595c11ebc72d35aa61af3c24c549cc8a51fd1c310b03f60bed815e53404366c3c3e4f96d0ebe7393d90e37d7db05b77a49146db52516e323c1073ed645a29434d97d07e033dcc00135d6f2f8f9ad07f0b35a946085f33964ff58406c30f016cf711947af050dcb7ca45c826d7356f389759bc5991c0f3f7b49c7d11562242a2c584f76a1f03d05d52fadcc6988d93890f3575eac9d"}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000140)={0x9, 0x5, 0x4, 0x20000, 0xffff4e17, {0x77359400}, {0x3, 0x1, 0x1, 0xfc, 0x40, 0x40}, 0x2, 0x2, @fd=r8, 0x80000000, 0x0, r1}) r9 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r9, 0x0, 0x30007, 0x0) 05:41:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:56 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xf4030000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000001000000000000000c41000000140014"], 0x3}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r3, 0x200, 0x70bd26, 0x25dfdbfc, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x40800) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$alg(r5, &(0x7f0000000940)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 05:41:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x770000, 0x0) 05:41:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:56 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:56 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xf6ffffff, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:56 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xf9fdffff, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:56 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xfa010000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:56 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xfcfdffff, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:56 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xfdfdffff, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:57 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$sock(r4, &(0x7f0000000240)={&(0x7f0000000080)=@isdn={0x22, 0x0, 0x81, 0x4, 0xff}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)="980f54104bf2ebc79b71865865e05b216e5df3853a862e799a1c25ee7ce5fe5cfd8b1877ddee012065a3b53d673c32bad2b035b26f53b7030efa1034dd86e39fa3e889560c87be1b10c3d08f0c89109bdd05c9704a6fd9763adffebd20fe900846f113975754bc8cd645e41c1a3036d6b3c1d824", 0x74}], 0x1, &(0x7f00000001c0)=[@mark={{0x14, 0x1, 0x24, 0x33}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}], 0x48}, 0x4000801) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000000)={0x6, 0x1, {0xffffffffffffffff, 0x0, 0x8, 0x0, 0x8}, 0xc}) r5 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 05:41:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:59 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xfdffffff, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:59 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r6, &(0x7f0000000400)="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", 0x200, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r7, @in, [0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x8, 0x951, 0x800000000007ff, 0x0, 0x5, 0x0, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r6, 0x84, 0x6d, &(0x7f0000000140)=ANY=[@ANYRES32=r7, @ANYBLOB="2d0000007711054fdfa7c4f11a4efdf4eae1a2bbbee79c8ae33ff953638bc6f53b51a734bacee146e4e9c8d200000018e6abe98f6b73734864859ce9bfe707dd2cb38342535b02b020b1c4cd84"], &(0x7f0000000080)=0x35) getsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r8, 0x8c}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000000)={r7, 0x6, 0x5, 0x7ff, 0xffff, 0x2}, 0x14) 05:41:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x907100, 0x0) 05:41:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:41:59 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:59 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xff000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:41:59 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x15, 0x9, 0x9, 0x1, 0x0, 0x0, 0x200, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x2, 0x20, 0x40, 0x0, 0x200, 0x3ff}, r3, 0x5, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r4 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) [ 685.034807][T17750] ptrace attach of "/root/syz-executor.4"[17746] was attempted by "/root/syz-executor.4"[17750] 05:41:59 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xfffffdf9, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) [ 685.163840][T17766] ptrace attach of "/root/syz-executor.4"[17763] was attempted by "/root/syz-executor.4"[17766] 05:41:59 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xfffffdfc, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 685.263821][T17775] ptrace attach of "/root/syz-executor.4"[17774] was attempted by "/root/syz-executor.4"[17775] 05:41:59 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xfffffdfd, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:41:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0xa05100, 0x0) 05:42:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f", 0x80}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:02 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:02 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xffffff7f, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:02 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:42:02 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xffffff8c, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:02 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xffffff97, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:02 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xffffffe4, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0xb70000, 0x0) 05:42:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f", 0x80}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:05 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xfffffff6, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:05 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:05 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000000)=0x8) 05:42:05 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xfffffffd, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:05 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x85ffffffff, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:05 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x10000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:05 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x400000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:05 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xedc000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:05 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x2000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x1000000, 0x0) 05:42:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f", 0x80}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:08 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:08 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:08 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SIOCAX25GETINFO(r5, 0x89ed, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r5, 0x40405514, &(0x7f0000000100)={0x3, 0x5, 0x1, 0x400, 'syz0\x00', 0x126}) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000000c0)={0x0, 0x7530}, 0x10) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r7) r8 = fcntl$dupfd(r6, 0x406, r7) ioctl$RTC_WKALM_RD(r8, 0x80287010, &(0x7f0000000000)) 05:42:08 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xe000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:08 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x100000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:08 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x200000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:08 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x300000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:08 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x400000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:08 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x500000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x20000000, 0x0) 05:42:11 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x600000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:11 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) recvmmsg(r1, &(0x7f00000002c0)=[{{&(0x7f0000000000)=@hci, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)=""/80, 0x50}, {&(0x7f0000000100)=""/231, 0xe7}], 0x2, &(0x7f0000000240)=""/116, 0x74}, 0x7ff}], 0x1, 0x2102, &(0x7f0000000340)={0x0, 0x989680}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r4, &(0x7f0000000400)="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", 0x200, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r6, @in, [0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x8, 0x951, 0x800000000007ff, 0x0, 0x5, 0x0, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000100)={r6, @in={{0x2, 0x4e23, @remote}}, 0xfffd, 0x1}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000040)={r6, 0x2d, "7711054fdfa7c5b4e3b726f4eae1a2bbbee79c8ae33ff953638bc6f53b51a734ba7adc89e4b6cee146e4e9c8d2"}, &(0x7f0000000080)=0x35) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000380)={r6, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x30}}}}, &(0x7f0000000480)=0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000004c0)={r7, 0x8}, &(0x7f0000000500)=0x8) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:42:11 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68e", 0xc0}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:11 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x700000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:11 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x800000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:11 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x900000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:11 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xa00000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:12 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xa7fd1ec00000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:12 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xb00000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x21000000, 0x0) 05:42:14 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xc00000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:14 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000000)) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:42:14 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:14 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xd00000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68e", 0xc0}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:14 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xe00000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:14 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xe03000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:15 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xf00000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:15 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1000000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:15 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1100000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x7e000000, 0x0) 05:42:17 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1200000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:17 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x20, 0x9, 0x0, 0x0, 0x0, 0x40c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:42:17 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:17 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1300000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68e", 0xc0}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:17 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1400000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c", 0xe0}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:18 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1500000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:18 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1600000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:18 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1700000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0xfeffffff, 0x0) 05:42:20 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x1f00000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:20 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x68402, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r1, 0x0, r4, 0x0, 0x30007, 0x0) 05:42:20 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:20 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x2000000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:21 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x2010000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c", 0xe0}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:21 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x3e70010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:21 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x3f00000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:21 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x3f70010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:21 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4000000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0xff600000, 0x0) 05:42:23 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4070010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:23 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet6_tcp_buf(r4, 0x6, 0x21, &(0x7f0000000040)=""/31, &(0x7f0000000080)=0x1f) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r5 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 05:42:23 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:23 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4170010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0xfffffffe, 0x0) 05:42:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c", 0xe0}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:24 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4270010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:24 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4370010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:24 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4470010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:24 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4570010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:24 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4600000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:24 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4670010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:24 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) dup(r2) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6, 0x1, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) 05:42:27 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:27 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4770010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:27 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$rds(r3, &(0x7f0000000000)={0x2, 0x4e21, @multicast2}, 0x10) r4 = socket$alg(0x26, 0x5, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r6, 0x80585414, &(0x7f0000000080)) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="00df51004ce92507cd846e5f04246500fcffffffffffffff000000", 0x1b) r7 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r7, 0x0, 0x30007, 0x0) 05:42:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e6", 0xf0}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x2000000000, 0x0) 05:42:27 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4800000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:27 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4870010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:27 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4970010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:27 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4a70010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:27 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4b70010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:27 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4c00000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:30 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4c01000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:30 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:30 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$TUNSETLINK(r0, 0x400454cd, 0xf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) accept4(r1, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x30007, 0x0) 05:42:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e6", 0xf0}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x2100000000, 0x0) 05:42:30 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4c70010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:30 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4d70010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:30 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4e70010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:30 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x4f70010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:30 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5070010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:30 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5170010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:30 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5270010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:33 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:33 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5370010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:33 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r6, 0x5, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x9}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd9a}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r6, 0x210, 0x70bd2a, 0x25dfdbfe, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x10001}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x6, 0x4, 0x100]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0xa1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r7 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r7, 0x0, 0x30007, 0x0) r8 = syz_open_dev$mouse(&(0x7f00000007c0)='/dev/input/mouse#\x00', 0xc6, 0x501) getsockopt$XDP_MMAP_OFFSETS(r8, 0x11b, 0x1, &(0x7f0000000800), &(0x7f0000000880)=0x80) 05:42:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e6", 0xf0}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:33 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x400000000000, 0x0) 05:42:33 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5470010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:33 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:42:33 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:33 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5570010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:33 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:33 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5670010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:33 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5703000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:33 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677", 0xf8}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:36 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5770010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:36 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f0000000000)={0xa49052e719950eeb, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x41c1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = getpid() sched_setscheduler(r4, 0x0, &(0x7f00000001c0)) move_pages(r4, 0x4, &(0x7f0000000080)=[&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil], &(0x7f00000000c0)=[0x0, 0x7, 0x1, 0x10001, 0x9, 0x5, 0x59, 0x81], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000240)={0x9b0000, 0x6, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000200)={0x3e0060, 0x80000001, [], @p_u32=&(0x7f0000000180)=0x7}}) fsconfig$FSCONFIG_SET_FD(r10, 0x5, &(0x7f0000000140)='-generic)\x00\x00\x17\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, r7) 05:42:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x60ffffffffff, 0x0) 05:42:36 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5870010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:36 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5970010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:36 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:36 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5a70010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:36 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5b70010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:36 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5c70010000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:36 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x6000000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677", 0xf8}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:39 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x6800000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:39 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_KVMCLOCK_CTRL(r4, 0xaead) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r0, 0xc1004111, &(0x7f0000000000)={0x7, [0x2, 0x0, 0x4], [{0x5, 0xe7, 0x0, 0x0, 0x1}, {0x20, 0x400, 0x1}, {0x0, 0xff, 0x1, 0x1, 0x1}, {0xfc5, 0x5, 0x1, 0x0, 0x1}, {0x0, 0x8, 0x1, 0x1}, {0x1, 0xde, 0x0, 0x0, 0x0, 0x1}, {0xd97, 0x7f, 0x0, 0x0, 0x0, 0x1}, {0xdb, 0x7ff, 0x0, 0x0, 0x1}, {0xffffff11, 0x55, 0x1, 0x1, 0x0, 0x1}, {0x2, 0x5, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x2, 0x0, 0x1, 0x0, 0x1}, {0x5, 0x4, 0x0, 0x1, 0x1}], 0x3ff}) pwrite64(0xffffffffffffffff, &(0x7f0000000400)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r6, @in, [0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x8, 0x951, 0x800000000007ff, 0x0, 0x5, 0x0, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000100)={r6, @in={{0x2, 0x4e23, @remote}}, 0xfffd, 0x1}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={r6, 0x2d, "7711054fdfa7c5b4e3b726f4eae1a2bbbee79c8ae33ff953638bc6f53b51a734ba7adc89e4b6cee146e4e9c8d2"}, &(0x7f0000000080)=0x35) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={r6, 0x5, 0x9, 0x1, 0xffff}, 0x14) r7 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r7, 0x0, 0x30007, 0x0) 05:42:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x770000000000, 0x0) 05:42:39 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x6c00000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:39 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x7400000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:39 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:39 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:39 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:39 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x7a00000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:39 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x25) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 05:42:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677", 0xf8}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:42 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x8901000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:42 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x25) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 05:42:42 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x2, 0xb5ca, 0x2, 0xffffffff}, 0x3}, 0x20, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffff03000000000000", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKBSZSET(r4, 0x40081271, &(0x7f00000000c0)=0x8000) r5 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 05:42:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9d", 0x44}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x7fffffffefff, 0x0) 05:42:42 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x25) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 05:42:42 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x8cffffff00000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:42 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:42 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x8d01000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:42 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet6_opts(r6, 0x29, 0x3b, &(0x7f0000000000)=""/167, &(0x7f0000000100)=0xa7) connect$pppl2tp(r3, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, r4, {0x2, 0x0, @multicast2}, 0x3}}, 0x26) getpeername(r3, 0x0, &(0x7f0000000140)) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r7 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r7, 0x0, 0x30007, 0x1) 05:42:42 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e85", 0xfc}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:45 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x9101000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:45 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:42:45 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha256_mb\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/meminfo\x00', 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$bt_l2cap(r5, &(0x7f0000000100)={0x1f, 0x8, @fixed={[], 0x10}, 0xb5, 0x1}, 0xe) write$FUSE_LSEEK(r3, &(0x7f00000000c0)={0x18, 0x0, 0x6, {0x7fff}}, 0x18) r6 = accept4(r2, 0x0, 0x0, 0x0) bind$alg(r6, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xxhash64-generic\x00'}, 0x58) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 05:42:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0xb70000000000, 0x0) 05:42:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9d", 0x44}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:45 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:42:45 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x97ffffff00000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:45 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:42:45 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xa000000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 731.616369][T18481] ptrace attach of "/root/syz-executor.5"[18479] was attempted by "/root/syz-executor.5"[18481] 05:42:46 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:42:46 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xb600000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 731.689675][T18485] ptrace attach of "/root/syz-executor.5"[18484] was attempted by "/root/syz-executor.5"[18485] [ 731.768628][T18492] ptrace attach of "/root/syz-executor.5"[18491] was attempted by "/root/syz-executor.5"[18492] 05:42:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xfc}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:48 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:42:48 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xb901000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:48 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384-generic\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x72, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x200000, 0x8) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r5, 0x8982, &(0x7f0000000040)={0x2, 'bond_slave_1\x00', {0xfffffffa}, 0x1}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$USBDEVFS_RELEASE_PORT(r7, 0x80045519, &(0x7f00000000c0)=0xff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000000)=0x1) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:42:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x20720000000000, 0x0) 05:42:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9d", 0x44}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:48 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 734.532775][T18507] ptrace attach of "/root/syz-executor.5"[18506] was attempted by "/root/syz-executor.5"[18507] 05:42:48 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xba02000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:49 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:42:49 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xc903000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:49 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xe4ffffff00000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:49 executing program 5: dup(0xffffffffffffffff) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 734.778293][T18532] ptrace attach of "/root/syz-executor.5"[18531] was attempted by "/root/syz-executor.5"[18532] 05:42:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xfc}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:51 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xf403000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:51 executing program 5: dup(0xffffffffffffffff) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:42:51 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000000000000000001000000000000000c41000000140014"], 0x3}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r4, 0x8, 0x70bd26, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4048015}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:42:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x90710000000000, 0x0) 05:42:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b", 0x66}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:52 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xf6ffffff00000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:52 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xf9fdffff00000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:52 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xfa01000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:52 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xfcfdffff00000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:52 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xfdfdffff00000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:52 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xfdffffff00000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xfe}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:54 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xff00000000000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:54 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffeef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x6a81, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:42:54 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:42:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b", 0x66}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0xa0510000000000, 0x0) 05:42:55 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xffffff7f00000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:55 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xffffffff00000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:55 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xffffffff85000000, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:55 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, 0x54, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:55 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 741.045495][T18624] gfs2: can't find protocol lock_no+ock [ 741.125033][T18624] gfs2: can't find protocol lock_no+ock 05:42:55 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x25, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 741.276515][T18641] gfs2: can't find protocol lock_no+ock 05:42:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xfe}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:58 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x2, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:42:58 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f00000001c0)={0x8, 0x400}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r5) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000000)={0x0, @adiantum}) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) fstat(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, 0x0, r6, r7, r6, 0x0, 0xb}, 0xb8fb, 0xbb, 0x3, 0x8000, 0x0, 0x0, 0x81}) sendmsg$unix(r2, &(0x7f0000000b00)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000340)="3fd1f886b81a3c078f83d1799cfd04b0c4bd93fea61fa200b1787027517f5504960b516ccad90464ac97d44f679812f49e2495adc65f4e64627cb17a1e9f959db0f197c073346af4b9e12d8e7148fb932a9982db5bbe0b31f1d68f1f199adfb017979b005bc59da974e4737cbdbf6b660b858e399be10ba57dd7ce97eeb0a2f5dda39fe871a0204ef19d9fa1c122cb27f44ed896e90b61c729894416196388e9e5e80fb7a3efc184dec7c2f3b2e160d4b23265e16f19367867b96dfd16bace8fad462cbda007157a670a1cd1938aa67067fbe774273c35cc6a5b9e78975dab8c9b746cffcc422a4d1c1880496d2a6920438644948f", 0xf5}, {&(0x7f0000000480)="688c77c10ab317d51a09675357d9deb9fd180c00cf00c8699b3ce875264a17cb35db0c7a29955b1e159973d8f67c0a3e25efa625058f8b4e52a5e2071ad05bcbab0e6a5c1c5954d288853c0084e920cd0aecab95230a0ef02a7c3cfaa975c8cfcbc52199a16591711f2200561d3c8b8c48dd04777515671939f3ab4c590d7859d5640a24537feb404d218b84b09725361855b8000957605a650eda61ad300d85d81914f3811c15e94386bb7b0696383318d69d9154a7e4938decb1de82d1115fc9bf80e999442216f11904162b222c379d043f9f03e09411b9820d390c2f", 0xde}, {&(0x7f0000000580)="da729906935c97ee232775840de5aba90e8c8f3bf435dba77aaee7a3d5b44bdf6934085a2d1622c7b87f39aaae3cce020cfcf1cf9da14a5ac08e74e044cae356b03d43d17a94ba999ece6936d62c1a468759e305f407b9805501c6400accccaed4b849824890b9cf139d99cf9427cb32507bfb0e22d495356a62afabd5f6ba5f8f21c2ac23004ec22303f514e67d57529d3fbd96a515552fb320a676c03c3c05b90555f7cb1afe258b5f75265e7224f1aab471bc66738965e2ce51e3fffb87b3c9d0d7a09ff5104bfdcf4d951824c76706", 0xd1}, {&(0x7f0000000280)="7daf4082c661173a12c82a09a7f6b62b3357fc2b29ed0ca41f7a85433c3c3ea904ab2d9b7f52a0f737c7a90f6c9c2e4fa6d571b5586b7fda2d7e5a", 0x3b}, {&(0x7f0000000680)="34bcd1ba50e6c7b91181e6d40f35ee24a6f3c3dd1ac3b63152d6655a9213a25de7e9ba02c9552d99ee53e026a387700a12ab9d2c4f90867e2f7cf6be31ed7281d0cd78ebfbb58113f6a66ba39676e5fff141b180a22dec55ce086a57e8e42f1e2573ec68d44013a72cb6e9738f57a91185af25f8ef9e9cbdba898a8f", 0x7c}, {&(0x7f0000000700)="90f0c3748c9c8aaa982a3f2cb1b2325e176953f2c42beea28b172280fe612cabde0ae483196da408927945812a1d325b06d0ca1038fb0fa2e2533b04cc06745e5ff4e2ae8f1f8d88f778c35de7f08c899f48ebccefcf63831d7f53c59e11070d1f6ccc934d91efd675461a1c", 0x6c}, {&(0x7f0000000780)="4e618fbd9445f84f270303371d6de0ffc86da586af003b808fb919b0e7b356735864fd50d1bbfed6a243c0a8b919ece5d27f794dd7576b077495b423e7c42352948cf72b0cd0f3e35943c4107f18c4a7c70f0ef340afe6d29ec08a5fe49d8f0c600c88632a0fda1fddf697038b164ca403753be5778c281cdcd4f8a4bdb63752193778538a0e2f8cbf4d52daf2b7759c539ae023516f52af2c109efe536de5a410b0626b572e263b5913ce016b46f73a8b421c5d5aac4481f068cb22ef4cad36e4f46152753ce98141a1620e6d4c5c6eae5714f39fa56e6672528e2832bf2c9595200b17e2fc5143917d", 0xea}, {&(0x7f00000002c0)="b53a8dcc4636ee00221f828329933f8f02a4ca0c631638e791721c4f4c9ba48d406afa9ebf1df5311eabdb1e78e70232a521aacf9f0d457bc04c3850dc4f31d4", 0x40}, {&(0x7f0000000880)="1ade9f7b00123dc538b97dd270e42394dc89aaada4d48294f58139d39e6d08608ed335fbd73a6c7336f93bfbd729283043f65fb4c9b2643e3e1e9ab8dd3ee1008894c85a1e7af5a1d9ee777ed89a4c3ac9a968fec3924fdf4e2eab5d", 0x5c}], 0x9, &(0x7f0000000a80)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r6}}}], 0x70, 0x8002}, 0xc0050) r8 = accept4(r4, 0x0, 0x0, 0x0) splice(r2, 0x0, r8, 0x0, 0x30007, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r2, 0xc05064a7, &(0x7f0000000140)={&(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x1, 0x4, 0x0, 0x5}) 05:42:58 executing program 5: getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 05:42:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b", 0x66}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:42:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x100000000000000, 0x0) 05:42:58 executing program 5: getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 743.801937][T18657] ptrace attach of "/root/syz-executor.5"[18655] was attempted by "/root/syz-executor.5"[18657] [ 743.838395][T18656] gfs2: can't find protocol lock_no+ock 05:42:58 executing program 5: getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 743.877656][T18668] ptrace attach of "/root/syz-executor.5"[18665] was attempted by "/root/syz-executor.5"[18668] 05:42:58 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 743.944092][T18656] gfs2: can't find protocol lock_no+ock 05:42:58 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 744.004332][T18687] ptrace attach of "/root/syz-executor.5"[18685] was attempted by "/root/syz-executor.5"[18687] [ 744.038015][T18690] gfs2: can't find protocol lock_no+ock [ 744.108121][T18690] gfs2: can't find protocol lock_no+ock 05:42:58 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:42:58 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 744.312404][T18713] gfs2: can't find protocol lock_no+ock [ 744.375533][T18713] gfs2: can't find protocol lock_no+ock 05:43:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xfe}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:01 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:01 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:01 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_G_EDID(r4, 0xc0285628, &(0x7f0000000080)={0x0, 0x7, 0x2, [], &(0x7f0000000040)=0xc8}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r5 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(r1, 0xc01c64ad, &(0x7f0000000000)={0x9, 0x80, 0x1, 0x7, 0x40000, 0x5, 0x1}) [ 746.828689][T18737] gfs2: can't find protocol lock_no+ock 05:43:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676", 0x77}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x7e00000000000000, 0x0) 05:43:01 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 746.914953][T18737] gfs2: can't find protocol lock_no+ock 05:43:01 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:01 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x6, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:01 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 747.099164][T18771] gfs2: can't find protocol lock_no+ock 05:43:01 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 747.175228][T18771] gfs2: can't find protocol lock_no+ock 05:43:01 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 747.327269][T18794] gfs2: can't find protocol lock_no+ock [ 747.395410][T18794] gfs2: can't find protocol lock_no+ock 05:43:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x3, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:04 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x8, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:04 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = accept4$inet(r5, &(0x7f0000000000)={0x2, 0x0, @private}, &(0x7f0000000040)=0x10, 0x80000) getsockopt$inet_udp_int(r6, 0x11, 0x67, &(0x7f0000000080), &(0x7f00000000c0)=0x4) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) r7 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x8) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000100)=0x2) [ 749.896667][T18817] gfs2: can't find protocol lock_no+ock 05:43:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x8000000000000000, 0x0) 05:43:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676", 0x77}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 750.003725][T18817] gfs2: can't find protocol lock_no+ock 05:43:04 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x9, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0xfeffffff00000000, 0x0) [ 750.166848][T18845] gfs2: can't find protocol lock_no+ock 05:43:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0xffefffffff7f0000, 0x0) [ 750.218196][T18845] gfs2: can't find protocol lock_no+ock 05:43:04 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:04 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xa, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:04 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 750.347761][T18868] gfs2: can't find protocol lock_no+ock [ 750.469506][T18875] gfs2: can't find protocol lock_no+ock [ 750.529194][T18875] gfs2: can't find protocol lock_no+ock 05:43:04 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 750.746135][T18893] gfs2: can't find protocol lock_no+ock [ 750.854683][T18893] gfs2: can't find protocol lock_no+ock 05:43:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x3, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:07 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x20, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ACQUIRE(r4, 0x6430) r5 = open(&(0x7f0000000000)='./file0\x00', 0x400100, 0x2) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r5, 0xc10c5541, &(0x7f0000000040)={0x7fffffff, 0x1, 0x1}) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000180)={{0x2, 0x4e20, @local}, {0x6, @multicast}, 0x8, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}, 'vlan0\x00'}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) recvfrom(r7, &(0x7f0000000200), 0x0, 0x20, &(0x7f0000000240)=@in={0x2, 0x4e23, @loopback}, 0x80) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r8 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r8, 0x0, 0x30007, 0x0) 05:43:07 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xd, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 752.947995][T18913] gfs2: can't find protocol lock_no+ock [ 753.027251][T18913] gfs2: can't find protocol lock_no+ock 05:43:07 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676", 0x77}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 753.220217][T18935] gfs2: can't find protocol lock_no+ock 05:43:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0xffffffff00000000, 0x0) 05:43:07 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 753.332233][T18935] gfs2: can't find protocol lock_no+ock 05:43:07 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 753.481529][T18961] gfs2: can't find protocol lock_no+ock 05:43:07 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 753.554221][T18961] gfs2: can't find protocol lock_no+ock [ 753.677464][T18975] gfs2: can't find protocol lock_no+ock 05:43:08 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000000)={{0x81, 0x1}, {0x7, 0x6}, 0x9, 0x0, 0x33}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) [ 753.737861][T18975] gfs2: can't find protocol lock_no+ock 05:43:08 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 753.900182][T18991] gfs2: can't find protocol lock_no+ock [ 753.988839][T18991] gfs2: can't find protocol lock_no+ock 05:43:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x3, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:10 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x12, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:10 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x10, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x200, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x180, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(r3, 0xc01c64ad, &(0x7f0000000040)={0x101, 0x5, 0x0, 0x59, 0x5cd, 0x7, 0x10001}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r4 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) [ 755.984566][T19012] gfs2: can't find protocol lock_no+ock [ 756.046706][T19012] gfs2: can't find protocol lock_no+ock 05:43:10 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x13, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 756.213430][T19033] gfs2: can't find protocol lock_no+ock 05:43:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 756.283274][T19033] gfs2: can't find protocol lock_no+ock 05:43:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0xffffffffff600000, 0x0) 05:43:10 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x14, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:10 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 756.451550][T19052] gfs2: can't find protocol lock_no+ock [ 756.518194][T19052] gfs2: can't find protocol lock_no+ock 05:43:10 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x15, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 756.646251][T19073] gfs2: can't find protocol lock_no+ock [ 756.726627][T19073] gfs2: can't find protocol lock_no+ock 05:43:11 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r3 = getpid() sched_setscheduler(r3, 0x0, &(0x7f00000001c0)) r4 = syz_open_procfs(r3, &(0x7f0000000140)='smaps\x00') bind$alg(r4, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x0, 0x0, 0x8, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r5 = accept4(r2, 0x0, 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r6, 0xc01064c7, &(0x7f0000000080)={0x5, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0]}) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 05:43:11 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 756.881933][T19090] gfs2: can't find protocol lock_no+ock [ 756.943431][T19090] gfs2: can't find protocol lock_no+ock 05:43:11 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 757.089998][T19105] gfs2: can't find protocol lock_no+ock [ 757.156746][T19105] gfs2: can't find protocol lock_no+ock 05:43:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x3, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:13 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x46, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:13 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext}, 0x0, 0x8000000000, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x30007, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$CAN_RAW_LOOPBACK(r5, 0x65, 0x3, &(0x7f0000000040), 0x4) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000000)={0x80}, 0x1) [ 759.029308][T19121] gfs2: can't find protocol lock_no+ock [ 759.116440][T19121] gfs2: can't find protocol lock_no+ock 05:43:13 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x48, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 759.258869][T19142] gfs2: can't find protocol lock_no+ock [ 759.308523][T19142] gfs2: can't find protocol lock_no+ock 05:43:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:13 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4c, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x21) 05:43:13 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 759.474539][T19157] gfs2: can't find protocol lock_no+ock [ 759.544935][T19157] gfs2: can't find protocol lock_no+ock 05:43:13 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x60, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:14 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x68, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:14 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r8 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x410100, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r8, 0x0) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) ioctl$VHOST_SET_LOG_BASE(r4, 0x4008af04, &(0x7f0000000040)) r9 = accept4(r7, 0x0, 0x0, 0x0) splice(r3, 0x0, r9, 0x0, 0x30007, 0x0) 05:43:14 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x6c, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x3, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:16 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x74, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:16 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$alg(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)="eb1fdb3f7cf20b96d697f779c9be9a9e17ffbad13df61ab3f1ea37570b231fc58b58766ffe066e77513ab4bdddebfaa54a916c70ee6d9a79c6d250150b089bbef82984c8f9f0caa69a4f735558fabea7078e349b699526ed2ded180531d5326cc3387186cbfdfe65e7a7ce839cdf70f92cea6db58b2d6533aef833465ebd", 0x7e}, {&(0x7f0000000080)="eb0fa5ea03fa70981d962818694b1780bc8771c63e57c1522a4717af9162e991803a78f12f589c8872e32fbf5e12cc22669a1bc5ab2b4c005f9d5f2081cb924dfa176d22c09d276e8594c7c51b67de66fdae381722451440de261798a7d76d9bc43d8be3fb85782deca9ff1f", 0x6c}, {&(0x7f0000000100)="ae624915c0ceacb3923489d7f384b0a3aea62a08cf1fdc283d72e6e8996cd519e60000170a791f8174c88a2dd2502ff17a63c78bd3538377ef61fe229b39b5bb0af0e71f6b82663025c28a758879d1eda024", 0x52}, {&(0x7f0000000180)="b8d08c2d127dae8432f7c5be62b9070fe32e57d9c5bf8fe85bf3071ef1b3c56733536845f59e1df396c4e58897a90054c8994c2b99a3bf053a4d085e2f8b1109301321923068c16241e74c9af38de28d67e1b5b7f1c38262716cd1d96321d71cd952fe4173a23d46ea25ce82267cc618a89a6ffb869d7c3f9a7e7d69f8f3ffb3f13d9f93c6245df5feebc3309f6b6499f885553a276cd02db1765b5e2cdbc8f156acea1c38cff9fe6011c0bca1dcccc354a743b924b527ff1b92815dd5b466f5d41f91172756ddb4ce3eef", 0xcb}, {&(0x7f0000000340)="d3f59d8267cc03114b311ea2c87f17a4aa9116b710811f1dd7fb23e10aca52895f5a6e4916b817cc9cb2ee49bc3b992cea7a97f6de146f07567c191fdb14ca1a761483219b9a710ca5dfceb0e3e599a136f91a7a04efd03f894d82f90b07d8c3f0bb81e744527d4daa40135c4f3eff07a707c340ea86df5781ab00e0989aca9f797ea4a9da", 0x85}], 0x5, &(0x7f0000000480)=[@assoc={0x18, 0x117, 0x4, 0xf1}, @assoc={0x18, 0x117, 0x4, 0x1}, @op={0x18}], 0x48, 0x810}, 0x4000000) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r5) signalfd(r5, &(0x7f0000000500)={[0x800]}, 0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r6 = accept4(r2, 0x0, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000580)={0x14, 0x69, 0x1, {0x20, 0x3, 0x5}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r8, 0xc01064ab, &(0x7f0000000540)={0x100, 0x4, 0xff}) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 05:43:16 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x7a, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:16 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x85, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x7e) [ 762.506646][T19240] gfs2: can't find protocol lock_no+ock 05:43:16 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 762.549528][T19240] gfs2: can't find protocol lock_no+ock 05:43:17 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xa0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:17 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xb6, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:17 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000)={0xfff, 0xffffffff, 0x80000001, 0x10001, 0x5}, 0x14) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r2, &(0x7f0000000400)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r4, @in, [0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x8, 0x951, 0x800000000007ff, 0x0, 0x5, 0x0, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000100)={r4, @in={{0x2, 0x4e23, @remote}}, 0xfffd, 0x1}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000040)={r4, 0x2d, "7711054fdfa7c5b4e3b726f4eae1a2bbbee79c8ae33ff953638bc6f53b51a734ba7adc89e4b6cee146e4e9c8d2"}, &(0x7f0000000080)=0x35) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x40, 0x200, 0x1ff, 0x1f, r4}, 0x10) r5 = socket$alg(0x26, 0x5, 0x0) accept$netrom(0xffffffffffffffff, &(0x7f0000000340)={{0x3, @default}, [@netrom, @remote, @netrom, @netrom, @netrom, @remote, @default]}, &(0x7f00000003c0)=0x48) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000400)) bind$alg(r5, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r6 = accept4(r5, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 05:43:17 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x14c, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 763.139049][T19289] gfs2: can't find protocol lock_no+ock [ 763.193833][T19289] gfs2: can't find protocol lock_no+ock 05:43:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3", 0xff}], 0x3, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:19 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x189, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:19 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) recvmmsg(r3, &(0x7f0000000540)=[{{&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/69}, {&(0x7f0000000100)=""/133}, {&(0x7f00000001c0)=""/42}]}}, {{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/37}, {&(0x7f0000000340)=""/136}, {&(0x7f00000009c0)=""/4096}], 0x0, &(0x7f0000000480)=""/130}, 0xffffffff}], 0x4000000000000ce, 0x40010140, &(0x7f00000034c0)={0x77359400}) [ 765.129173][T19309] gfs2: can't find protocol lock_no+ock [ 765.204130][T19309] gfs2: can't find protocol lock_no+ock 05:43:19 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x18d, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 765.348784][T19331] gfs2: can't find protocol lock_no+ock 05:43:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:19 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x191, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x4000) 05:43:20 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 765.639589][T19343] gfs2: can't find protocol lock_no+ock [ 765.718131][T19343] gfs2: can't find protocol lock_no+ock 05:43:20 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1b9, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:20 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:43:20 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1fa, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:20 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x2ba, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:22 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x300, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x3, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:22 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = semget$private(0x0, 0x3, 0x0) semctl$IPC_STAT(r3, 0x0, 0x2, 0x0) semctl$IPC_RMID(r3, 0x0, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r4 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) 05:43:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x3, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 768.157789][T19400] gfs2: can't find protocol lock_no+ock [ 768.250782][T19400] gfs2: can't find protocol lock_no+ock 05:43:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:22 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x30e, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x60ff) 05:43:23 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 768.703974][T19430] gfs2: can't find protocol lock_no+ock 05:43:23 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x357, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 768.796865][T19430] gfs2: can't find protocol lock_no+ock [ 768.927348][T19454] gfs2: can't find protocol lock_no+ock 05:43:23 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xfffffffffffffd0d, 0x86000) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000100)={0x0, 0x200, 0x400, &(0x7f00000000c0)}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0xde69c1abe6c6c1d3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000002c0)="00ff07abdbef7fbfb1e70107cd05860f2ddb0545c75b4833930c1c26837eb6e38469000000000000fdff41108326153d02faf13b1cf30520e0cfb2aa44f0", 0xa) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r6 = dup(r5) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x5, 0x4021c2) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000180)=[0xffffffffffffffff, r6, r4, r3, r0, 0xffffffffffffffff, 0xffffffffffffffff], 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r6, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="400000000f1404002599000000db0003000000000008000100020000010000000a0003000200000008000300040000000866ffff00000000000024166200c28f00000000000000f0ff000000"], 0x40}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000881) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r7) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)={0x0, @broadcast, @loopback}, &(0x7f0000000040)=0xc) [ 769.011651][T19454] gfs2: can't find protocol lock_no+ock 05:43:23 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x3c9, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 769.139552][T19471] gfs2: can't find protocol lock_no+ock [ 769.206362][T19471] gfs2: can't find protocol lock_no+ock 05:43:23 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x3f4, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:23 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x500, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 769.547280][T19496] gfs2: can't find protocol lock_no+ock [ 769.623496][T19496] gfs2: can't find protocol lock_no+ock 05:43:24 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x600, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 769.795566][T19509] gfs2: can't find protocol lock_no+ock 05:43:24 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x1, @local, 'veth1_virt_wifi\x00'}}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x8, 0x300) fsconfig$FSCONFIG_SET_FD(r4, 0x5, &(0x7f0000000040)='vmac64(aes-generic)\x00', 0x0, r5) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r6 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) [ 769.859653][T19509] gfs2: can't find protocol lock_no+ock 05:43:25 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x700, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 771.309928][T19528] gfs2: can't find protocol lock_no+ock [ 771.407018][T19528] gfs2: can't find protocol lock_no+ock 05:43:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f0", 0x86}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:26 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$netlink(0x10, 0x3, 0x15) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r7, &(0x7f00000009c0)={0x0, 0xb, &(0x7f0000000980)={&(0x7f00000007c0)={0x14, r8, 0xffff}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r6, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x12c, r8, 0x700, 0x70bd26, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x3}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}]}, 0x12c}, 0x1, 0x0, 0x0, 0xc90}, 0xc8d4) r9 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockname$l2tp(r9, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10) 05:43:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x3, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:26 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:26 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x900, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x7700) [ 771.886436][T19558] gfs2: can't find protocol lock_no+ock 05:43:26 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xa00, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 771.946842][T19558] gfs2: can't find protocol lock_no+ock [ 772.075341][T19579] gfs2: can't find protocol lock_no+ock [ 772.161612][T19579] gfs2: can't find protocol lock_no+ock 05:43:26 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xb00, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 772.336428][T19594] gfs2: can't find protocol lock_no+ock 05:43:26 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xc00, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 772.402833][T19594] gfs2: can't find protocol lock_no+ock 05:43:26 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[], 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, &(0x7f0000000000)={0x2, 0xfff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1056}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x8, 0x4, 0x5, 0x18, 0x0, 0x1f, 0x460c, 0x6, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xb3c, 0x4, @perf_bp={&(0x7f0000000080), 0xa}, 0x10a0, 0x47b91c8, 0x2, 0x0, 0xfbf, 0x5, 0x7}, r0, 0x5, 0xffffffffffffffff, 0x9) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)=0x80) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000140)={0x2, 0x3, 0x9, {0xfffffbff, 0x20}, 0x4, 0x2}) readlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/127, 0x7f) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) [ 772.553063][T19608] gfs2: can't find protocol lock_no+ock 05:43:26 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xd00, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 772.749346][T19618] gfs2: can't find protocol lock_no+ock 05:43:27 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xe00, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 772.820110][T19618] gfs2: can't find protocol lock_no+ock [ 772.912162][T19632] gfs2: can't find protocol lock_no+ock [ 772.959222][T19632] gfs2: can't find protocol lock_no+ock 05:43:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f0", 0x86}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:29 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xe03, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:29 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup2(r4, 0xffffffffffffffff) write$USERIO_CMD_REGISTER(r5, &(0x7f0000000000)={0x0, 0x1}, 0x2) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r6 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) [ 774.818079][T19653] gfs2: can't find protocol lock_no+ock [ 774.875853][T19653] gfs2: can't find protocol lock_no+ock 05:43:29 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x7e00) 05:43:29 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xf00, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:29 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1020, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:29 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:29 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1200, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:29 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1300, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:30 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000000)={0x0, {0x7, 0x64}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = getpid() sched_setscheduler(r3, 0x0, &(0x7f00000001c0)) fcntl$setown(r2, 0x8, r3) r4 = accept4(r2, 0x0, 0x0, 0x0) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000040)={{0x6000, 0x4, 0xb, 0x7, 0x4, 0x0, 0x4b, 0x3f, 0x9, 0x5, 0x3, 0x1}, {0x6000, 0x4, 0x0, 0x1, 0x7, 0xe7, 0x1, 0x3e, 0x0, 0x6, 0x7}, {0x1000, 0x2000, 0xe, 0x2, 0xfc, 0x1, 0x3, 0x6, 0x6, 0x7, 0x8e}, {0x3000, 0x1000, 0xa, 0x9, 0x2, 0x9, 0xc1, 0x2, 0x20, 0x7f, 0x3, 0x20}, {0x0, 0x2000, 0xd, 0x6, 0x80, 0x80, 0x8, 0x6, 0x8, 0x3c, 0x4, 0x4}, {0x2, 0x10000, 0xd, 0x9, 0x6d, 0x8, 0x81, 0x2, 0x3, 0x20, 0xd9, 0x81}, {0x10000, 0xd800, 0xf, 0x5, 0xff, 0xf7, 0xfa, 0x97, 0x19, 0x9, 0x19, 0x9}, {0x4000, 0x2000, 0x1, 0x1, 0x11, 0x7, 0x40, 0x65, 0x4, 0xbe, 0x81, 0x80}, {0x100000, 0xe49d}, {0x10000, 0x4}, 0x40000000, 0x0, 0x0, 0x4021, 0x0, 0x800, 0x5000, [0x5, 0x8000, 0x1, 0x5]}) socket$nl_sock_diag(0x10, 0x3, 0x4) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) 05:43:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f0", 0x86}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:32 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1400, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:32 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r2, 0xab04) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) 05:43:32 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:32 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1500, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0xb700) 05:43:32 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:32 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9d", 0x44}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:32 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1600, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:32 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9d", 0x44}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:32 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9d", 0x44}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00c", 0x87}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:35 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1700, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:35 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f00000001c0)={0x9f0000, 0xd3, 0x6, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0x9c0054, 0x3, [], @value=0x2}}) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, &(0x7f0000000200)={0x25, 0x5, 0x8, 0x9, 0xfffffc00, 0x81}) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000900)='/dev/vga_arbiter\x00', 0x8080, 0x0) ioctl$KDGKBMETA(r5, 0x4b62, &(0x7f0000004c80)) r6 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmmsg(r8, &(0x7f0000004c00)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000240)="71dbe49f9075744f30734dfe64075ba900bfe3ebad89e5c3ee9adba87c7e66fc5783ad6282bffd00b0f301fb5b5b27a56db711a38a26fd6599fb17cabc9f255e04c7342b304d8dfea54d69ce30bcf547", 0x50}, {&(0x7f00000002c0)="e0dacb452c9333112b1033e2c62567048d65c6b4601ed120ecd59ab3fb6a0419cb362e3a53bd4e8d65a50c76173222a41dc7e180e6838f9553a1cba5", 0x3c}, {&(0x7f0000000340)="cf27abae567ea7c37d00a7898437dd62bb36de8360180c41ff51a6fa1880fbf70fe58f908a0be930be8d729fa7c9b683492234cbd283", 0x36}, {&(0x7f00000009c0)="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", 0x1000}, {&(0x7f0000000380)="c79d05ee2bb2944829b0d8ddbf028bd365443c38c6cc635ccb3b8e6cf74f3a44592f780bf27cce89cca44a6e2628832431463d0f4a6d09fdfb9b58aa356e25ad6eaab628adfe0e89a8960bab61bd8a878ff5b1c2cb016f6385a6f77fa405c168f9f511eabc4bdf90ea88a2b780ba6c83501be83da1ab9d01b7ec9c9ebfb3009244a18b2040bea91ae22d8f6d4c369ef03e564b0f5d12b500394dda8f9ffc9d24075460bf04d9cbf82ab462c867904421f5f586edf3c79cdb435aac1e6c31970bcf123923f7c74776ca501afbfbf388c31134b509b2f6da33a002fa0b6a05ea43b04d73afa5fcf005e675a5162260b0ce08f6eb4ee68e984321", 0xf9}, {&(0x7f0000000480)="2be63af025bda238e369d8e4910fd2c4585124fa5c300cd5a49a2c9c6c23a31f802b6d44fdc2cd421b5925a9f3dda76d6751450a2be9cd9f47ed6e69b099d5afb606e84f7dd7a60da7814f43ee1c550e0bc7390c24a54c7ccc36d2a09bbdd014c4a2b50dbfb1554491f1d877506b925814fdefd560f8b0c39160505221e75c95e0b2d15dcaf119441bf13f50c07cef7636f1af41ed34dee67bf2c6742ba8cd95a6f891d89cc17f1ad820c5", 0xab}, {&(0x7f0000000540)="93c23ff83774d186caae8ad576d9b744691e1b9778f204358aea0bfecb377de944637db677568f88be89dc255ae923e1eaa3807ae94152698e9b80da8c74a38c1510d9a508ea2c88c7129f486528f255b28613295bf7420ba7bfc8874e5bfb5f99b4acb6c237588555bf3a1d9543d74462d68fbf28f0c87e9af2d97aca692e90eb3e4f77f80e06090882e8f52daa9b44b3dfa5d6b5c13266b03183e6af1fb35840bf4e58a09f728991299047aec3aa51c386bcf9c100aa2994772f617ffb50739a901750751a51fbea1c10f44ea4b2ded889a74e424905d903a23f5fea1df66c5683be63d703a3070064b2", 0xeb}], 0x7, &(0x7f00000019c0)=[{0x1010, 0xff, 0x8, "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"}], 0x1010}}, {{0x0, 0x0, &(0x7f0000004b80)=[{&(0x7f00000006c0)="29d34df079ebf8932e8b3e0941dd24c329f84dc842783ef1d0b81d8c276590b5da0ed03487037a16475fa07668d7c9c370626090805901740a458b721c685333065fc04e9671ab8160f35d15fbcd6d19f6f357adb47c4fec8ed3209c6982b66f260f8795f1e143c9bf03d224ac62b69bdf0773e7d890aa72e723331661f2ebdb2a9c001a2f7bd8772f4c7160abeb5a58c5acfa7febcd5d200fec35a5c951334bf62bbb8b1146b08ce5a789ecfaa94060a93a991e8113b0894565693a3081ade87cfb0cbce0a89ccc0983d17672ea763d1060e668e7db7dfcf4296269161e", 0xde}, {&(0x7f00000007c0)="b01e4ba6fb82fd497722e03d00c491c8202ed40ffe3e2ed47d5e2ef2cd90f2a59ccaabfc5ef4aab94971e4adc90de4e38f7daa582784cc161404b4fde98d9f3fec6a7b3657d8b12fb2ce85f5619a47fac291f3c6a19ebba2190474afcd7e5b9cc03fd10cff199e9c4e3f8ced14f58965b628ecdc3c96d4453f42d58c73bdd434ccb95543c189178dcb29e41eca3399a4828daf98d5ea8d1a82c52e10dbe0f51133bab28d5c22b43d9fd255810df2b12c1e31551c5f1041cb7b68c9c62f5674d40b65dcb5f2f7b43928e16eb2447fd057ed20a006560a565895e32a3f6153cc0591273d23aa45125db2eba69d95d14939194a", 0xf2}, {&(0x7f0000002a00)="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", 0x1000}, {&(0x7f0000003a00)="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", 0x1000}, {&(0x7f0000004a00)="d91e0060767fd9e39a9d25c67636116919c298ffbca82c0a6dcbb5432071a8d062c4ab9ec182a91bbadcd21410928cc5e6eff67c425b37e547a1d15ba877b0b831c1083e88e40931f902ffc9f488722bf86b80c6fb10bb213996f3e54b37fa82e7094ffeef51db7b0b02aa01c3d66fa4f87d17be7538d7345e397daf124db5c0966bfd01", 0x84}, {&(0x7f0000004ac0)="4cde3eef9cda67e5d6c9ae3668efdd5b7db89e8f38ca493cac67617853ab217c6c2aea62a28cd3d377c1f87c8616000b80de3361767e69f35d3606d53285142ceaa9d44d08498f9d3c25a770d2d5db721206c6ac76b74264053458e8ca83a2a0bf7863c887ed875d03656971587fd726cb8ec2d7eaa389c758fc22065ec4b1aa461235330e12fa5b7f406e979e14ec494cb6e7dd4ed500c57405653f2eec1e", 0x9f}, {&(0x7f00000008c0)="debdd772af64d4e25858c3562dad81863570", 0x12}, {0x0}], 0x8}}], 0x2, 0x804) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000000)={{{@in6, @in=@local}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000140)="64713e1300"/19, 0x53b2bb74c0d18948) r9 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r9, 0x0, 0x30007, 0x0) 05:43:35 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1f00, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x207200) 05:43:35 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x2000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:35 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x2010, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:35 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x3f00, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:35 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b", 0x66}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:35 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:36 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RXATTRWALK(r5, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x8}, 0xf) [ 781.670439][T19859] gfs2: can't find protocol lock_no+ock [ 781.741917][T19859] gfs2: can't find protocol lock_no+ock 05:43:38 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4600, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:38 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) connect$unix(r0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e23}, 0x6e) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PIO_FONTRESET(r5, 0x4b6d, 0x0) 05:43:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00c", 0x87}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00c", 0x87}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 783.969761][T19885] gfs2: can't find protocol lock_no+ock [ 784.040877][T19885] gfs2: can't find protocol lock_no+ock 05:43:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x400000) 05:43:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:38 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4800, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 784.298914][T19914] gfs2: can't find protocol lock_no+ock [ 784.340850][T19914] gfs2: can't find protocol lock_no+ock 05:43:38 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b", 0x66}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:38 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4c00, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 784.636940][T19942] gfs2: can't find protocol lock_no+ock [ 784.705641][T19942] gfs2: can't find protocol lock_no+ock 05:43:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:39 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x2}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:43:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(0x0, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x51a000) 05:43:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:41 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) 05:43:41 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4c01, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(0x0, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 787.313971][T19984] gfs2: can't find protocol lock_no+ock [ 787.386077][T19984] gfs2: can't find protocol lock_no+ock 05:43:41 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b", 0x66}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:41 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x5703, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:42 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x6000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:42 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x6800, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:42 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x6c00, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:42 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x48, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@TCA_RATE={0x6, 0x5, {0x4, 0x1}}, @qdisc_kind_options=@q_etf={{0x8, 0x1, 'etf\x00'}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x0, 0xb}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x10080) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001e00)={0x0, @can, @xdp={0x2c, 0x8, 0x0, 0x7}, @xdp={0x2c, 0x2, r4, 0x3a}, 0x6, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001dc0)='veth1_vlan\x00', 0x3, 0xfa5, 0x7fff}) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, &(0x7f0000001f40)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001f00)={&(0x7f0000000180)={0x48, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xbdd6392789399bd9}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2e4}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @random="647b48fcab6e"}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x4004101) r7 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r7, 0x0, 0x30007, 0x0) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = dup(r8) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$EVIOCGABS3F(r9, 0x8018457f, &(0x7f0000000000)=""/111) 05:43:42 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x7400, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x719000) 05:43:44 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x7a00, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:44 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) fcntl$getflags(r2, 0x403) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0xc0000) ioctl$DRM_IOCTL_MODE_CURSOR(r4, 0xc01c64a3, &(0x7f0000000080)={0x2, 0x20, 0xa2, 0x7, 0x5a, 0x8, 0xd2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r5 = accept4(r3, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 05:43:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(0x0, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x722000) 05:43:45 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676", 0x77}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:45 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x8901, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 790.765338][T20098] gfs2: can't find protocol lock_no+ock 05:43:45 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x8d01, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 790.832174][T20098] gfs2: can't find protocol lock_no+ock [ 790.976887][T20118] gfs2: can't find protocol lock_no+ock [ 791.043827][T20118] gfs2: can't find protocol lock_no+ock 05:43:45 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x9101, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:45 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xa000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:45 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYRES32=r2, @ANYRES32, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRESDEC=r3, @ANYBLOB="1e5e16a4a0308275ab37d25f9ccbcb4bfce173c456352049d35c74db7681b1a5af08c1a2eced87454400b3ec98bf23eb8a42496aeb649fc033c0bd8c43cc5f58108819bb0e1299192e2eee11e00ae4ea324b6431b33784e2513dedcafff56249c272441d0555f669c505ea6b48418ef9706af3bbecd566b290bfe0449e5e9f4881b4eeb4fe4a358d6c6984602daf996555c8872b9b4debe6db893f70e09c729e16a36233e7fcd0bb5ecb74cda1ecd50944095267ad8c9d4a1eb4543f6e7e3e09"]], 0x10) fstat(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, 0x0, r4, r5, r4, 0x0, 0xb}, 0xb8fb, 0xbb, 0x3, 0x8000, 0x0, 0x0, 0x81}) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000480)={0xb0, 0x0, 0x4, [{{0x2, 0x2, 0x10000, 0x1, 0x5, 0x9b1d, {0x5, 0x0, 0xffffffffffffffff, 0x7, 0x9, 0x5, 0x5, 0x6, 0x8, 0x6, 0xffffff00, 0x0, r4, 0xfff}}, {0x4, 0x100000001, 0x8, 0xffffff00, '}\x8cvmnet0'}}]}, 0xb0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r8 = accept(r7, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000080)=0x80) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r8, 0x84, 0x4, &(0x7f00000000c0)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r9 = accept4(r6, 0x0, 0x0, 0x0) splice(r0, 0x0, r9, 0x0, 0x30007, 0x0) 05:43:45 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xb600, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:46 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xb901, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:46 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xba02, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:47 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xc903, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 793.545032][T20188] gfs2: can't find protocol lock_no+ock [ 793.613786][T20188] gfs2: can't find protocol lock_no+ock 05:43:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x770000) 05:43:48 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676", 0x77}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:48 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xedc0, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:48 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xf403, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:48 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xfa01, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:48 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xff00, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:48 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1703e, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:49 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1703f, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:49 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17040, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:50 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17041, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x907100) 05:43:51 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676", 0x77}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:51 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17042, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:51 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17043, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:51 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17044, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:51 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17045, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:52 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17046, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:52 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17047, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:52 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17048, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:53 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17049, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0xa05100) 05:43:54 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:54 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1704a, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:54 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1704b, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:54 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1704c, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:54 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000000)={0x82, @tick=0x7fff, 0x0, {0x5, 0x1}, 0x2, 0x2, 0x3}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$pptp(0x18, 0x1, 0x2) sendmmsg(0xffffffffffffffff, &(0x7f0000000840), 0x0, 0x480) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0x7fffffff, 0x0, 0x10001, 0x9}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000080)={0x5, r5, 0x10000, 0x99}) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$P9_RMKDIR(r7, &(0x7f00000000c0)={0x14, 0x49, 0x2, {0x1, 0x1, 0x6}}, 0x14) r8 = accept4(r4, 0x0, 0x0, 0x0) splice(r2, 0x0, r8, 0x0, 0x30007, 0x0) 05:43:55 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1704d, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:55 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1704e, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:55 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1704f, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:57 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17050, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0xb70000) 05:43:57 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r5 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 05:43:57 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17051, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:57 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:43:57 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:43:57 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17052, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:57 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17053, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:58 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17054, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:58 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17055, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:43:58 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x20000000000000}}, 0x0, 0xe, r0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:44:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x1000000) 05:44:00 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17056, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:00 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8910, &(0x7f0000000080)={'sit0\x00', @ifru_settings={0x6, 0x401, @fr_pvc_info=&(0x7f0000000040)={0x7, 'bridge0\x00'}}}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) ioctl$KIOCSOUND(r4, 0x4b2f, 0x5) r5 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 05:44:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:00 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17057, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:00 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:00 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17058, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:00 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17059, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:01 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1705a, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:01 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1705b, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:01 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) read$FUSE(r0, &(0x7f00000009c0), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:44:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x20000000) 05:44:03 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1705c, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:03 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000240)=0xcb0, 0x2) ioctl$KVM_GET_IRQCHIP(r4, 0xc208ae62, &(0x7f0000000000)={0x0, 0x0, @ioapic}) r5 = accept4(r2, 0x0, 0x0, 0x0) r6 = syz_open_dev$media(&(0x7f0000000580)='/dev/media#\x00', 0x6db, 0x4000) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r6, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, r7, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4c5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1f}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x4000801) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 05:44:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:03 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x20000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:03 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:03 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r4 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r7 = fsopen(&(0x7f00000002c0)='exofs\x00', 0x0) sendmmsg$unix(r1, &(0x7f0000001b40)=[{&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000140)="6d31a20d4b4eb1f1b65ee802db3c3bc4a299492b75ec0b10cd5ddead80d8c2479293afffd201a3d0cafd56bd235b83c7f2275bed657cc03533cdd4fbdb14b1f17bca1f0eeb01d0a8b1c141f7a81c6c0689c278cb4e07c2f3e3238401608addd1fac30544fe968c08b7961872de38cee4c716d9bae9a3d65646037bacdc487020f35a0499aad77d8c583da33fce3b2664186100763c1c71275fd7f08aedef47812c370c638cc9d703c338c5a11335ec0e5bc2a2de9b82d8712a2d1347470048a47ac549", 0xc3}, {&(0x7f0000000240)}, {&(0x7f0000000280)="7d7643309e008f57ecc8df6a73aa2bf4a91664df7b748adab29045071bec4cb2efcdb0b1a01aae650c4d86637b279bd88d49d492ccd54d", 0x37}, {&(0x7f0000000340)="58d1aedbefd345265a539bd97baf3eb67a14a30e0de32b075e006fb816b3dec2e0fe8b62af9a24038bce54ef37063793bd3f40e9e8712dd61d676778df31c12bd3ade21711bd13695aa63d060b5596c7c196c0ca5a26052cbd335da049ab2f2ad595bcee470b32c9557c87cd07b745ab5d31108d6c90416c0eae", 0x7a}, {&(0x7f0000000480)="3305c0586cfc0fe59a9cbec3fb18fb6e3d2c6d30cbe3fd79b9da2962feefb75c71494289c06425f805a5b607ade49c32667bcf7c5485542dc07ee07e2eb8963240244b65a6c424d379dff22c4f0903a16fe031c6c3f60afb7e96d7275f28fd5e5dd834cae371ee6606f79730e004fd0eb5f4666726e3ea73b04e2989d3da063ef4b1b99de987cd6fc63fec7c7ef2dda5fe8c46bb0ec7c426ee45011064b51ceb48561a7d95ca824ecc9bd33a211454bfb464f4eed60899b644becddccb334b90d4746383", 0xc4}], 0x5, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32=r4, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00@\x00'/20, @ANYRES32=r3, @ANYRES32, @ANYRES32=r4, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32=r5, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r6, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r7, @ANYRES32=r4], 0xd0, 0x40050}, {&(0x7f0000000680)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000000700)="2e3d755864e5056b2b7cee201bb96b2947a5777e9c023527df983bcc807c6d9025fc", 0x22}, {&(0x7f0000000740)="a4728553c405483677d8739e92cc0a332ef0121fa3243fae70c77be464ce3992", 0x20}, {&(0x7f0000000780)="a817a0f391b0ed583c34fc185bd6297a5dc305eae49cfd260c0a5cd1365bd9c81e2e7cba47a1c077f07b758475d6ebeb4f1fad185a8c1fcd9dec9c09276f4a167cbca5242c023bafb409bae86e6723552c42dd77006b79e8b2d6e696d14d01ef57177d785ca97dd84ea967358179b01314a4c64cb842aa2d0207220e014b9e50bf0af880de3ec86805e22458d34bca4a74375059a3aa324fba64ecc2f7961240bea216430e5f6f3615d23f9c3a8d73e6a88c5d19895bbc75101277bc4df96c99cb4df5587aa3f36656280c1af5575c78eda21b30a9b3bfab60ff9b9f3efcc9faf9f5969ba666cfeae3523b46", 0xec}, {&(0x7f00000009c0)="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", 0x1000}, {&(0x7f0000000880)="7703c7fa2c3a97b902124505df889ece1d5cb3c88775f93175104df2ef8d478cbe456fde2d63f1f472eae43f35322c3e4a86dba82e4249ec70950d26da5609a83b21c15e7bbad8d15136b3226b3c673d42638a5b", 0x54}, {&(0x7f0000000900)="c847624dd90ebcb366009096c113", 0xe}, {&(0x7f00000019c0)="73bc85cb05cd61544ea0e15322bb74c86672907a8cb2051338a3eaba390f3d4315028824924ee61f8b2c8f7ff4b293e459d1cf3da52a57c84ec1c7fd0f1926e88b9d0ab95bfa8f5b5ffd45847c3ec66f0276d4347d8d7a2ff15d6069e80207899d4cc864cffffc09d1438b2cd4a48b41e74e0b13f46e5bae7c0aa6d902b8566266c8245b723a6001fcd9e3b5c7deddaab3ff5e9045237b750eecb75784d159c044baa8e240bedbc80c64bda951b002e1316b53093aa09c3e22d5346ba153eb6f5d85e36f453c157cebdb07a7ea184f1b0baa64a5bc59cb4f6b619484e33ef9e093ea9e04", 0xe4}], 0x7, 0x0, 0x0, 0xc0}], 0x2, 0x1) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_GET_CLOCK(r9, 0x8030ae7c, &(0x7f0000000000)) 05:44:03 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x40000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:04 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xe0000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:04 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x400000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 809.965665][T20672] gfs2: can't find protocol lock_no+ock [ 810.041833][T20672] gfs2: can't find protocol lock_no+ock 05:44:04 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 810.252908][T20688] gfs2: can't find protocol lock_no+ock [ 810.319995][T20688] gfs2: can't find protocol lock_no+ock 05:44:06 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) accept(r3, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f00000000c0)={{0x4, 0x0, @reserved="22fbfbe313b87d0047ec3afd6d9b613b5cf13d49784fd89148b0b6816016ce11"}}) r6 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) 05:44:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x21000000) 05:44:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:06 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x2000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 812.287122][T20713] gfs2: can't find protocol lock_no+ock 05:44:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 812.356481][T20713] gfs2: can't find protocol lock_no+ock 05:44:06 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x3000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:06 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 812.529433][T20737] gfs2: can't find protocol lock_no+ock [ 812.601364][T20737] gfs2: can't find protocol lock_no+ock 05:44:07 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$TIOCL_GETSHIFTSTATE(r2, 0x541c, &(0x7f0000000000)={0x6, 0x1}) splice(r2, 0x0, r3, 0x0, 0x30007, 0x0) 05:44:07 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 812.783819][T20756] gfs2: can't find protocol lock_no+ock 05:44:07 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x5000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 812.848970][T20756] gfs2: can't find protocol lock_no+ock 05:44:07 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x6000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 813.027041][T20773] gfs2: can't find protocol lock_no+ock 05:44:07 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x7000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 813.093887][T20773] gfs2: can't find protocol lock_no+ock [ 813.254024][T20786] gfs2: can't find protocol lock_no+ock [ 813.327685][T20786] gfs2: can't find protocol lock_no+ock 05:44:07 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x8000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 813.422434][T20800] gfs2: can't find protocol lock_no+ock [ 813.448789][T20800] gfs2: can't find protocol lock_no+ock 05:44:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x7e000000) 05:44:09 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x9000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:09 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f0000000040)={0x1, 0x0, {0x1, 0x1, 0x81, 0x1, 0x10001}, 0x1}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0xfffffffffffffff9, 0x2000) r4 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) [ 815.332365][T20818] gfs2: can't find protocol lock_no+ock [ 815.370835][T20818] gfs2: can't find protocol lock_no+ock 05:44:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0xfeffffff) 05:44:09 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f0", 0x86}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:09 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xa000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 815.650332][T20848] gfs2: can't find protocol lock_no+ock [ 815.711056][T20848] gfs2: can't find protocol lock_no+ock 05:44:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:10 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xa7fd1ec, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:10 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8, 0x103500) r4 = fsopen(&(0x7f0000000040)='virtiofs\x00', 0x1) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000100)={0x990000, 0x200, 0x0, r4, 0x0, &(0x7f00000000c0)={0x9b0951, 0x7d, [], @p_u8=&(0x7f0000000080)=0x2}}) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r5 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 05:44:10 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xb000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 816.169720][T20894] gfs2: can't find protocol lock_no+ock [ 816.234389][T20894] gfs2: can't find protocol lock_no+ock 05:44:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0xff600000) 05:44:13 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xc000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:13 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f0", 0x86}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(0x0, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:13 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000000)=0x8) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:44:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0xfffffffe) 05:44:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 818.777844][T20930] gfs2: can't find protocol lock_no+ock 05:44:13 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xd000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 818.839615][T20930] gfs2: can't find protocol lock_no+ock [ 819.020790][T20957] gfs2: can't find protocol lock_no+ock 05:44:13 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xe000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 819.078856][T20957] gfs2: can't find protocol lock_no+ock [ 819.204063][T20971] gfs2: can't find protocol lock_no+ock 05:44:13 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xe030000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 819.274042][T20971] gfs2: can't find protocol lock_no+ock 05:44:13 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xf000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:13 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x10000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 819.487191][T20990] gfs2: can't find protocol lock_no+ock 05:44:13 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x58) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x80045505, &(0x7f0000000100)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x0, 0x2000}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x1) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_G_AUDIO(r6, 0x80345621, &(0x7f0000000000)) r7 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r7, 0x0, 0x30007, 0x0) [ 819.642734][T20997] gfs2: can't find protocol lock_no+ock 05:44:14 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x11000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 819.793366][T21008] gfs2: can't find protocol lock_no+ock 05:44:16 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f0", 0x86}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:16 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x12000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:16 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:44:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(0x0, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x2000000000) 05:44:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x2100000000) [ 821.864113][T21029] gfs2: can't find protocol lock_no+ock [ 821.952040][T21029] gfs2: can't find protocol lock_no+ock 05:44:16 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x13000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 822.090355][T21057] gfs2: can't find protocol lock_no+ock [ 822.144376][T21057] gfs2: can't find protocol lock_no+ock 05:44:16 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x14000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 822.265202][T21072] gfs2: can't find protocol lock_no+ock [ 822.323981][T21072] gfs2: can't find protocol lock_no+ock 05:44:16 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x15000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 822.457117][T21086] gfs2: can't find protocol lock_no+ock 05:44:16 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x16000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:16 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x4a181, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) [ 822.627529][T21095] gfs2: can't find protocol lock_no+ock [ 822.677083][T21095] gfs2: can't find protocol lock_no+ock 05:44:19 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00c", 0x87}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:19 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x17000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:19 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_rose_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x3, [@null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) r5 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r5, 0x0, 0x30007, 0x0) 05:44:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(0x0, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x400000000000) [ 824.944991][T21124] gfs2: can't find protocol lock_no+ock [ 825.005028][T21124] gfs2: can't find protocol lock_no+ock 05:44:19 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1f000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x60ffffffffff) [ 825.134512][T21145] gfs2: can't find protocol lock_no+ock 05:44:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x770000000000) [ 825.204779][T21145] gfs2: can't find protocol lock_no+ock 05:44:19 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x20000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 825.377941][T21169] gfs2: can't find protocol lock_no+ock [ 825.434669][T21169] gfs2: can't find protocol lock_no+ock 05:44:19 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x20100000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:19 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x3e700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:22 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00c", 0x87}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:22 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r6, &(0x7f0000000400)="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", 0x200, 0x0) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r8, @in, [0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x8, 0x951, 0x800000000007ff, 0x0, 0x5, 0x0, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000100)={r8, @in={{0x2, 0x4e23, @remote}}, 0xfffd, 0x1}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r6, 0x84, 0x6d, &(0x7f0000000040)=ANY=[@ANYRES32=r8, @ANYBLOB="2d0000007711054fdfa7c5b4e3b726f4eae1a2bbbe019c8ae33ff953638bc6f53b51a734ba6adc89e4b6cee146e4e9c8d2"], &(0x7f0000000080)=0x35) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000000)={r8, 0xbc1}, &(0x7f0000000040)=0x8) 05:44:22 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x3f000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) [ 828.001607][T21206] gfs2: can't find protocol lock_no+ock 05:44:22 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x3f700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 828.063262][T21206] gfs2: can't find protocol lock_no+ock 05:44:22 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x40000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x7fffffffefff) 05:44:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0xb70000000000) [ 828.384263][T21243] gfs2: can't find protocol lock_no+ock [ 828.452635][T21243] gfs2: can't find protocol lock_no+ock 05:44:22 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x40700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:22 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x41700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:23 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x42700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:25 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00c", 0x87}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:25 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x43700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:25 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x44700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:25 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x45700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x20720000000000) 05:44:26 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x46000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 831.857692][T21334] gfs2: can't find protocol lock_no+ock [ 831.949956][T21334] gfs2: can't find protocol lock_no+ock 05:44:26 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x46700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:26 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x47700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:26 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x48000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:26 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x48700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 832.564556][T21367] gfs2: can't find protocol lock_no+ock 05:44:28 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:28 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x49700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:28 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4a700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x90710000000000) 05:44:28 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4b700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:29 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4c000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 834.960157][T21424] gfs2: can't find protocol lock_no+ock 05:44:29 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4c010000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 835.154869][T21433] gfs2: can't find protocol lock_no+ock 05:44:29 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4c700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:29 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4d700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:29 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4e700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:31 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:31 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4f700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:31 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0xa0510000000000) 05:44:32 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x50700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:32 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x51700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:32 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x52700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:32 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x53700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:32 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x54700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:33 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x55700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:33 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x56700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:33 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x57030000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, 0x0) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:34 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x57700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:34 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x100000000000000) 05:44:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:35 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x58700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:35 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x59700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:35 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x5a700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:35 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x5b700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:36 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x5c700100, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:36 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x60000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 841.921645][T21629] gfs2: can't find protocol lock_no+ock [ 841.991146][T21629] gfs2: can't find protocol lock_no+ock 05:44:36 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x68000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 842.151855][T21643] gfs2: can't find protocol lock_no+ock 05:44:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, 0x0) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:37 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x6c000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 843.617333][T21652] gfs2: can't find protocol lock_no+ock 05:44:38 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 843.684735][T21652] gfs2: can't find protocol lock_no+ock 05:44:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x7e00000000000000) 05:44:38 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x74000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:38 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x7a000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 843.913667][T21671] gfs2: can't find protocol lock_no+ock 05:44:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x8000000000000000) [ 844.066492][T21685] gfs2: can't find protocol lock_no+ock [ 844.112435][T21685] gfs2: can't find protocol lock_no+ock 05:44:38 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x85000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:38 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x89010000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:39 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x8cffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:39 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x8d010000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, 0x0) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:40 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000480)={0x4bc, 0x1, 0x5, 0x801, 0x0, 0x0, {0x5, 0x0, 0x5}, [{{0x254, 0x1, {{0x2, 0x5}, 0x5, 0x6, 0x8, 0xa40, 0x16, 'syz0\x00', "525924866e2283d4d2f608db09addb5df549b25d3da4ee3b168bc97cd31b27a5", "16d155a8e2721b7d7874a232e5fec47c304d60830f78ab78d3fa37700b58d831", [{0x4, 0xa31f, {0x3, 0x6}}, {0x6, 0x9, {0x1, 0x3}}, {0x8, 0x2, {0x2, 0x5}}, {0x40, 0x3, {0x0, 0x3}}, {0x3, 0x200, {0x3, 0x4}}, {0x200, 0x8df0, {0x3, 0x800}}, {0x7ff, 0x7, {0x0, 0xfffffff9}}, {0xfff, 0x8, {0x2, 0xfffeffff}}, {0xfff, 0x966f, {0x0, 0x81}}, {0x3ff, 0xf8, {0x0, 0x1d400000}}, {0x3, 0x0, {0x1, 0x5}}, {0x3f, 0x5, {0x3, 0x2}}, {0x8, 0x8000, {0x3, 0x9}}, {0x8, 0x8000, {0x0, 0xc873}}, {0x4, 0x5, {0x1, 0x1}}, {0x0, 0x1, {0x2, 0x6}}, {0xe07, 0x3ff, {0x2, 0x2}}, {0x0, 0x1, {0x3, 0xd8d5}}, {0x800, 0x81, {0x2, 0x1}}, {0x9, 0x8, {0x0, 0x6}}, {0x0, 0x7f, {0x0, 0x1000}}, {0x80, 0x6, {0x0, 0x4}}, {0x1000, 0x3, {0x1, 0x1}}, {0x40, 0x753, {0x0, 0x1000}}, {0x1, 0xb3e1, {0x2, 0xff}}, {0x1fd, 0x7, {0x2, 0x6}}, {0x82e, 0x2, {0x0, 0x5}}, {0x0, 0x3, {0x3, 0x9}}, {0x3f, 0x90, {0x3, 0x5142ef44}}, {0x1, 0x200, {0x1, 0x5}}, {0x6, 0x5, {0x0, 0xf51f}}, {0x2, 0x0, {0x0, 0x1}}, {0x1000, 0x4, {0x1, 0x3}}, {0x0, 0x6, {0x2, 0x800}}, {0x5, 0x7f, {0x0, 0xffff}}, {0xff2d, 0x8, {0x2}}, {0x3, 0x5, {0x6, 0x1}}, {0x3ff, 0x80, {0x1, 0x5}}, {0x7fff, 0x2a5c, {0x1, 0xffff}}, {0x2, 0x1, {0x3, 0x1000}}]}}}, {{0x254, 0x1, {{0x2, 0x9486}, 0x9, 0xbf, 0x4, 0x9, 0x6, 'syz0\x00', "e8d3013b4068e7c5ef3f0c8dea5b67ecc78aa238df7407c759db2839ea76426d", "5ce1a32eaeec7315ae9bbf39d7538bf63f18670a5d9b171393e16a63f85c2392", [{0x5, 0x0, {0x3, 0x1}}, {0x8, 0x5}, {0x3ff, 0x0, {0x2, 0x101}}, {0x4, 0x7ff, {0x0, 0x79ca9e72}}, {0x7, 0x7, {0x2, 0x3}}, {0xe659, 0x9, {0x0, 0x6}}, {0x4, 0xd000, {0x3, 0xffff}}, {0x2, 0x0, {0x3, 0x80000000}}, {0x6, 0x8, {0x0, 0x3}}, {0x8, 0x3, {0x1, 0x6}}, {0xff8f, 0x1, {0x3, 0x5}}, {0x39, 0x5, {0x3, 0x9}}, {0xe3, 0x96, {0x2, 0x6}}, {0x7ff, 0x8, {0x0, 0x5}}, {0x4, 0x6, {0x3, 0xf3f4}}, {0x800, 0x101, {0x1, 0xfffffffb}}, {0xba, 0x56, {0x3, 0x200}}, {0x12ad, 0x5, {0x2, 0xad39}}, {0x4, 0x5, {0x0, 0x100}}, {0x7, 0xdc0, {0x3, 0x80000000}}, {0xff, 0x1ff, {0x3}}, {0x2, 0x20}, {0xbacb, 0x37, {0x3, 0x1}}, {0x1f, 0x0, {0x2, 0x80000001}}, {0x2, 0x400, {0x3, 0x8001}}, {0x2, 0x9, {0x0, 0xe586}}, {0x1, 0x4, {0x1, 0xfff}}, {0x1, 0xee00, {0x3, 0x9}}, {0x4, 0x87, {0x3, 0x4b5}}, {0x505, 0x8, {0x1, 0x9}}, {0x9, 0x7, {0x3, 0x2}}, {0x1, 0x2, {0x1, 0x4}}, {0xfe00, 0x0, {0x1, 0x3f}}, {0x1, 0x800, {0x3, 0x1}}, {0xfbff, 0x62, {0x1, 0xffffffff}}, {0x80, 0x4c, {0x1, 0x400}}, {0x8, 0x3f, {0x0, 0x3ff}}, {0x5, 0x3, {0x1, 0x5}}, {0x4, 0xfffc, {0xf1bc3147f7e00555, 0x100}}, {0x7, 0x9, {0x3, 0x6}}]}}}]}, 0x4bc}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000884) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000000c0)={0x0, 0x0}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_FLINK(r7, 0xc008640a, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f0000000140)={r5, r8, 0x3}) r9 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r9, 0x0, 0x30007, 0x0) 05:44:41 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:41 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x91010000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) 05:44:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:41 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x97ffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0xfeffffff00000000) 05:44:41 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xa0000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:41 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xb6000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:41 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:44:41 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xb9010000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:42 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xba020000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:42 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xc0ed0000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 847.890673][T21824] gfs2: can't find protocol lock_no+ock 05:44:44 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:44 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xc9030000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:44 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SIOCAX25GETINFO(r5, 0x89ed, &(0x7f0000000000)) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:44:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) 05:44:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0xffefffffff7f0000) 05:44:44 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xe4ffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:44 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xecd17f0a, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:44 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xf4030000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:44 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xf6ffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:44 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xf9fdffff, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:45 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 05:44:47 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:47 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xfa010000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:47 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r3, 0x4b33, &(0x7f0000000040)) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r4 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x30007, 0x0) 05:44:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:47 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xfcfdffff, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) 05:44:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0xffffffff00000000) 05:44:47 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xfdfdffff, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:47 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xfdffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:48 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xff000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:48 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) getgid() r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) dup(r4) r5 = dup2(r4, r3) ioctl$UI_SET_FFBIT(r5, 0x4004556b, 0x62) r6 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r6, 0x0, 0x30007, 0x0) r7 = getpid() sched_setscheduler(r7, 0x0, &(0x7f00000001c0)) r8 = syz_open_procfs(r7, &(0x7f0000000040)='fd/3\x00') ioctl$UI_END_FF_ERASE(r8, 0x400c55cb, &(0x7f0000000080)={0x6, 0xea1d, 0x101}) 05:44:48 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xfffffdf9, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:50 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:50 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xfffffdfc, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:50 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040)='wireguard\x00') getsockname$packet(r1, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0}, &(0x7f0000000880)=0x14) sendmsg$WG_CMD_GET_DEVICE(r1, &(0x7f0000000900)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000008c0)={&(0x7f00000019c0)={0x624, r4, 0x100, 0x70bd25, 0x25dfdbff, {}, [@WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r5}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r6}, @WGDEVICE_A_PEERS={0x5e8, 0x8, 0x0, 0x1, [{0x24, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0xfff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xfffffffb, @dev={0xfe, 0x80, [], 0x12}}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @empty}}]}, {0x374, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x3f}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0xff, @mcast1}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2b}}}, @WGPEER_A_ALLOWEDIPS={0x19c, 0x9, 0x0, 0x1, [{0xf4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x25}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x38}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_ALLOWEDIPS={0x190, 0x9, 0x0, 0x1, [{0xdc, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @remote}}, {0x5, 0x3, 0x1}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, [], 0x1}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3d}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x2}}]}]}]}, {0x174, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x144, 0x9, 0x0, 0x1, [{0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1d}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g='\x97\\\x9d\x81\xc9\x83\xc8 \x9e\xe7\x81%K\x89\x9f\x8e\xd9%\xae\x9f\t#\xc20xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:50 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xfffffdfd, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0xffffffffff600000) 05:44:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 05:44:50 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xffffff7f, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:50 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xffffff8c, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:51 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xffffff97, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:51 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f0000000140)=""/113) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$int_in(r5, 0x5452, &(0x7f0000000100)=0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$FS_IOC_SETFSLABEL(r7, 0x41009432, &(0x7f0000000000)="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") r8 = accept4(r4, 0x0, 0x0, 0x0) splice(r0, 0x0, r8, 0x0, 0x30007, 0x0) 05:44:51 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xffffffe4, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:53 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:53 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xfffffff6, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:53 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 05:44:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:53 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:53 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xfffffffd, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 05:44:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x9, 0x940) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$inet6(r5, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:53 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8, 0x141080) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKIOMIN(r5, 0x1278, &(0x7f0000000040)) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:53 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:53 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x85ffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:54 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) r4 = getpid() sched_setscheduler(r4, 0x0, &(0x7f00000001c0)) r5 = getpid() sched_setscheduler(r5, 0x0, &(0x7f00000001c0)) ptrace$cont(0x18, r5, 0x800000000c9, 0xfffffffffffffff8) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@private1={0xfc, 0x1, [], 0x1}, 0x4, 0x2, 0x3, 0x4, 0x200, 0xfffa}, &(0x7f0000000080)=0x20) 05:44:54 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0xfffffffffffffffc, 0x10) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) mount$9p_rdma(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d726f72743d3078303030303030303030303030246532332c73713d3078303030303030303030303030303030332c72713d30783030303030d530303030303010306561312c73713d3078303030303030303030303030303030392c72713d3078303030303030303037666666666666662c72713d3078303030303030303030303030306331312c72713d3078303030303030303030303030303030312c6c6f6f73652c64666c747569643d0000000000ab08e10f738f6a2184f5fbc879000000", @ANYRESHEX=0x0, @ANYBLOB="2c63616368653d6d6d61702c72d5a328b80b36bef630302c7063723d303030303030303030303030303032303000000000686166c5c2008334288c94f061292c000000000000001000000070b1f1b7c4aed1f36825ecfdedc9a31bf82c111d1e03000000c304c7f6cbe392e9d411fe460d875a91e75e00000000000000c817b761275c574d1bed3a081b42b2af0ded6588091a829957d09615b5afd1228151db47b80f0257119188fd351e352bbaee5678678eb9f137b39111696ebe61fe4f7cd0e1000000000000000000"]) ptrace$cont(0x20, r3, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) 05:44:56 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x10000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:56 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = syz_open_dev$video(0x0, 0x6, 0x2) r4 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r4, 0xc058565d, &(0x7f0000000080)={0x6, 0x0, 0x4, 0x400, 0x6, {}, {0x4, 0x1, 0x2, 0x4, 0x81, 0x1, "8dd8cb14"}, 0x2, 0x1, @fd=r5, 0x1000, 0x0, r3}) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000500)=0x6e) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r8}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0xa, 0x0, 0x0, @local}, r8}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r6, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r8, 0x10, 0x0, @ib={0x1b, 0x2, 0x7f, {"fc6ab6e22582d5e24b41dccb3032db64"}, 0x10001, 0x7, 0x4}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000200)={0x5, 0x10, 0xfa00, {&(0x7f0000000000), r8, 0x1}}, 0x18) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r9 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$TIOCGPGRP(r9, 0x540f, &(0x7f00000002c0)) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r10 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r10, 0x0, 0x30007, 0x0) 05:44:56 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0xff}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 05:44:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0xc) sendmsg$AUDIT_USER_TTY(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xb0, 0x464, 0x1, 0x70bd25, 0x25dfdbfc, "71e9e593d44c50f8164cb1c43bf0c057acbd70faec0f4d161db8b3cbdaa621615b91cb1f1e0ee2acadcc7ff359aeb02560a4a884f6147a5aa8450112a87ebe8e23b89ca57e4ad62a94283f253d18879880edbdd5da0f5cb4c6d6761a014b302ac122eac82ea75f6047de2ee28c981a8b5771c88d0a762c06620cd56804e3e582a5ab862983295655d7c797d9ecfdf68a697f129a0f9ccfdf80a71f13a2", ["", "", "", "", "", ""]}, 0xb0}, 0x1, 0x0, 0x0, 0x20040000}, 0x40) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) r4 = getpid() sched_setscheduler(r4, 0x0, &(0x7f00000001c0)) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:56 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x400000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x100, 0x311400) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0x80045500, &(0x7f0000000140)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x18100) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f0000000080)=@v1={0x0, @aes256, 0x2, "f2189d972ebcf46c"}) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x8) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x6305, 0x0, 0x1000, 0x380052) bind$llc(0xffffffffffffffff, &(0x7f0000000180)={0x1a, 0x334, 0xff, 0xc0, 0x5, 0x6}, 0x10) tkill(r4, 0x25) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xf, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) 05:44:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@hyper}) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$int_out(r3, 0x5462, &(0x7f0000000080)) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 05:44:57 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xedc000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:57 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x2000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:44:59 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:44:59 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)={0x18, r3, 0x1, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r3, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x8}]}]}, 0x30}}, 0x80) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000440)="00df00fcffffffffffffff0000000000", 0x10) r7 = accept4(r6, 0x0, 0x0, 0x0) splice(r4, 0x0, r7, 0x0, 0x30007, 0x0) 05:44:59 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:44:59 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newaddr={0x20, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}}, 0x0) 05:44:59 executing program 1: 05:45:00 executing program 1: 05:45:00 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xe000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:00 executing program 1: 05:45:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:45:00 executing program 1: 05:45:00 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x100000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:45:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$OSF_MSG_ADD(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYRESDEC=r1], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x25) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r5, 0x0, 0x0) 05:45:02 executing program 1: 05:45:02 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x200000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:02 executing program 2: 05:45:02 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:45:03 executing program 2: 05:45:03 executing program 1: 05:45:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x0, @empty, 0xfe12}, {0xa, 0x4e24, 0x1ff, @local, 0x1}, 0xffffffffffffffff, 0x1}}, 0x48) prctl$PR_SET_PTRACER(0x59616d61, r3) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(r1, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x25) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$NBD_CLEAR_QUE(r6, 0xab05) 05:45:03 executing program 2: 05:45:03 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x300000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:03 executing program 1: 05:45:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:45:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000080)=0xc) keyctl$get_persistent(0x3, r4, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f, 0x8, &(0x7f0000000640)=[{&(0x7f0000000140)="655d4bf4137f86fc057ad73a15e384fdb18c76d43b7025394d5c3caa7f81c73de7272601f5c5cb031252289bd02fa15087534920f98c94e0c17e604484b0f3b1b30c06a3a2a2b3275f3307587c0682e223ea2cee02050152c9e585fa5bb8262087903f119d3e69fabaef57c75d45f3a4878dcd886abf0d89524a876b8f794003e1c46cbe0668904fa1d0ae1b23ed6809543abffcc05e2368b4c8acafbb802788f3b0b78d55f0ac27e201e1088677730fd811336c2b10ff47a3faef91e3c791591f02c8241c86e3e866b19bd83894f4422ff5a3c8d9a4eea8babcd7b6f74be969358c63a49106a4e261e6f62314f2e7466c", 0xf1, 0x5}, {&(0x7f0000000240)="5288c02b7435f38d82338b2de7248b53e22121e31c35c83eba9a", 0x1a, 0x100}, {&(0x7f0000000280)="afd7039fd969f599b6c55cf81d02098ac89e15b14d", 0x15, 0x100000000}, {&(0x7f00000002c0)="dd08c3b0a24d366b0ac101", 0xb, 0x7fff}, {&(0x7f0000000300)="174b78238cc6c1d944d4ab075a6b30a30521e2d5eb80c042574042199ac798dbf4e2e65ecfbac07e780a3a7030246ad426ba319c08fac7960158aa42b69d7f39a7aaae", 0x43, 0x20}, {&(0x7f00000004c0)="55a98551e2579056d6c5db5b92742fe0750782722e4a0f20aecfc46e650260eea408f56c2695740791f120031e47551969e93013da6b28fa39a995cc0da9615fe1ff75f15625f9b42a33a2536089cf06888819fbf84af6872e7d47e2dc85178ad48f9abee33a81f312ae9494d84920d240c50abcbf368ab4253effe31d91f46e654fdbf8659e7c763c0f62ec3b69ff9fb7c39a5727f1bcfb7118ffe1690c07f431918a770b1e20957b6aa3e9dd037fbddac35a9bd4279aeafe7466b3a9edfa34e63f1bc7a909b1d66f81", 0xca, 0x2da6176e}, {&(0x7f00000005c0)="03d26f4bc0bc3167918e9e5544471aa232c90d85d1b086497b1c8d98ccf49976774184e629f3542b", 0x28, 0x3}, {&(0x7f0000000600), 0x0, 0x3}], 0x1c000, &(0x7f0000000700)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x3}}], [{@dont_appraise='dont_appraise'}, {@smackfshat={'smackfshat'}}, {@pcr={'pcr', 0x3d, 0x31}}, {@smackfshat={'smackfshat', 0x3d, 'selfppp1}/\\cgroup'}}, {@dont_appraise='dont_appraise'}, {@pcr={'pcr', 0x3d, 0x22}}, {@smackfsdef={'smackfsdef'}}, {@fowner_gt={'fowner>', r4}}]}) r5 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x8000026) ptrace$cont(0x18, r5, 0x0, 0x0) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r5, 0x0, 0x0) 05:45:06 executing program 2: 05:45:06 executing program 1: 05:45:06 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x400000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:06 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:45:06 executing program 2: 05:45:06 executing program 1: 05:45:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101000, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:45:06 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x500000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:06 executing program 2: 05:45:06 executing program 1: 05:45:09 executing program 1: 05:45:09 executing program 2: 05:45:09 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x600000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, 0x0) ptrace$cont(0x20, r3, 0x0, 0x0) 05:45:09 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:45:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e04000056008109e00f80ecdb4cb9f207c804a00d00000002002efb0a0002000a0ada1b40d805000300c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) 05:45:09 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000002c0)={0x0, @reserved}) 05:45:09 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x700000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socket$inet(0x2, 0x6, 0x2) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x287100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, 0x0, 0x3fffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, &(0x7f0000000040)=0x5, 0x4) tkill(r2, 0x25) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x11, r2, 0x0, 0x0) 05:45:09 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9f"], &(0x7f0000000340)=""/142, 0x1, 0x8e, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000009904000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4802, 0x0) 05:45:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'veth0_to_bridge\x00', {0x2, 0x4e24, @local}}) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000040)) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x25) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) 05:45:09 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR, @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[], @ANYBLOB="0f00000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[], @ANYBLOB="ffff070000000000", @ANYPTR, @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR, @ANYBLOB='M'], @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00`\x00'/24], 0x48}, 0x0) syz_mount_image$xfs(&(0x7f0000000680)='xfs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x5, &(0x7f0000000c00)=[{&(0x7f0000000880)="487e78d91c2fb1c93b1bada1c911c80e2d675d391bfbe6cdf9f10f83065a2ff1d0f3e233e6953361cdb9111fe174e2114808426d0b416629fc55ba03444842aa1640581a6706927d7f24d0063fbfef52434e39cd8d8fc0fbbc363114c10da481187f4355a373edc92e65379505e15166094384c58f70c97260173fc22fc3e8dc6850297fdc32821b8de13ba306e3510e68d431ffe99a22926e2278e10f0cda629f170b096ab06a29ae52759dfa0a8fcc9b014aadb3fe38dfa0a4125f3ec56dc5339504baabfafad5dff5797df216f2a4c499ea7071258618d11bd46fe99185d43d52bbb389a872c24c2e8027ddc679", 0xef}, {&(0x7f0000000980), 0x0, 0xffffffffffffffe1}, {&(0x7f0000000a40)="517de589a6c032ab8c22f940fea02866fd4337a3b7a2fafb1204c879a3744f24013001e46f4bbb859d50ae6bd35502c60710c04d717af64851a15fb5970d352dc182e870d42b11ec60a4857ab84ce7a60993b6e357d25462b487bc7f97fdc9e06a1641", 0x63, 0xecc5}, {0x0}, {&(0x7f0000000b80)="43298ef5797ef8b148cd1e414c6d0f7c2722e354dddeb30533a8bd34ea3f2e073e06341e5d91f9fca85e3494e451f8ff2a130f74099eb984780625e403b2cbe1e89341ee62348bd3f89e74d82c10d4126cfbbbf3927aa5a3eead9eb1f31aa33200", 0x61, 0xd9ac}], 0x10000, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"]) 05:45:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x402200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r4 = shmget(0x3, 0x4000, 0x78000000, &(0x7f0000ff9000/0x4000)=nil) shmctl$IPC_STAT(r4, 0x2, &(0x7f0000000100)=""/51) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000080)) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x634081, 0x0) [ 875.199907][T22409] BPF:hdr_len not found [ 875.259599][T22409] BPF:hdr_len not found 05:45:09 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9f"], &(0x7f0000000340)=""/142, 0x1, 0x8e, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000009904000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4802, 0x0) 05:45:09 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x800000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 875.302415][T22428] xfs: Unknown parameter 'appraise' [ 875.379600][T22439] BPF:hdr_len not found [ 875.380655][T22428] xfs: Unknown parameter 'appraise' 05:45:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, 0x0) ptrace$cont(0x20, r3, 0x0, 0x0) 05:45:12 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9f"], &(0x7f0000000340)=""/142, 0x1, 0x8e, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000009904000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4802, 0x0) 05:45:12 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x900000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000001580)=[{&(0x7f0000001780)="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", 0x271}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x6a08, 0x11, 0x0, 0x27) 05:45:12 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 877.936237][T22473] BPF:hdr_len not found 05:45:12 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xa00000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r4 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) vmsplice(r4, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0, 0x15}, {&(0x7f0000000380)="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", 0x14c}], 0x84772e1b0d2e604e, 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x20004880) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x20, 0x0, 0xd0, 0x559) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) r5 = getpid() sched_setscheduler(r5, 0x0, &(0x7f00000001c0)) ptrace$cont(0x20, r5, 0x0, 0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) 05:45:12 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xa7fd1ec00000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 878.350036][T22473] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 05:45:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000001580)=[{&(0x7f0000001780)="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", 0x271}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x6a08, 0x11, 0x0, 0x27) 05:45:12 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xb00000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:13 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9f"], &(0x7f0000000340)=""/142, 0x1, 0x8e, 0x8}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000009904000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4802, 0x0) 05:45:13 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x8, 0x0, &(0x7f0000000080)=[@increfs], 0x0, 0x0, 0x0}) [ 878.773708][T22531] BPF:hdr_len not found 05:45:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, 0x0) ptrace$cont(0x20, r3, 0x0, 0x0) 05:45:15 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xc00000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000001580)=[{&(0x7f0000001780)="a45d4e26c6fadcbd663ccd6c0aca006b802c18d131b5427b3d4515dee8f10570a5923f3f543435278f94c3f8f0d4c35488ecfb1bd630b2e1e0e4247bb44938f03d603b27e44942ddcd3f11f086e6bf39ab074b690284b6d6aff6cc1e736b32f7d781c315bad312c6e8062089abe9838cd011d5227aa050589d2e5f34e10165336747bc2156f8e2570a4a76d4af1ef57edb31f57834ba2486c9f253a1737d59d15a11571414ec61c17dc20d9974e58cf2925c7c6e56216d4e35e39a9977e27e21450596008761c86e216667c6f72b64fdcad802718d16b390d4b4dc05bffb838b7e6831cc53b65b1de0bbf6af1311a722a80065913d37bea8c988e3b3f05ab1eb02d6b52a11191f1ced75b0200502e5f2881204104e152b5644da9d26301ed8905156a069c61444d44d82c135ff4f20574247a4a5cc963e3c395a029125ccae1f1564a3e28e06b1a08e47bd1a9621edf1003d167cbdfc0be2a4914908198575a688a38d24bdc9881ced9fe04e119a87b9286ea15aa168163a9650a26a926c571f2f0e0b2102de1fd1a6920cb71d846f02b2c23f80a3c0116b48d14925e69c4a65126e544995e0cb5fefaa870ddd66e8eb47a3be8f07fcd361dcf144c865fe355e3b98e6d4694d74aa6d3d75c7c568feabdcb483c5c22ca40782cd2dea789dc677c603227878c369a3b7a3204bf1bc9b1fdb1e00447152e854095b9527d6e980b1bac1b1ec6e9706084ac77b383bd4e555a11410f6a830966ec9b0fa58abf22238638ea06bad5baa2b55174b0db5108d79849c1028550fb3c713875478805f961b04f94a70dcde91c0d2ea2bcd0d2dd83b09cd6a0975db4257bf599f7d82462f914e4e641aa399ba721e72fd53d21af1f5d2", 0x271}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x6a08, 0x11, 0x0, 0x27) 05:45:15 executing program 1: syz_emit_ethernet(0x6a, &(0x7f0000000400)={@multicast, @dev, @void, {@ipv4={0x8864, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @address_request}}}}, 0x0) 05:45:15 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:45:15 executing program 1: syz_emit_ethernet(0xe, &(0x7f0000000400)={@multicast, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @address_request}}}}, 0x0) 05:45:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000040)={0x9, 0x466, [0x400, 0x8, 0x6, 0xd4, 0xff], 0x5}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$apparmor_exec(r5, &(0x7f0000000080)={'stack ', 'vboxnet1\x00'}, 0xf) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x10000000, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:45:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x6}]}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 05:45:15 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xd00000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0xffe) 05:45:15 executing program 2: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x44000, 0x0) 05:45:15 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)) 05:45:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) 05:45:18 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR, @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[], @ANYBLOB="0f00000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[], @ANYBLOB='M'], @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00`\x00'/24], 0x48}, 0x0) 05:45:18 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xe00000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x20000844}, 0x4000810) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xfc00, &(0x7f0000000180)={&(0x7f00000007c0)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}]}}}]}, 0x48}}, 0x0) 05:45:18 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 884.087545][T22610] rdma_op 0000000032dc57e1 conn xmit_rdma 0000000084622216 [ 884.107439][T22611] batman_adv: Cannot find parent device [ 884.118982][T22614] rdma_op 0000000071490c44 conn xmit_rdma 0000000084622216 05:45:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x4b0, 0x0, 0x0, 0x0, 0x2f0, 0x0, 0x418, 0x418, 0x418, 0x418, 0x418, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x0, 0x2d0, 0x2f0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@unspec=@bpf0={{0x230, 'bpf\x00'}, {0x1}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@unspec=@connlabel={{0x28, 'connlabel\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x510) [ 884.211143][T22627] batman_adv: Cannot find parent device [ 884.245078][T22631] xt_bpf: check failed: parse error 05:45:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x4, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:45:18 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xe03000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x2) 05:45:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x44}, {0x6}]}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:45:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000001580)=[{&(0x7f00000016c0)="7507747dd9bcc24bc9201e9ab3851c2352e456a59990f36599f89b848cf73dba62e0ee4d214b4ea417ba047283d923aa85916b00b017843fb4dd334d8bf4ab10c73e81992e6fd44138b794415b5cc26106b7db3a6b8796ce064e031f8f35e3f749cb730bb38dcfb2cf9155bf417d427a6ea7c2284e317a87736058c4140d8fe5d67450f4e38f91d2457b1f20672e51d2a11266", 0x93}, {&(0x7f0000001780)="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", 0x23e}], 0x2) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x6a08, 0x11, 0x0, 0x27) 05:45:19 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0xf00000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) 05:45:21 executing program 1: 05:45:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r3) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000240)=[r1, 0xffffffffffffffff, r2, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff, 0xffffffffffffffff], 0x8) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x25) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000140)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0xf}, 0x5, 0x2, 0xff, 0x6, 0x1000, 0xc5e}, &(0x7f0000000100)=0x20) ptrace$cont(0x20, r4, 0x0, 0x0) 05:45:21 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1000000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:21 executing program 2: 05:45:21 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:45:21 executing program 2: 05:45:21 executing program 1: 05:45:21 executing program 1: 05:45:21 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1100000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:21 executing program 2: 05:45:21 executing program 1: 05:45:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) 05:45:24 executing program 1: 05:45:24 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1200000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:24 executing program 2: 05:45:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) syz_emit_ethernet(0x3f7, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)={0x1, 0x2, [0x21, 0x3e0, 0xd85, 0xbc1]}) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x200a00, 0x0) ptrace$cont(0x20, r3, 0x0, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x212000, 0x0) ioctl$VIDIOC_G_INPUT(r4, 0x80045626, &(0x7f0000000100)) 05:45:24 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:45:24 executing program 1: 05:45:24 executing program 2: 05:45:24 executing program 1: 05:45:24 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1300000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:24 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f0000000000)={r3, r2}) 05:45:24 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) r0 = gettid() tkill(r0, 0x29) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) 05:45:27 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1400000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2000000012, &(0x7f0000000000)=0x7ffffffffe, 0x4) 05:45:27 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000086fff4)) r4 = getpid() r5 = getpid() kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f0000000000)={r3, r2, 0x10}) 05:45:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:45:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 05:45:27 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:45:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdbc1ab3bf3f7d18d1ece8c5b2f4a93f82c09e6657fbc6338e7fcc5056f69e751011b5179486644d4f8882e62cc0faf097b79c94e5d69fbb68ec0d9460505008ad17a4ab946251802af62be34fcfe13ad57c0a53d163629c31c7ce9372c962c2b76074b72143b8824e683ef5fd7f1d2b677ab527e855410b3f2c755831bc1fadb85fe8637bab29e6630", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000040)={0xdc23, 0x9, 0x4, 0x800, 0xdff8, {0x77359400}, {0x5, 0x0, 0x7, 0x90, 0x3f, 0x0, "26563701"}, 0x3, 0x4, @userptr=0x7ff, 0xb0f7, 0x0, r4}) sendmmsg$alg(r5, &(0x7f0000002280)=[{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000100)="55612a2df92b7910263d229a14aa93", 0xf}, {&(0x7f0000000140)="7c1d6ded7e2b028f6e77e9f1da2fd7080ce983f0447b36d3ef82bdb939b92865278623916a538eb3f91395228bb77d5e1499ca6ad5174b42ac9663fed5e376a5ce29194b7e13a0284eb83dfd3ff28899024deff71d6f4e2b34e8fa950565210374ee327f927f5cc38cafcebcd8607b878e893b1f1132346644d4cc604f2886fedde636a80e9b6060a552bc07e829680a863c2993fc37ac96e748d47d4cfe7fe2", 0xa0}, {&(0x7f0000000200)="700fb3232b8a0f0be75f9678bf052854dc9c35691794e437b059d47e35c9b352243ed93baefd4eda15f076b5fa27c3e9e6ca494f7a3c06dc0fc94ecb72aef198ccb935a6f636da98ad79b26906569630dabe890d7a21fc0ba81191cfdc56511108e9354c8a7583aaf360e41ce5697f74c9e53db0b2b3e429346f11093b4d5258fd9c48c9027a9e4263f250b1bfb0dd40c1840db434306eb70f863a849e28a934e5c956eadf59fa26745a0d8dba6f3a38d17b5270a40db98bfb895c4ee7f0435e09f27ae5", 0xc4}, {&(0x7f0000000300)="41e394ea98761c492a9d99e610566501508cc3eac3270127138e93b3076d3062ee1c743ab39fec8c99d13a4ca62e961001", 0x31}, {&(0x7f00000004c0)="f3331174d5908bbb46e49c7c52dc227c9e66a56dbe5022c8dc6e2b052162f31870ab895b3b8136b8f0ac8353ed019ca830aca9afa74d3efc17c99adf6ed84778fceb450256a9c61c9b2713fbbe6f3eb47dba45e3f442c9a444d2042bb4124a196c4a2210da9a3bdb79c6c0ddae796777f475ddf17c9247178bd45aa8254e76ab917b3497a683bfb98a9f122376767312f698ff738ec9e78635a62f4e81a45865c56396bbf7462e542cf678", 0xab}, {&(0x7f0000000580)="1fdc9caecb22d5adf6f0930d796ea4ba90faad09d7dd28b6fc7de2df1bf7aa652b61645ad17433a385294dd53a26ea7a9cbd50c0fc40da95f028990969fa24dc444149d8c0cb91e8a6dff6b3039461c4ffebe082c905d817e5da75f4e6d30d418f8c44f581016bf200d9e7", 0x6b}, {&(0x7f0000000600)="12574144801255d7ed50d07e8c681df9c2fac36e9fff35c47a4cb36a1f358150b33c2923a70e93df57b5e89f5dbd1c57e75601b08383286e9653e073b2836fe8790a6dbd971b030a5304f5ecd0cfe2101213a8c2d8727376ed77d0a5f20eabf88e074ee6adbd282f15bb6b83c5882234be16c42ca5b83e1d7e71cd0e34c6a6ef3340c53f84a489983f48fe8e7d6b80c8fcfb57c16c1c", 0x96}, {&(0x7f00000006c0)="b6d03bce4df28309c4fdeeb8f200dd2abee2437a09912461059eaddf16894ca60ef4ac3095c3452b1977349cb1ad2971cfeb4e2bc8747d8adccb4e7d019e3d025fa2a55dca78210aaa16c8df7182f5b15b3f91be50ad2a08bcd18da64fbc01d6536a557f82ad71cf969edd733538df0b5e6ce59150ac0e7aa742dabb9d5b7f758637e0d5f26a6e8686e48695a12748530e00bad84f", 0x95}], 0x8, &(0x7f0000000800)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @iv={0x108, 0x117, 0x2, 0xf3, "cd1ef4eb01f4e494f7fdff210f27574f00c1c49b870c233c89c15b75cdd15bfbd50373052b196e62cdaef7232fc151766198f92bb07f93566cd07c54b7834d6068900c058ec017ebba95c6448d683547c1645e71f542f9ca887eda09ed4360829635db4715c40c8e2dd362d1924a028f2ba0fd713bf16495e37c6f72d66e17d5b2b772d7b12f2814ae30cf65c77e4c42b93abc9f2c6ecd9b243cf2595621f55b16f522e24191b114bc968330b3cf9bd52a2b8c2a86b376ab9457a2a84bd29e38be52e499b67e967e2ce5b7d3d14c359b7a58d7faf8023844a96b829088babacc7696891764939bb8dd361465afd0ea3fed8e4b"}, @iv={0x48, 0x117, 0x2, 0x2e, "5f566db931f9edf66edbe3f9346c14575f8c997345966c7883b3c7da60837746ea659663f0fffbf6a224e5121906"}, @iv={0x38, 0x117, 0x2, 0x1f, "781476122bf4593a79f597fe3673cb19a32747fbab8e4ef6d2c615d5224e57"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}], 0x1e8, 0x20000000}, {0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000a00)="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", 0x1000}, {&(0x7f0000001a00)="ab9dcec10cec60c951169d59b32d0aa70fb3ceee9477361c144531711adb5349f437d3dc05997bdfb9a878354d1199dd9b8b48a51ac296f9429ef271b849180770d91b815ac1271f5f193021fc65fa7fa1697cc8127473e6f9773250e4c7edfda0b51fa32db0a1f89aeb3826c45ef0fb0d74e36025aa37341f19658a8b8b65d9fdea77404d4363fd56952448aaded44040c5a14df17a57cedc68adbac45fae3924fef26896ea7d8b381b45e5a70a9aafc700b3fa47bba990b57f3145c643008f2c", 0xc1}, {&(0x7f0000001b00)="31ef8e50bca5ad9010c7b4fe5c652804b2c083512fc45ee7d85cac765e3bc793f72a77ab9f57034961a1f0e31784388a4447f1a5b01274f7869e1b67fb9d18a577454dec42f0081e12b032d7bffabc90e1c9b1aa9650ec424d30e7fc9b09e7e3231ce1de633442c018045934cf40a02e3e5b17d5c517f38eba1aae93970c598326f67f959a24015927", 0x89}, {&(0x7f0000001bc0)="968f17a180c7006f0c3b74becab12600f58d19545c43c884d4108406d258efb2b502bff2a87860610691e720a5e00a4bc0cadca9554cb696fb9c2d5c437a5567808318deec0b4f7fff17278f90111d02efaabe28257f2124761f3ee7b264e28d441df3ad275cd1cec68868fa20e902e2fcf2eec9ca66160659a5ae451a65f6e8e08bdfb9b4ec2c80f473464006f1b7f59df9bf2d914c3fa9ad9102501c508d4cff7a696e32c497ea9d9882ed7820", 0xae}, {&(0x7f0000000340)="2bc838716cb9f3d895bccda67a09240b888aaf6f9f065fc2913c8614c1e08c14686bc0efaa883ed648", 0x29}, {&(0x7f0000002140)="9d624727e0f2a79c9d8af9f7bdfe0b94d9325ca7ebc6e3af0be6dcb9b4708aad0e5e11af627afbdf8c0ad7625cfc1f89ad286a8636", 0x35}], 0x6, &(0x7f0000001d40)=[@assoc={0x18, 0x117, 0x4, 0x1000}], 0x18, 0x400c801}, {0x0, 0x0, &(0x7f00000020c0)=[{&(0x7f0000001d80)="819fe226a2", 0x5}, {&(0x7f0000001dc0)="dfc58c23581a097ec634313ebea6d6086ff76cec46f935ee0de6a65c82c5409b05729f132baf982f3924f58a90bf6b6c73d19c98661b9ca86f23aea062834263c0205dc9546cb9feaf2c5910e51056df531373029b3520bf2f3ad0803ef3d257cb2dfd17ea831518bcf11eda31f8bb3e46b0a8e81a1b115a4bc6b0ca8ab24bf2e30058b04fcf05e27d", 0x89}, {&(0x7f0000001e80)="d08daedd250ff41bfd6f720adb8310a70536bd", 0x13}, {&(0x7f0000001ec0)="9ffef0c20570224c4dc8bf3df13c6c1e8073fbb703352f2717d214c083ee73e3f15a5aab3ee00216127b9025e24a3aa7c2ec853c1d4b5ae39b3af1a8c6832bae5e5e8dbe9a5676b20cb734a56a09f632ed3f8b27a272ece257d4d1f43f9ba89fcaae72c3110cc69aa33c5b72238ab71e20a3f91e31fd0c814fdfd255b3308b96edec81e11e3747340a6b0b1855583d8539a08338eb0dee03d61c8b864c85c1d015641d3b2b20af427b9e53188602566898be2a5afda11f540d635ca5", 0xbc}, {&(0x7f0000002180)="a9602a9996d24d1b73b525e7be77ea36b7384d97e99b3da84c023cdc21a27a666b30ca0d903a5042fe2b9258cfd03ea00a5c2a7e15586ddd9d14faf5cd809ca6f0750a215614214ff5e8078feac19c17c6a8cc7ee4364bb1283d05be5c36b06afd6ac01ca94905854c78a51f143aed5ca6a78845f844c1ce7b36d828ba50aa83ab137cdf5dd2d91900", 0x89}, {&(0x7f0000002040)="fd3150339b4d64be4f4fd6dd8a73ec44480ed6cae5dc767e616ff22d1280b91cf8d52a628b4ed6954f7cc67d5047b19a6d218605b2fdacaed1808df92c0bfc083cdce9499c366995cf39be93cd91f1db577ea67ccb65caf209e28034dbd82f", 0x5f}], 0x6, &(0x7f0000002600)=ANY=[@ANYBLOB="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"], 0x2a0, 0x4000}], 0x3, 0x24008010) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) 05:45:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010aeed, &(0x7f00000001c0)) 05:45:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) fgetxattr(r0, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)=""/57, 0x39) 05:45:27 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1500000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:27 executing program 1: getuid() mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="ff3f62e668fb8723f0fe5b45c0696c6175881a982f00d7"], 0x17) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 05:45:28 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1600000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 05:45:28 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1700000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:28 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000001580)=[{&(0x7f00000016c0)="7507747dd9bcc24bc9201e9ab3851c2352e456a59990f36599f89b848cf73dba62e0ee4d214b4ea417ba047283d923aa85916b00b017843fb4dd334d8bf4ab10c73e81992e6fd44138b794415b5cc26106b7db3a6b8796ce064e031f8f35e3f749cb730bb38dcfb2cf9155bf417d42", 0x6f}, {&(0x7f0000001780)="a45d4e26c6fadcbd663ccd6c0aca006b802c18d131b5427b3d4515dee8f10570a5923f3f543435278f94c3f8f0d4c35488ecfb1bd630b2e1e0e4247bb44938f03d603b27e44942ddcd3f11f086e6bf39ab074b690284b6d6aff6cc1e736b32f7d781c315bad312c6e8062089abe9838cd011d5227aa050589d2e5f34e10165336747bc2156f8e2570a4a76d4af1ef57edb31f57834ba2486c9f253a1737d59d15a11571414ec61c17dc20d9974e58cf2925c7c6e56216d4e35e39a9977e27e21450596008761c86e216667c6f72b64fdcad802718d16b390d4b4dc05bffb838b7e6831cc53b65b1de0bbf6af1311a722a80065913d37bea8c988e3b3f05ab1eb02d6b52a11191f1ced75b0200502e5f2881204104e152b5644da9d26301ed8905156a069c61444d44d82c135ff4f20574247a4a5cc963e3c395a029125ccae1f1564a3e28e06b1a08e47bd1a9621edf1003d167cbdfc0be2a4914908198575a688a38d24bdc9881ced9fe04e119a87b9286ea15aa168163a9650a26a926c571f2f0e0b2102de1fd1a6920cb71d846f02b2c23f80a3c0116b48d14925e69c4a65126e544995e0cb5fefaa870ddd66e8eb47a3be8f07fcd361dcf144c865fe355e3b98e6d4694d74aa6d3d75c7c568feabdcb483c5c22ca40782cd2dea789dc677c603227878c369a3b7a3204bf1bc9b1fdb1e00447152e854095b9527d6e980b1bac1b1ec6e9706084ac77b383bd4e555a11410f6a830966ec9b0fa58abf22238638ea06bad5baa2b55174b0db5108d79849c1028550fb3c713875478805f961b04f94a70dcde91c0d2ea2bcd0d2dd83b09cd6a0975db4257bf599f7d82462f914e4e641aa399ba721e72fd53d21af1f5d2a075bfd90044c562027ec840170b2d4b67adf68ed790a5ce5a49933f55c0df0b2a2ae252b5bf00b5ca0ec0005674ac62eee923cae59edeab59c1d0", 0x2ac}, {0x0}], 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xfff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x6a08, 0x11, 0x0, 0x27) 05:45:28 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x1f00000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 05:45:30 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="500000003000ffff0000000000000000000000003c000100380001000b0001006d690672656400002400028020000200000000000000000000000000000000000000000004100000", @ANYRES32, @ANYBLOB="04000600"], 0x50}}, 0x0) 05:45:30 executing program 1: getuid() mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="ff3f62e668fb8723f0fe5b45c0696c6175881a982f00d7"], 0x17) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 05:45:30 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x2000000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:30 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:45:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x8090) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, &(0x7f0000000040)) ptrace$cont(0x20, r3, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000080)={0x400, 0x8}) 05:45:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000800)={0x44, 0x1, 0x2, 0x101, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x14, 0x4, @dev}}}]}]}, 0x44}}, 0x0) 05:45:30 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22d54, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 05:45:31 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x2010000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) [ 896.750499][T22911] IPVS: ftp: loaded support on port[0] = 21 [ 896.949130][T22911] IPVS: ftp: loaded support on port[0] = 21 [ 896.983430][ T28] tipc: TX() has been purged, node left! 05:45:31 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x3e70010000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:31 executing program 1: getuid() mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="ff3f62e668fb8723f0fe5b45c0696c6175881a982f00d7"], 0x17) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 05:45:31 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x3f00000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 05:45:33 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x3f70010000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 05:45:33 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000400)=0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) socket(0x0, 0x8000000000000003, 0x1e) r2 = creat(&(0x7f0000000040)='./file0\x00', 0xb) write$P9_RREMOVE(r2, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fdatasync(r2) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x2a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x100000, r2, 0x9, 0xffffffe4}) write(0xffffffffffffffff, &(0x7f00000002c0)="ef8cf3cb48ce09e3925e2095af3c6e71fd2d08b94d5329e8f9b36a91a6bcd0925bfc63df96712d5e384eff542967e81167bfc4d6f5c0546f174c6319e07dc50e0e15e3232834f7eecba58199f8dc51524292c9cd98b845a9cba36899515827f5fef4c3de0f6ec8cd8d2cf3ca16f256bc69df5953403f117e236e7e5a6b6559b0346a831636e5e704d2bd96be4d3bd2d5e5", 0x91) 05:45:33 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:45:33 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r2, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4205, r1, 0x0, 0x0) 05:45:33 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4000000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:34 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000100), 0x0) r0 = openat$vcs(0xffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000380)=""/113, 0x71}, {0x0}], 0x2) 05:45:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x802, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) [ 899.652469][T23032] ptrace attach of "/root/syz-executor.1"[6825] was attempted by "/root/syz-executor.1"[23032] [ 899.670803][T23032] ptrace attach of "/root/syz-executor.1"[6825] was attempted by "/root/syz-executor.1"[23032] 05:45:34 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4070010000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:34 executing program 1: ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000007]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 05:45:34 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22d54, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 899.907755][T23054] IPVS: ftp: loaded support on port[0] = 21 [ 899.977860][T23054] IPVS: ftp: loaded support on port[0] = 21 [ 900.012760][ T2513] tipc: TX() has been purged, node left! [ 901.632137][ T2513] tipc: TX() has been purged, node left! 05:45:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x10132) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000540), 0x118) recvmmsg(r1, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}}], 0x700, 0x2, 0x0) 05:45:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) accept4$tipc(r1, 0x0, &(0x7f0000000040), 0x80800) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000100)="2718dc93acbc1c29086fc3a20e93e7a9eb049a326f104eb86aa26769ba040662a70a1f53c3c15b1ec8c836b658fb558c80e90232545e126a14d40ca6ecc0fd32ba6cddcd9e3117ca563babe3eebc70f2f4230d3445db166b6bb030d0775cf6a0e1d8b2e8bf471e6cd72f23fb4abc789f1df40477408eb8b5dc2db77e2715688fb9dbf800"/142) r4 = openat$cgroup_ro(r1, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r4, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xa0, 0x0, 0x9, 0x3, 0x0, 0x0, {0x7, 0x0, 0x1}, [@NFCTH_TUPLE={0x80, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x89}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, [], 0x1}}, {0x14, 0x4, @dev={0xfe, 0x80, [], 0x2a}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @private=0xa010101}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0xfffff801}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x1}, 0x0) ptrace$cont(0x20, r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000480)) 05:45:36 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc01812f4, &(0x7f0000000240)=ANY=[@ANYBLOB="000058080000000000000000000000000016"]) 05:45:36 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4170010000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:36 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="665307a60a05057b513c270500760036390000000000000000000471d28e4683f87b055009ac2843253c2dbd3a795b65fccfffb644d89c2d275747f1394390d833011d9dcf8223df094d12ec4546fdbbaf3fb308e69a9ac7a457822775051cbc2d42b0746d3b86367b8bb4a2fa7c4a5cf03f92d51d3676704e21953a4c82264f0380b028e9f00cdb", 0x88}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 05:45:36 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x2, 0x0, &(0x7f0000000040)) 05:45:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x110}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x400000, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(r4, 0x4147, 0x0) ptrace$cont(0x20, r3, 0x0, 0x0) 05:45:36 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x12fb, 0x0) 05:45:37 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4270010000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:37 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) 05:45:37 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x3, 0x7, &(0x7f0000000000)) 05:45:37 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4370010000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f00000005c0)=0x80000000, 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x380000, @mcast1, 0x4}, 0x1c) sendmsg(r1, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="10000000000000000000000000000000ee4575ce7ee71b8efd89c4a6c7fa90e1a54114bd7a1b45441c44cd70d4a8c956750167c09ffdc4631e9a80e8db6ba3b65c7eb4bf0cadf17f6019bf9b6d4856d314467d30fd617d33e82142fadd9deba702794e0d8e84479f10f2336b80fb943471ee0e497dfa545cb8718c8b8799734f29e4b386b2ae54bcf521dc2d56db3595123cf38ea608aea99a01da1a7a6009759047a11652c9302f97fc81b00278d0573712ce0e04939c172f0507631cfd798b87d1c0"], 0x10}, 0x0) 05:45:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") syz_genetlink_get_family_id$gtp(0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/user\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x179, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r6, @ANYBLOB="00000400f1ffffff0000000008000100687462001c00020018000200030000000001000000001e000800000000000000ce204b70759690626033cefc9f29f0a316c47d6335ffa3a711759f0cc96a64a78d1424d7fbb9ce04556e206ac506b1011a61efc33a09ebbb2af603af78d8b1c564eebfed008c914bfbadcd782389f49d356138458f10539554386cdc1a5949ec127445ab7ec5cb7e75d4565ff6b5bcfa2e670c666d929fd82579b295"], 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=@delchain={0x70, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x900}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x40, 0x2, [@TCA_CGROUP_ACT={0x3c, 0x1, [@m_xt={0x38, 0x0, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'mangle\x00'}]}, {0x4}}}]}]}}]}, 0x70}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=@delchain={0x24, 0x29, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x900}, {0x0, 0xffff}}}, 0x24}}, 0x0) 05:45:37 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x54, 0x0, 0x4470010000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB='lockproto=lock_no+ock,locktable=.']) 05:45:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00000000008433df6d6f6b577d4eaaf2000007"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="7400000024000705000000000000000000010000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048fecd9912c9c7c5dbed64f3c3545aaf6e000085a4e4ebb5ef670000001e0000000000000000006784024412a1400b000000000100000000000000000000000000000000040020d841cc8c25f62c93cba4b2ab523a7f620e036e1cbf7756869487defe1cedfc4c3517cd1f95f20cfacb42bcc4f942068c64afbb96f835909f0c2d60d76cc1205e15d2a43ea475455a7e57d34deb16a7befc16cafbcd579ba8bdea6331f9ec0a43aa68e5145275100063ff3a65714924981e9cc3ba1355d76e4b311ab4384decb6920d7b0703f6fc0af2bb2eccbfb8d7aa604631e8e3b9ab4f54a9c84b02d6e6b5ec04ff42f1453a98a7cbea75a4ad17076e17be0dc712"], 0x74}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0xa}, {}, {0x8}}, [@filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0xc, 0x2, [@TCA_FW_CLASSID={0x8}]}}]}, 0x38}}, 0x0) [ 903.188183][T23178] HTB: quantum of class FFFF0900 is small. Consider r2q change. [ 903.263329][T23190] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.4'. [ 903.357839][T23198] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.4'. [ 903.529148][T23162] ================================================================== [ 903.537362][T23162] BUG: KCSAN: data-race in get_cpu_iowait_time_us / tick_nohz_idle_enter [ 903.545751][T23162] [ 903.548082][T23162] write to 0xffff88812c02030c of 1 bytes by task 0 on cpu 0: [ 903.555456][T23162] tick_nohz_idle_enter+0x8f/0x100 [ 903.560578][T23162] do_idle+0x38/0x290 [ 903.564552][T23162] cpu_startup_entry+0x14/0x20 [ 903.569319][T23162] rest_init+0xe4/0xeb [ 903.573400][T23162] arch_call_rest_init+0x13/0x2b [ 903.578349][T23162] start_kernel+0x82d/0x852 [ 903.582966][T23162] secondary_startup_64+0xa4/0xb0 [ 903.587976][T23162] [ 903.590488][T23162] read to 0xffff88812c02030c of 1 bytes by task 23162 on cpu 1: [ 903.598129][T23162] get_cpu_iowait_time_us+0xe5/0x170 [ 903.603426][T23162] get_iowait_time.isra.0+0x65/0x90 [ 903.608627][T23162] show_stat+0x633/0xa50 [ 903.612879][T23162] seq_read+0x2ef/0x940 [ 903.617038][T23162] proc_reg_read+0xb3/0x1b0 [ 903.621538][T23162] do_iter_read+0x33f/0x3a0 [ 903.626035][T23162] vfs_readv+0x9c/0xf0 [ 903.630118][T23162] do_preadv+0x129/0x1c0 [ 903.634355][T23162] __x64_sys_preadv+0x5e/0x80 [ 903.639030][T23162] do_syscall_64+0xc7/0x3b0 [ 903.643538][T23162] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 903.649420][T23162] [ 903.651751][T23162] Reported by Kernel Concurrency Sanitizer on: [ 903.657902][T23162] CPU: 1 PID: 23162 Comm: syz-executor.2 Not tainted 5.7.0-rc1-syzkaller #0 [ 903.666568][T23162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 903.676616][T23162] ================================================================== [ 903.684768][T23162] Kernel panic - not syncing: panic_on_warn set ... [ 903.691357][T23162] CPU: 1 PID: 23162 Comm: syz-executor.2 Not tainted 5.7.0-rc1-syzkaller #0 [ 903.700053][T23162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 903.710208][T23162] Call Trace: [ 903.713513][T23162] dump_stack+0x11d/0x187 [ 903.717875][T23162] panic+0x210/0x640 [ 903.721772][T23162] ? vprintk_func+0x89/0x13a [ 903.726365][T23162] kcsan_report.cold+0xc/0x1a [ 903.731048][T23162] kcsan_setup_watchpoint+0x3fb/0x440 [ 903.736448][T23162] get_cpu_iowait_time_us+0xe5/0x170 [ 903.741742][T23162] get_iowait_time.isra.0+0x65/0x90 [ 903.746954][T23162] show_stat+0x633/0xa50 [ 903.751222][T23162] seq_read+0x2ef/0x940 [ 903.755394][T23162] ? seq_hlist_start_head_rcu+0x60/0x60 [ 903.760950][T23162] proc_reg_read+0xb3/0x1b0 [ 903.765623][T23162] do_iter_read+0x33f/0x3a0 [ 903.770142][T23162] vfs_readv+0x9c/0xf0 [ 903.774235][T23162] ? __fget_files+0xa2/0x1c0 [ 903.778843][T23162] ? __fget_light+0xc0/0x1a0 [ 903.783440][T23162] do_preadv+0x129/0x1c0 [ 903.787692][T23162] __x64_sys_preadv+0x5e/0x80 [ 903.792383][T23162] do_syscall_64+0xc7/0x3b0 [ 903.796890][T23162] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 903.802875][T23162] RIP: 0033:0x45c869 [ 903.806775][T23162] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 903.826389][T23162] RSP: 002b:00007faef243ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 903.834805][T23162] RAX: ffffffffffffffda RBX: 00007faef243b6d4 RCX: 000000000045c869 [ 903.842776][T23162] RDX: 00000000000003da RSI: 00000000200017c0 RDI: 0000000000000004 [ 903.850748][T23162] RBP: 000000000076bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 903.858900][T23162] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 903.867153][T23162] R13: 000000000000085c R14: 00000000004cb254 R15: 000000000076bfac [ 903.876667][T23162] Kernel Offset: disabled [ 903.880999][T23162] Rebooting in 86400 seconds..