nt_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:43:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0xfffffdf9, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:43:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x3f000000}) 00:43:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00h\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:43:53 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d706673ff", 0x0, 0x0) [ 2593.583464] input: syz1 as /devices/virtual/input/input2511 [ 2593.590988] input: failed to attach handler leds to device input2511, error: -6 [ 2593.593211] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2593.616044] input: syz1 as /devices/virtual/input/input2512 [ 2593.664427] input: failed to attach handler leds to device input2512, error: -6 00:43:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x7a, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:43:53 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs=', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:43:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x10000000}) 00:43:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebe100"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2593.827961] input: syz1 as /devices/virtual/input/input2513 [ 2593.840137] input: failed to attach handler leds to device input2513, error: -6 [ 2593.866048] input: syz1 as /devices/virtual/input/input2514 00:43:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x4000}) [ 2593.932415] input: failed to attach handler leds to device input2514, error: -6 00:43:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x4c000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:43:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x10001) close(r0) 00:43:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000000000f00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:43:54 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:43:54 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:43:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xffffffff00000000}) 00:43:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x8cffffff, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:43:54 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d706673cb", 0x0, 0x0) [ 2594.527733] input: syz1 as /devices/virtual/input/input2515 [ 2594.545552] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2594.548175] input: failed to attach handler leds to device input2515, error: -6 00:43:54 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:54 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:43:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x3000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:43:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000000001f00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:43:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x200000000000000}) [ 2594.761648] input input2518: cannot allocate more than FF_MAX_EFFECTS effects [ 2594.769904] input: syz1 as /devices/virtual/input/input2517 [ 2594.788470] input: failed to attach handler leds to device input2517, error: -6 [ 2594.796259] input input2519: cannot allocate more than FF_MAX_EFFECTS effects 00:43:54 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 2594.813866] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2594.829582] input: syz1 as /devices/virtual/input/input2520 00:43:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x3f000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:43:55 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\r', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2594.882920] input: failed to attach handler leds to device input2520, error: -6 [ 2594.911354] input input2521: cannot allocate more than FF_MAX_EFFECTS effects 00:43:55 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xedc0}) 00:43:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100baeb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:43:55 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) [ 2595.081696] input: syz1 as /devices/virtual/input/input2522 [ 2595.101977] input: failed to attach handler leds to device input2522, error: -6 [ 2595.112902] input input2523: cannot allocate more than FF_MAX_EFFECTS effects [ 2595.128306] input: syz1 as /devices/virtual/input/input2524 [ 2595.144263] input: failed to attach handler leds to device input2524, error: -6 00:43:55 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfsg', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:43:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x4c, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:43:55 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x40000000}) 00:43:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebe400"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2595.247133] input input2525: cannot allocate more than FF_MAX_EFFECTS effects 00:43:55 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:55 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:55 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2595.345499] input: syz1 as /devices/virtual/input/input2526 [ 2595.380878] input: failed to attach handler leds to device input2526, error: -6 00:43:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x9}) 00:43:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0xffffffffffffffff, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2595.419397] input: syz1 as /devices/virtual/input/input2528 00:43:55 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:43:55 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 2595.492125] input: failed to attach handler leds to device input2528, error: -6 [ 2595.515939] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:43:55 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebac00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:43:55 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667302", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:43:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x4000000000000000}) 00:43:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x7400000000000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2595.683472] input: syz1 as /devices/virtual/input/input2531 [ 2595.695945] input input2532: cannot allocate more than FF_MAX_EFFECTS effects [ 2595.709721] input: failed to attach handler leds to device input2531, error: -6 00:43:55 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00l\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2595.818381] input input2534: cannot allocate more than FF_MAX_EFFECTS effects 00:43:55 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xfffffffe}) [ 2595.860491] input: syz1 as /devices/virtual/input/input2535 00:43:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0xae0d000000000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2595.908734] input: failed to attach handler leds to device input2535, error: -6 [ 2595.939182] input: syz1 as /devices/virtual/input/input2536 [ 2595.960469] input input2537: cannot allocate more than FF_MAX_EFFECTS effects 00:43:56 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:43:56 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:43:56 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 2596.012201] input: failed to attach handler leds to device input2536, error: -6 00:43:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100e2eb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:43:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x2010}) 00:43:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x40000000000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:43:56 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 2596.114637] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2596.133202] input input2538: cannot allocate more than FF_MAX_EFFECTS effects 00:43:56 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2596.201846] input: syz1 as /devices/virtual/input/input2539 [ 2596.207795] input: failed to attach handler leds to device input2539, error: -6 [ 2596.258531] input input2540: cannot allocate more than FF_MAX_EFFECTS effects [ 2596.276594] input: syz1 as /devices/virtual/input/input2541 00:43:56 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x100000000000000}) 00:43:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x6c000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2596.321273] input: failed to attach handler leds to device input2541, error: -6 [ 2596.341718] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:43:56 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2596.440410] input input2542: cannot allocate more than FF_MAX_EFFECTS effects 00:43:56 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:43:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00@\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:43:56 executing program 4: ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:43:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xfffffdf9}) [ 2596.554502] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:43:56 executing program 4: ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:43:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x20000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:43:56 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667303", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2596.623172] input: syz1 as /devices/virtual/input/input2543 [ 2596.643144] input: failed to attach handler leds to device input2543, error: -6 00:43:56 executing program 4: ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:43:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xfeffffff00000000}) 00:43:56 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs<', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:43:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a310000000000ffffffe400"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:43:56 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 2596.892163] input: syz1 as /devices/virtual/input/input2544 [ 2596.903184] input input2545: cannot allocate more than FF_MAX_EFFECTS effects [ 2596.920855] input: failed to attach handler leds to device input2544, error: -6 [ 2596.954221] input: syz1 as /devices/virtual/input/input2546 [ 2596.959986] input: failed to attach handler leds to device input2546, error: -6 00:43:57 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0xf6ffffff, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:43:57 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xf6ffffff}) 00:43:57 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:43:57 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:43:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebb400"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2597.146863] input input2547: cannot allocate more than FF_MAX_EFFECTS effects [ 2597.174934] input: syz1 as /devices/virtual/input/input2548 [ 2597.182116] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:43:57 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:57 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 2597.203378] input: failed to attach handler leds to device input2548, error: -6 [ 2597.233936] input: syz1 as /devices/virtual/input/input2549 [ 2597.242936] input input2550: cannot allocate more than FF_MAX_EFFECTS effects 00:43:57 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:43:57 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x2}) 00:43:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x20100000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2597.282487] input: failed to attach handler leds to device input2549, error: -6 00:43:57 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebc900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2597.355334] input input2551: cannot allocate more than FF_MAX_EFFECTS effects [ 2597.390858] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2597.451067] input: syz1 as /devices/virtual/input/input2552 [ 2597.456436] input input2553: cannot allocate more than FF_MAX_EFFECTS effects [ 2597.467175] input: failed to attach handler leds to device input2552, error: -6 00:43:57 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x1020}) 00:43:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x6c, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:43:57 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:43:57 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667303", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:43:57 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebde00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:43:57 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 2597.647169] input input2555: cannot allocate more than FF_MAX_EFFECTS effects [ 2597.666335] input: syz1 as /devices/virtual/input/input2556 [ 2597.687061] input: failed to attach handler leds to device input2556, error: -6 00:43:57 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xffffff7f00000000}) 00:43:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x4, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2597.707452] input: syz1 as /devices/virtual/input/input2557 [ 2597.739159] input input2558: cannot allocate more than FF_MAX_EFFECTS effects 00:43:57 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673fe", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2597.762340] input: failed to attach handler leds to device input2557, error: -6 00:43:57 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000200"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2597.854285] input input2559: cannot allocate more than FF_MAX_EFFECTS effects 00:43:58 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:58 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="72656973657266738c", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2597.955859] input: syz1 as /devices/virtual/input/input2560 [ 2597.991270] input: failed to attach handler leds to device input2560, error: -6 [ 2597.996988] input input2561: cannot allocate more than FF_MAX_EFFECTS effects [ 2598.019612] input: syz1 as /devices/virtual/input/input2562 00:43:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xfeffffff}) 00:43:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0xc0ed0000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:43:58 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:58 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d706673a0", 0x0, 0x0) [ 2598.092186] input: failed to attach handler leds to device input2562, error: -6 00:43:58 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:43:58 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 2598.137408] input input2563: cannot allocate more than FF_MAX_EFFECTS effects 00:43:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000300"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2598.229625] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2598.242777] input input2564: cannot allocate more than FF_MAX_EFFECTS effects 00:43:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xa000000}) 00:43:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x6, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2598.280350] input: syz1 as /devices/virtual/input/input2565 00:43:58 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:43:58 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 2598.336876] input: failed to attach handler leds to device input2565, error: -6 [ 2598.398485] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:43:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebbf00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:43:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x3000000}) [ 2598.456019] input input2567: cannot allocate more than FF_MAX_EFFECTS effects 00:43:58 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:58 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2598.585498] input: syz1 as /devices/virtual/input/input2569 [ 2598.610974] input: failed to attach handler leds to device input2569, error: -6 00:43:58 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d706673f0", 0x0, 0x0) 00:43:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x2010000000000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:43:58 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 2598.633428] input: syz1 as /devices/virtual/input/input2570 00:43:58 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x600000000000000}) [ 2598.682304] input: failed to attach handler leds to device input2570, error: -6 [ 2598.701100] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:43:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\a\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:43:58 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:58 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:43:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x1000000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:43:59 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 2598.867617] input: syz1 as /devices/virtual/input/input2572 [ 2598.898027] input: failed to attach handler leds to device input2572, error: -6 [ 2598.915860] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:43:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x3f00000000000000}) [ 2598.986115] input: syz1 as /devices/virtual/input/input2575 00:43:59 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:43:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:43:59 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\n', 0x0, 0x0) 00:43:59 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x74000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2599.109990] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:43:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x900}) 00:43:59 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673ff", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2599.157554] input: syz1 as /devices/virtual/input/input2576 [ 2599.181394] input: syz1 as /devices/virtual/input/input2577 [ 2599.193700] input: failed to attach handler leds to device input2576, error: -6 00:43:59 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x6c00, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2599.243818] input: syz1 as /devices/virtual/input/input2578 [ 2599.271072] input: failed to attach handler leds to device input2578, error: -6 00:43:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xa}) [ 2599.357149] input: syz1 as /devices/virtual/input/input2579 00:43:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebbe00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:43:59 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667302", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:43:59 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:43:59 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:43:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x900, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2599.526450] input: syz1 as /devices/virtual/input/input2580 [ 2599.540225] input: failed to attach handler leds to device input2580, error: -6 00:43:59 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:43:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xf9fdffff}) [ 2599.580645] input: syz1 as /devices/virtual/input/input2582 00:43:59 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667316", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:43:59 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00', 0x439}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) [ 2599.644911] input: failed to attach handler leds to device input2582, error: -6 00:43:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebb400"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:43:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x7a00, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:43:59 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f, {0x0, 0x0, 0x80}}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 00:43:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xf9fdffff00000000}) 00:43:59 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2599.875349] input: syz1 as /devices/virtual/input/input2585 [ 2599.912973] input: failed to attach handler leds to device input2585, error: -6 00:44:00 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d706673cc", 0x0, 0x0) [ 2599.936949] input: syz1 as /devices/virtual/input/input2586 [ 2599.945152] input: syz1 as /devices/virtual/input/input2587 [ 2599.972355] input: syz1 as /devices/virtual/input/input2588 00:44:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x600, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:00 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2599.978759] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2600.003130] input: failed to attach handler leds to device input2587, error: -6 00:44:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xa00000000000000}) 00:44:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) close(r0) [ 2600.091969] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000000001f00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x40000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:00 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x33}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f0000000100), 0x1c) 00:44:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xedc000000000}) [ 2600.261662] input: syz1 as /devices/virtual/input/input2589 [ 2600.283496] input: failed to attach handler leds to device input2589, error: -6 [ 2600.300622] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2600.343463] input: syz1 as /devices/virtual/input/input2590 00:44:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0xf9fdffff, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2600.392850] input: failed to attach handler leds to device input2590, error: -6 00:44:00 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfsz', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:00 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x300000000000000}) 00:44:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000140), &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240), &(0x7f0000000280)=0x8) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xb5) getsockname(0xffffffffffffffff, &(0x7f0000000300)=@sco, &(0x7f0000000380)=0x80) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100), 0x28) close(r0) 00:44:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebba00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x7000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2600.584862] input: syz1 as /devices/virtual/input/input2591 [ 2600.603817] input: failed to attach handler leds to device input2591, error: -6 [ 2600.614127] tls_set_device_offload_rx: netdev lo with no TLS offload 00:44:00 executing program 4: setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff75257009bfa100000000000007010000f8ffffffb702000005000000bf130000000000008500000006000000b700000000000000950000ff00000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x2800000003000000, 0xe, 0x55, &(0x7f0000000200)="a06ad876d56a0e64d082778c3938", &(0x7f0000000380)=""/85, 0xb4b}, 0x28) syz_genetlink_get_family_id$ipvs(&(0x7f0000001380)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000000c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001540)=ANY=[]}}, 0x8c1) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 2600.631994] tls_set_device_offload_rx: netdev lo with no TLS offload [ 2600.645290] input: syz1 as /devices/virtual/input/input2592 00:44:00 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x20100000}) [ 2600.682883] input: failed to attach handler leds to device input2592, error: -6 00:44:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebe300"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2600.742087] [ 2600.750785] ********************************************************** 00:44:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x1f000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2600.797030] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2600.800137] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 2600.848266] ** ** [ 2600.860650] input: syz1 as /devices/virtual/input/input2593 [ 2600.868019] ** trace_printk() being used. Allocating extra memory. ** [ 2600.879208] ** ** [ 2600.886235] ** This means that this is a DEBUG kernel and it is ** 00:44:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2600.900139] ** unsafe for production use. ** [ 2600.908206] ** ** [ 2600.909107] input: failed to attach handler leds to device input2593, error: -6 [ 2600.930967] ** If you see this message and you are not debugging ** 00:44:01 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) [ 2600.952396] ** the kernel, report this immediately to your vendor! ** [ 2600.978833] ** ** 00:44:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x4c00, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x7}) [ 2601.005169] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 2601.028458] ********************************************************** 00:44:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebd800"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2601.077593] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2601.148723] input: syz1 as /devices/virtual/input/input2595 [ 2601.165650] input: failed to attach handler leds to device input2595, error: -6 00:44:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667303", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2601.188931] input: syz1 as /devices/virtual/input/input2596 00:44:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x10}) [ 2601.257757] input: failed to attach handler leds to device input2596, error: -6 00:44:01 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff75257009bfa100000000000007010000f8ffffffb702000005000000bf130000000000008500000006000000b700000000000000950000ff00000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x2800000003000000, 0xe, 0x55, &(0x7f0000000200)="a06ad876d56a0e64d082778c3938", &(0x7f0000000380)=""/85, 0xb4b}, 0x28) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000000c0), 0xc, &(0x7f00000014c0)={&(0x7f0000001540)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) 00:44:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x1020, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebdc00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfsZ', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:01 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xf6ffffff00000000}) [ 2601.515651] input: syz1 as /devices/virtual/input/input2597 [ 2601.530994] input: failed to attach handler leds to device input2597, error: -6 [ 2601.548455] input: syz1 as /devices/virtual/input/input2598 00:44:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x3f00000000000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2601.623308] input: failed to attach handler leds to device input2598, error: -6 [ 2601.648371] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xa00}) 00:44:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000000000100"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:01 executing program 4: socket$inet6(0xa, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff75257009bfa100000000000007010000f8ffffffb702000005000000bf130000000000008500000006000000b700000000000000950000ff00000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x2800000003000000, 0xe, 0x55, &(0x7f0000000200)="a06ad876d56a0e64d082778c3938", &(0x7f0000000380)=""/85, 0xb4b}, 0x28) [ 2601.772273] input: syz1 as /devices/virtual/input/input2599 [ 2601.778187] input: failed to attach handler leds to device input2599, error: -6 00:44:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0xa00, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x2010000000000000}) [ 2601.835385] input: syz1 as /devices/virtual/input/input2600 [ 2601.860962] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2601.871500] input: failed to attach handler leds to device input2600, error: -6 00:44:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673f9", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100daeb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:02 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d70667310", 0x0, 0x0) 00:44:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0xb5) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100), 0x28) close(r0) 00:44:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x700000000000000}) 00:44:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x2010, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2602.062498] input: syz1 as /devices/virtual/input/input2601 [ 2602.069794] tls_set_device_offload_rx: netdev lo with no TLS offload [ 2602.083323] input: failed to attach handler leds to device input2601, error: -6 [ 2602.102736] tls_set_device_offload_rx: netdev lo with no TLS offload 00:44:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x33}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f0000000100), 0x1c) 00:44:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100c6eb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) 00:44:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xc0ed0000}) 00:44:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0xae0d, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2602.220203] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2602.235799] input: syz1 as /devices/virtual/input/input2602 [ 2602.251116] input: failed to attach handler leds to device input2602, error: -6 00:44:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00H\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2602.452760] input: syz1 as /devices/virtual/input/input2604 [ 2602.486720] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2602.498751] input: failed to attach handler leds to device input2604, error: -6 00:44:02 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs4', 0x0, 0x0) 00:44:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x2000000}) 00:44:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x900000000000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebc600"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:02 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) [ 2602.674903] input: syz1 as /devices/virtual/input/input2606 [ 2602.681370] input: failed to attach handler leds to device input2606, error: -6 [ 2602.698558] input: syz1 as /devices/virtual/input/input2607 00:44:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x8cffffff00000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x500000000000000}) [ 2602.734139] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2602.762325] input: failed to attach handler leds to device input2607, error: -6 00:44:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfsX', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000000000200"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x8cffffff00000000}) 00:44:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x4800, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:03 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) [ 2602.973191] input: syz1 as /devices/virtual/input/input2608 [ 2602.996525] input: failed to attach handler leds to device input2608, error: -6 [ 2603.025826] input: syz1 as /devices/virtual/input/input2609 00:44:03 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x4000000}) [ 2603.092319] input: failed to attach handler leds to device input2609, error: -6 00:44:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x6800, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebb900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2603.233041] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2603.302368] input: syz1 as /devices/virtual/input/input2610 [ 2603.308169] input: failed to attach handler leds to device input2610, error: -6 [ 2603.389171] input: syz1 as /devices/virtual/input/input2611 [ 2603.443504] input: failed to attach handler leds to device input2611, error: -6 00:44:03 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0xd0}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000040000000000"], 0x10}}, 0x0) 00:44:03 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xffffff8c}) 00:44:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x2000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:03 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00L\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2603.605473] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2603.623932] input: syz1 as /devices/virtual/input/input2612 [ 2603.640935] input: failed to attach handler leds to device input2612, error: -6 00:44:03 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x4}) 00:44:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0xdae, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2603.682371] input: syz1 as /devices/virtual/input/input2613 [ 2603.722367] input: failed to attach handler leds to device input2613, error: -6 00:44:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebaf00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2603.809086] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2603.866108] input: syz1 as /devices/virtual/input/input2614 [ 2603.879150] input: failed to attach handler leds to device input2614, error: -6 00:44:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:04 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d706673ff", 0x0, 0x0) 00:44:04 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req={0x4, 0x3, 0x3, 0xfe7}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x2102001ff3, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)="6d656d6f72790100000016000000ea66571d6ef0133000", 0x26e1, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000000)=0x6c4) ftruncate(r1, 0x0) 00:44:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x1f00000000000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x6000000}) 00:44:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\b\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2604.081543] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2604.092326] input: syz1 as /devices/virtual/input/input2615 [ 2604.108677] input: failed to attach handler leds to device input2615, error: -6 [ 2604.118949] EXT4-fs warning (device sda1): ext4_group_extend:1762: can't shrink FS - resize aborted 00:44:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@minixdf='minixdf'}, {@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673e6", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2604.134610] input: syz1 as /devices/virtual/input/input2616 00:44:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x4c00000000000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2604.192387] input: failed to attach handler leds to device input2616, error: -6 00:44:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xffffff7f}) 00:44:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2604.246286] EXT4-fs (sda1): re-mounted. Opts: minixdf,debug_want_extra_isize=0x0000000000000000,,errors=continue [ 2604.334596] EXT4-fs (sda1): re-mounted. Opts: minixdf,debug_want_extra_isize=0x0000000000000000,,errors=continue [ 2604.357055] input: syz1 as /devices/virtual/input/input2617 [ 2604.372110] input: failed to attach handler leds to device input2617, error: -6 00:44:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@minixdf='minixdf'}, {@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2604.404214] input: syz1 as /devices/virtual/input/input2618 [ 2604.444187] input: failed to attach handler leds to device input2618, error: -6 00:44:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\a', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:04 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x3f00}) 00:44:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0xffffff7f00000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2604.614427] input: syz1 as /devices/virtual/input/input2619 [ 2604.629260] input: failed to attach handler leds to device input2619, error: -6 [ 2604.648865] EXT4-fs (sda1): re-mounted. Opts: minixdf,debug_want_extra_isize=0x0000000000000000,,errors=continue 00:44:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673e4", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:04 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x600}) 00:44:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x500000000000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2604.676651] input: syz1 as /devices/virtual/input/input2620 00:44:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@minixdf='minixdf'}, {@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2604.752135] input: failed to attach handler leds to device input2620, error: -6 00:44:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebbd00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:04 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x300}) [ 2604.899708] input: syz1 as /devices/virtual/input/input2621 [ 2604.917891] input: failed to attach handler leds to device input2621, error: -6 00:44:05 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x48000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2604.942088] EXT4-fs (sda1): re-mounted. Opts: minixdf,debug_want_extra_isize=0x0000000000000000,,errors=continue [ 2604.979306] input: syz1 as /devices/virtual/input/input2622 [ 2605.011439] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@minixdf='minixdf'}, {@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2605.023189] input: failed to attach handler leds to device input2622, error: -6 00:44:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x3}) 00:44:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebc000"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x7a000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:05 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2605.179719] EXT4-fs (sda1): re-mounted. Opts: minixdf,debug_want_extra_isize=0x0000000000000000,,errors=continue [ 2605.196095] input: syz1 as /devices/virtual/input/input2623 [ 2605.212478] input: failed to attach handler leds to device input2623, error: -6 00:44:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xffffffffffffffff}) [ 2605.226893] input: syz1 as /devices/virtual/input/input2624 [ 2605.233128] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@minixdf='minixdf'}, {@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0xffffff8c, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2605.282965] input: failed to attach handler leds to device input2624, error: -6 00:44:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebd900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:05 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673ff", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:05 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x900000000000000}) 00:44:05 executing program 4: mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@minixdf='minixdf'}, {@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2605.439184] input: syz1 as /devices/virtual/input/input2625 [ 2605.463893] input: failed to attach handler leds to device input2625, error: -6 00:44:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x10, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:05 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000500"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@minixdf='minixdf'}, {@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x8cffffff}) 00:44:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x300000000000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2605.671788] input: syz1 as /devices/virtual/input/input2627 [ 2605.687757] input: failed to attach handler leds to device input2627, error: -6 [ 2605.706974] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@minixdf='minixdf'}, {@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2605.723385] input: syz1 as /devices/virtual/input/input2628 00:44:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x6}) [ 2605.792248] input: failed to attach handler leds to device input2628, error: -6 00:44:05 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfsn', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:06 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d70667302", 0x0, 0x0) 00:44:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100dbeb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x200000000000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@minixdf='minixdf'}, {@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2606.002262] input: syz1 as /devices/virtual/input/input2629 [ 2606.008962] input: failed to attach handler leds to device input2629, error: -6 00:44:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0xfffffff6}) 00:44:06 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673fa", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2606.047769] input: syz1 as /devices/virtual/input/input2630 00:44:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000680)={[{@minixdf='minixdf'}, {@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x68000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2606.116365] input: failed to attach handler leds to device input2630, error: -6 00:44:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000f00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x7000000}) 00:44:06 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x7, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2606.322829] input: syz1 as /devices/virtual/input/input2631 [ 2606.331706] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 2606.342973] input: failed to attach handler leds to device input2631, error: -6 00:44:06 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@minixdf='minixdf'}]}) [ 2606.392422] input: syz1 as /devices/virtual/input/input2632 [ 2606.415385] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x1000000}) [ 2606.473134] input: failed to attach handler leds to device input2632, error: -6 00:44:06 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebba00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x100000000000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2606.538366] EXT4-fs (sda1): re-mounted. Opts: minixdf,,errors=continue 00:44:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@minixdf='minixdf'}]}) [ 2606.640690] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2606.670296] input: syz1 as /devices/virtual/input/input2633 00:44:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x700}) [ 2606.696818] input: failed to attach handler leds to device input2633, error: -6 00:44:06 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0xfcfdffff00000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2606.783631] EXT4-fs (sda1): re-mounted. Opts: minixdf,,errors=continue 00:44:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebb600"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:07 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@minixdf='minixdf'}]}) 00:44:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x5}) [ 2606.892366] input: syz1 as /devices/virtual/input/input2634 [ 2606.910944] input: failed to attach handler leds to device input2634, error: -6 [ 2606.927242] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2606.952096] input: syz1 as /devices/virtual/input/input2635 [ 2606.957864] input: failed to attach handler leds to device input2635, error: -6 00:44:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0xa00000000000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:07 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673fe", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2606.997054] EXT4-fs (sda1): re-mounted. Opts: minixdf,,errors=continue 00:44:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000600"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}], 0x1000000000000000}) 00:44:07 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x7a00000000000000, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2607.195902] input: syz1 as /devices/virtual/input/input2636 [ 2607.205623] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,,errors=continue [ 2607.217973] input: failed to attach handler leds to device input2636, error: -6 [ 2607.230051] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2607.257162] input: syz1 as /devices/virtual/input/input2637 00:44:07 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000380)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB="2c636f6e3d73797361646d5f75bbba99f945904c68d234fc9685e1bc48930000897a9bfb247b63c542f30000"]) r1 = accept4(r0, &(0x7f00000000c0)=@l2, &(0x7f0000000140)=0x80, 0x80800) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000200)={@remote, 0x0}, &(0x7f0000000240)=0x14) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x88002000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=@ipv4_getaddr={0x44, 0x16, 0x800, 0x70bd2b, 0x25dfdbfb, {0x2, 0x18, 0x8, 0xff, r2}, [@IFA_LOCAL={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1a}}, @IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_ADDRESS={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x15}}, @IFA_CACHEINFO={0x14, 0x6, {0xfffffffffffffe00, 0xfff, 0x5}}]}, 0x44}, 0x1, 0x0, 0x0, 0x20008891}, 0xc010) [ 2607.302922] input: failed to attach handler leds to device input2637, error: -6 00:44:07 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r0, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000380)}, 0x10) close(r0) 00:44:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0xedc0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100adeb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2607.423140] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000100)='./control\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) rename(&(0x7f0000000080)='./control\x00', &(0x7f00000000c0)='./file0/file0\x00') mount(&(0x7f0000000040)=@md0='/dev/md0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, &(0x7f0000000200)="5b2d7d6b657972696e673abf657468306d696d655f747970655e2d2f2776626f786e6574306370757365746c6f73656c666e6f6465762a00") 00:44:07 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs=', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2607.467044] input: syz1 as /devices/virtual/input/input2638 [ 2607.474772] input: failed to attach handler leds to device input2638, error: -6 [ 2607.493378] input: syz1 as /devices/virtual/input/input2639 00:44:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaac79, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x30002, &(0x7f0000000200)=ANY=[@ANYBLOB="696f636861727365743d69736f383835392d322c63727566746c696f636861727365743d6d616363656c7469632c636865636b3d7374726963742c73657373696f6e3d3078303030303030303030303030303031362c6769643d0fbff120f99880926d4c880947aad4f7367f4697946d6725a2ad0a2f60e89faec79a88fbe913c86e748b81ed8be7faba40c8c94e360f0f57fdf7e1075d1a3051af3852574b13450c55ef9b2a850a10ed248f8443a7dc65ac768f7344c41dfc3c0a0c8b50d47137933a080bad2573cbe3d0ad699dd6db4024ebf108be1fc1e843599461a4b700384408368cccb7d07b4282dc7b7ecfe089112749f450e947b1ec3c7df698909b5ce21757ea3e622d8bdf39c9f03ad64cee6904434dd8b22a3502e1eaa5ed1ad0e2d92a423bc24fb8d786e66d7bfc3cc82ffd3cb1fc4a31dc898a3dcd73f481378ac05e9e2978b04dd197af0e532ae7d9e657296e3f877abe6f1df810c48128dd2e6d7fcbe890a03755205a1b84ebbd9604c54b7f7f5ca0cd6ef4ffbc9f842b81936b9c888298eb4311618a70ccca9cbb076d4785108ee436cd1f94eb2abecb6b81888b392760a22e3d8663b5a50cc2d50b781f64b07eaa8e3c285b2a4900000000000000000000000000000000", @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB="2c676f6eaf09746546743f04007361646d5f75"]) 00:44:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0xffffffffffffffff, 0x30, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2607.559013] tmpfs: No value for mount option '[-}keyring:¿eth0mime_type^-/'vboxnet0cpusetloselfnodev*' [ 2607.592599] input: failed to attach handler leds to device input2639, error: -6 00:44:07 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000140)={0x3, 0x0, 0xffffffffffffffdb, &(0x7f0000000800)}) 00:44:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000000000100"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:07 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000200)=0x40) dup3(r0, r0, 0x80000) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r5, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r5, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) connect(r4, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e22, @broadcast}, 0x4, 0x3, 0x1, 0x3}}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0x2, &(0x7f0000000040)=0xfff, 0x4) sendto$inet(r6, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000001180)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f00000004c0)={0x8, 0x4000000000000}) getsockname$inet6(r5, &(0x7f00000001c0), &(0x7f0000000380)=0x1c) sendto$inet(r6, &(0x7f0000d7cfcb), 0x100000252, 0x0, &(0x7f0000893ff0), 0x10) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000240)={{0x3, 0x0, 0x5, 0x3, 0x1f}, 0xc26, 0x9, 0x4}) shutdown(r6, 0x400000000000001) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000400)={{0x3, 0x3, 0x332, 0x3, 0x21}, 0x0, 0x3ff, 0xffffffffffffff80}) r7 = gettid() capset(&(0x7f0000000340)={0x20080522, r7}, &(0x7f0000000480)={0x7, 0x7d4, 0x5, 0x0, 0x9, 0x7fff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e24, @local}}) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'broute\x00'}, &(0x7f00000003c0)=0x78) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000540)) [ 2607.703248] input: syz1 as /devices/virtual/input/input2640 [ 2607.729877] input: failed to attach handler leds to device input2640, error: -6 [ 2607.813494] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000300"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:07 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\v', 0x0, 0x0) 00:44:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0xffffffffffffffff, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008910, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:08 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2607.922099] input: syz1 as /devices/virtual/input/input2642 [ 2607.927875] input: failed to attach handler leds to device input2642, error: -6 [ 2608.038869] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f00000006c0)={"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"}) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000200)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB="34a3cf663964a2f82c636f6e7465f3743d73797361646d5f752c00"]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) 00:44:08 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2608.150236] input: syz1 as /devices/virtual/input/input2643 [ 2608.180330] QAT: Invalid ioctl [ 2608.192378] input: failed to attach handler leds to device input2643, error: -6 00:44:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x2d, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2608.253091] QAT: Invalid ioctl [ 2608.262006] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebc300"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/icmp\x00') utimensat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x2710}, {0x77359400}}, 0x100) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:08 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000200)=0x40) dup3(r0, r0, 0x80000) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r5, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r5, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) connect(r4, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e22, @broadcast}, 0x4, 0x3, 0x1, 0x3}}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0x2, &(0x7f0000000040)=0xfff, 0x4) sendto$inet(r6, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000001180)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f00000004c0)={0x8, 0x4000000000000}) getsockname$inet6(r5, &(0x7f00000001c0), &(0x7f0000000380)=0x1c) sendto$inet(r6, &(0x7f0000d7cfcb), 0x100000252, 0x0, &(0x7f0000893ff0), 0x10) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000240)={{0x3, 0x0, 0x5, 0x3, 0x1f}, 0xc26, 0x9, 0x4}) shutdown(r6, 0x400000000000001) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000400)={{0x3, 0x3, 0x332, 0x3, 0x21}, 0x0, 0x3ff, 0xffffffffffffff80}) r7 = gettid() capset(&(0x7f0000000340)={0x20080522, r7}, &(0x7f0000000480)={0x7, 0x7d4, 0x5, 0x0, 0x9, 0x7fff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e24, @local}}) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'broute\x00'}, &(0x7f00000003c0)=0x78) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000540)) 00:44:08 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x7ffff, 0x36, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:08 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) [ 2608.471832] input: syz1 as /devices/virtual/input/input2644 [ 2608.500890] input: failed to attach handler leds to device input2644, error: -6 [ 2608.591178] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100ffffffe400"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x800, 0x6000) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000000100)=0x5) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xaaaad96, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@nocompress='nocompress'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_off='map=off'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2608.682950] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2608.723674] input: syz1 as /devices/virtual/input/input2646 [ 2608.740668] input: failed to attach handler leds to device input2646, error: -6 [ 2608.857386] input: syz1 as /devices/virtual/input/input2647 00:44:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs8', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0xffffffffffffffff, 0x39, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2608.912105] input: failed to attach handler leds to device input2647, error: -6 00:44:09 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000200)=0x40) dup3(r0, r0, 0x80000) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r5, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r5, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) connect(r4, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e22, @broadcast}, 0x4, 0x3, 0x1, 0x3}}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0x2, &(0x7f0000000040)=0xfff, 0x4) sendto$inet(r6, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000001180)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f00000004c0)={0x8, 0x4000000000000}) getsockname$inet6(r5, &(0x7f00000001c0), &(0x7f0000000380)=0x1c) sendto$inet(r6, &(0x7f0000d7cfcb), 0x100000252, 0x0, &(0x7f0000893ff0), 0x10) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000240)={{0x3, 0x0, 0x5, 0x3, 0x1f}, 0xc26, 0x9, 0x4}) shutdown(r6, 0x400000000000001) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000400)={{0x3, 0x3, 0x332, 0x3, 0x21}, 0x0, 0x3ff, 0xffffffffffffff80}) r7 = gettid() capset(&(0x7f0000000340)={0x20080522, r7}, &(0x7f0000000480)={0x7, 0x7d4, 0x5, 0x0, 0x9, 0x7fff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e24, @local}}) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'broute\x00'}, &(0x7f00000003c0)=0x78) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000540)) 00:44:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00?\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:09 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={'ifb0\x00', {0x2, 0x4e24, @multicast1}}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2609.068678] input: syz1 as /devices/virtual/input/input2648 [ 2609.084139] input: failed to attach handler leds to device input2648, error: -6 00:44:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x7ffff, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfst', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100c3eb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x400, &(0x7f00000000c0)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYRESOCT=r0, @ANYRESDEC=0x0, @ANYBLOB="2c0d83df1a65000000000000000000000000"]) 00:44:09 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000200)=0x40) dup3(r0, r0, 0x80000) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r5, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r5, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) connect(r4, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e22, @broadcast}, 0x4, 0x3, 0x1, 0x3}}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0x2, &(0x7f0000000040)=0xfff, 0x4) sendto$inet(r6, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000001180)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f00000004c0)={0x8, 0x4000000000000}) getsockname$inet6(r5, &(0x7f00000001c0), &(0x7f0000000380)=0x1c) sendto$inet(r6, &(0x7f0000d7cfcb), 0x100000252, 0x0, &(0x7f0000893ff0), 0x10) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000240)={{0x3, 0x0, 0x5, 0x3, 0x1f}, 0xc26, 0x9, 0x4}) shutdown(r6, 0x400000000000001) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000400)={{0x3, 0x3, 0x332, 0x3, 0x21}, 0x0, 0x3ff, 0xffffffffffffff80}) r7 = gettid() capset(&(0x7f0000000340)={0x20080522, r7}, &(0x7f0000000480)={0x7, 0x7d4, 0x5, 0x0, 0x9, 0x7fff}) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e24, @local}}) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'broute\x00'}, &(0x7f00000003c0)=0x78) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000540)) 00:44:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0xffffffffffffffff, 0x0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2609.261878] input: syz1 as /devices/virtual/input/input2650 [ 2609.280924] input: failed to attach handler leds to device input2650, error: -6 [ 2609.302980] input: syz1 as /devices/virtual/input/input2651 00:44:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2609.336410] input: failed to attach handler leds to device input2651, error: -6 00:44:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a310000000000fffffdfd00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7, 0x1) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000200)) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f00000000c0)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB="0200000000f600"]) syncfs(r0) 00:44:09 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x6, 0x1ff}) [ 2609.451526] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:09 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x1000000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2609.493184] input: syz1 as /devices/virtual/input/input2652 [ 2609.499128] input: failed to attach handler leds to device input2652, error: -6 00:44:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40000, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000100)=0x100000000) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2609.556951] input: syz1 as /devices/virtual/input/input2653 00:44:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x400) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000180)=""/246) ioctl$EVIOCGREP(r0, 0x4004743c, &(0x7f0000000280)=""/174) [ 2609.612609] input: failed to attach handler leds to device input2653, error: -6 [ 2609.621567] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00l\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xaaaac63, &(0x7f0000000680), 0x400, &(0x7f0000000840)=ANY=[]) 00:44:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xae0d000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2609.704910] syz-executor4 (2411) used obsolete PPPIOCDETACH ioctl [ 2609.775078] input: syz1 as /devices/virtual/input/input2654 [ 2609.791642] input: failed to attach handler leds to device input2654, error: -6 00:44:09 executing program 4: [ 2609.817044] input: syz1 as /devices/virtual/input/input2655 [ 2609.853403] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:10 executing program 4: [ 2609.872195] ISOFS: Unable to identify CD-ROM format. [ 2609.882143] input: failed to attach handler leds to device input2655, error: -6 00:44:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673fc", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:10 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d706673ff", 0x0, 0x0) 00:44:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a310000000dae00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x7000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:10 executing program 4: 00:44:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0xfffffffffffffede, 0x5}], 0x400, &(0x7f0000000200)={[], [{@smackfsfloor={'smackfsfloor', 0x3d, 'iocharset'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:10 executing program 4: [ 2610.122951] input: syz1 as /devices/virtual/input/input2656 [ 2610.135737] input: failed to attach handler leds to device input2656, error: -6 [ 2610.189771] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a310000002088ffffffff00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x500, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:10 executing program 4: 00:44:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:10 executing program 4: [ 2610.317294] input: syz1 as /devices/virtual/input/input2658 [ 2610.337958] input: failed to attach handler leds to device input2658, error: -6 [ 2610.373167] input: syz1 as /devices/virtual/input/input2659 [ 2610.379116] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2610.442262] input: failed to attach handler leds to device input2659, error: -6 00:44:10 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d706673f0", 0x0, 0x0) 00:44:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x6c, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:10 executing program 4: 00:44:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673ff", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:10 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000380)=0xe8) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x90400, &(0x7f00000003c0)={'trans=unix,', {[{@cache_none='cache=none'}, {@noextend='noextend'}, {@access_uid={'access', 0x3d, r1}}, {@noextend='noextend'}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000100)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB="2c636f6e746578743d73797361646d5f752c00ce"]) 00:44:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebbb00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:10 executing program 4: 00:44:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xffffff8c, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:10 executing program 4: [ 2610.814765] input: syz1 as /devices/virtual/input/input2660 [ 2610.822042] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2610.846332] input: failed to attach handler leds to device input2660, error: -6 00:44:10 executing program 4: [ 2610.874061] QAT: Invalid ioctl [ 2610.883226] input: syz1 as /devices/virtual/input/input2661 00:44:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667306", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2610.942165] input: failed to attach handler leds to device input2661, error: -6 [ 2610.956087] QAT: Invalid ioctl 00:44:11 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d706673f9", 0x0, 0x0) 00:44:11 executing program 4: 00:44:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xfdfdffff00000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000380)=0x5) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000480)=ANY=[@ANYRES32=0x0, @ANYBLOB="7a0000003e4d75073001dd132c1c4e0af68552a87f9450a4bd06548d8fefb8be386cd6a593202702a1653dcabe5574bc0019d524b7786f53afa8553213c4382254418b85afea6fc8666eea8b166477349acdc275d16945a4c0f3b31d2736cbe2e3a54c2d46b874fa3b1db8a57dc64398e1f8a9c1adcce27e5d6165465c91da37dec784014a44f7e6496368e41b9b85f658ae88cf4175205200aa73684bf6bc03b95feb910c6a6208c38a643b22bee50d"], &(0x7f0000000180)=0x82) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000440)=@sack_info={r2, 0xff, 0x100000000}, 0xc) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000100)=""/95) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000200)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c6d61703d61636f726e2c7375626a5f747970653d247365630000000000000000662c657569643da63ccb8e0b4c70d2d64d50334e6cc4bd908ed7cd666cbddd67c95efb7d4b7b2ac4d83e44e559ccf20a548f2964ddde337281c22860af4188798e8584e1e7753255011f288f7a5e3dac0a9dfecb932cb49551ba6eeb7975fad179f28c575827b97154c60abfa7e81769f87bf81b5360fc8caf2dd614d7c41a22f09f9db10feb1c34296d30642136226353d1c91a69910000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) 00:44:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000000001000"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:11 executing program 4: 00:44:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2611.142756] input: syz1 as /devices/virtual/input/input2662 [ 2611.174398] input: failed to attach handler leds to device input2662, error: -6 00:44:11 executing program 4: 00:44:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x7, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2611.213190] input: syz1 as /devices/virtual/input/input2663 00:44:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x20100000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2611.283703] input: failed to attach handler leds to device input2663, error: -6 [ 2611.290956] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:11 executing program 4: [ 2611.476372] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:11 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00 \x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:11 executing program 4: 00:44:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x1f000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:11 executing program 4: 00:44:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2611.602328] input: syz1 as /devices/virtual/input/input2664 [ 2611.620023] input: failed to attach handler leds to device input2664, error: -6 00:44:11 executing program 4: 00:44:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebb100"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:11 executing program 4: [ 2611.715636] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xffffff7f, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2611.817583] input: syz1 as /devices/virtual/input/input2666 [ 2611.844309] input: failed to attach handler leds to device input2666, error: -6 00:44:12 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="72656973657266737f", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:12 executing program 4: 00:44:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008913, &(0x7f00000000c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2611.882446] input: syz1 as /devices/virtual/input/input2667 00:44:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xdae, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2611.932322] input: failed to attach handler leds to device input2667, error: -6 00:44:12 executing program 4: 00:44:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100ae0d00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x4}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:12 executing program 4: [ 2612.120275] input: syz1 as /devices/virtual/input/input2668 [ 2612.141425] input: failed to attach handler leds to device input2668, error: -6 00:44:12 executing program 4: [ 2612.183312] input: syz1 as /devices/virtual/input/input2669 [ 2612.191324] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xffffffff00000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2612.252316] input: failed to attach handler leds to device input2669, error: -6 00:44:12 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs ', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:12 executing program 4: 00:44:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f00000000c0)=ANY=[@ANYBLOB="696f636861720500743d6973636861727365743d6d616363656c7469632c636865636b3d7374726963742c73657373696f6e3d3078303030303030303030303030303031362c6769643d00000000000000f64b5c4adc000000000000000000", @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) 00:44:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:12 executing program 4: [ 2612.436091] input: syz1 as /devices/virtual/input/input2670 [ 2612.451102] input: failed to attach handler leds to device input2670, error: -6 00:44:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xedc0, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:12 executing program 4: [ 2612.488009] input: syz1 as /devices/virtual/input/input2671 00:44:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:12 executing program 4: 00:44:12 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x82000, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x800}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000380)={r1, 0x80000000}, &(0x7f00000003c0)=0x8) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180), &(0x7f00000002c0)=0x14) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = memfd_create(&(0x7f00000000c0)='user\x00', 0x7) readlinkat(r3, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)=""/159, 0x9f) ioctl(r2, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2612.543557] input: failed to attach handler leds to device input2671, error: -6 00:44:12 executing program 4: [ 2612.646328] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:12 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00\n\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x74000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:12 executing program 4: 00:44:12 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet(0x2, 0x800, 0x9) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB="696f636861727365743d69736f383835392d322c63727566742c696f636861727365743d6d616363656c7469632c636865636b3d7374726963742c73657373696f6e3d3078303030303030303030303030303031362cff7f0000", @ANYRESHEX=0x0, @ANYBLOB="2c6d61703d61636f726e000075626a5f747970654d0180000000000000736563757269747973656c", @ANYRESDEC=0x0, @ANYBLOB="2c636f6e748555cdfeb83a652d743d73797361"]) 00:44:13 executing program 4: [ 2612.897520] input: syz1 as /devices/virtual/input/input2672 [ 2612.915336] input: failed to attach handler leds to device input2672, error: -6 [ 2612.925393] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:13 executing program 4: [ 2612.949517] input: syz1 as /devices/virtual/input/input2673 00:44:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2613.003205] input: failed to attach handler leds to device input2673, error: -6 00:44:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x200080) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000100)={0x80000001, 0xffffffffffffc843, 0xc, 0x9, 0xfffffffffffffff9, 0x3, 0x7fff, 0x4, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYRES32=r2, @ANYBLOB="aa0000002e20d557e3fa8ef882dcdf2e00728dfbfa948dd38cdabea5e0a642722b71da68e5a87f29be8733f8c29d9bcf5d0d4abf27e35bd4a2a443d58d76f2a2b2ad58e199a58fd1aa2df09d61ec1efc7fce0c9e767bd54ce956609e2d5eecc19a20b6a97c1107ce48f545aa46666f4eb62b9b1f7a43a527d8537b36f93fcaf30100000082fb335b39fbed935efae298359bd436de945d0aa572a86872cf28766a742c52ef2912202e0c71755a04"], &(0x7f0000000180)=0xb2) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000200)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB="2c636f6e74657874840daca961646d5f752c00cd8fc7f44c87b55cdb50226424b9e1e9412ec7518c0bff6f9b087fb2cd256bad16bb58f9ffffff362c36256c832a6fe5bb68b793cff1cbdf73269587ef3d8a08ec0429c255e3628c6fb0a73a6d07292e0a4b607d2914b34bb688b052a6f35519a1cac4cd9c4dc100c6f786576c1ca039fc55f13857ab00e83fb11d15854cf97ced7a40e591"]) 00:44:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x40000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebdc00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2613.119955] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2613.162352] input: syz1 as /devices/virtual/input/input2674 [ 2613.168253] input: failed to attach handler leds to device input2674, error: -6 [ 2613.180676] input: syz1 as /devices/virtual/input/input2675 [ 2613.243728] input: failed to attach handler leds to device input2675, error: -6 00:44:13 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:13 executing program 4: 00:44:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000000c0)=""/115, &(0x7f0000000140)=0x73) 00:44:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xfcfdffff, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000000007f00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:13 executing program 4: 00:44:13 executing program 4: [ 2613.394444] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2613.409725] input: syz1 as /devices/virtual/input/input2676 [ 2613.416068] IPVS: length: 115 != 8 [ 2613.430796] input: failed to attach handler leds to device input2676, error: -6 00:44:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:13 executing program 4: [ 2613.445481] input: syz1 as /devices/virtual/input/input2677 00:44:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x101000, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000100)={'icmp\x00'}, &(0x7f0000000140)=0x1e) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB="696f636861703835392d32843ca2000000000000394861727365743d6d616b63656c5d69632c636865636b3d7374726963742c73657373696f6e3d307830303030303030304a303030303031362c6769643d0000000000000000", @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) 00:44:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xa000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2613.502590] input: failed to attach handler leds to device input2677, error: -6 [ 2613.571894] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:13 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfsP', 0x0, 0x0) 00:44:13 executing program 4: 00:44:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebc500"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000100)=0x400) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000380)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) fsetxattr$security_capability(r2, &(0x7f00000000c0)='security.capability\x00', &(0x7f00000004c0)=@v3={0x3000000, [{0x8, 0x9}, {0x100000001, 0x7fff}], r3}, 0x8, 0x2) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:13 executing program 4: 00:44:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xa, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:13 executing program 4: [ 2613.760663] input: syz1 as /devices/virtual/input/input2678 [ 2613.772216] input: failed to attach handler leds to device input2678, error: -6 [ 2613.791281] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:13 executing program 4: 00:44:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00t\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:14 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r1 = dup(r0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0/file0\x00', 0xe, 0x2) [ 2613.972100] input: syz1 as /devices/virtual/input/input2679 [ 2613.985214] input: failed to attach handler leds to device input2679, error: -6 [ 2613.992968] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2614.019170] input: syz1 as /devices/virtual/input/input2680 [ 2614.071854] input: failed to attach handler leds to device input2680, error: -6 00:44:14 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d706673fc", 0x0, 0x0) 00:44:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x68, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:14 executing program 4: 00:44:14 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x49, &(0x7f0000000200)="0a5c2d02403162857170706519ac3cab54900eb2af6f4e33a1ea4eb9bc8026d4ef741e10131ed26a0074f56b5299e559a90a3fd295b07ea053fde2798a4745531f7791b5f248b32cfe9e9c6df62fd326aaf6d5b0e2cf731d6ddcf01ae8fe5961a7b87fdab3cd45a8a013c88cfb38618b75524c46ee0103b63ebef01c57") fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x3) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f00000000c0)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000140)) 00:44:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00`\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:14 executing program 4: 00:44:14 executing program 4: [ 2614.279790] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:14 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x4a5b6ecc, 0x4000) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0xd7e, @remote, 0xa48e}}, 0x4, 0xfc}, &(0x7f0000000200)=0x90) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'syzkaller1\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000640)={@local, r2}, 0x14) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={r1, @in={{0x2, 0x4e20, @broadcast}}}, 0x84) sendmsg$alg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="7e55670e1ba2a75d35abd734467f4ea946ebb4149b516a5b6c01f7b93f685e567de85c11a011382a1f7b1e80e14b076e29cf0053cb072494eb40fd44fed75cf78464b6fe0894f4b543bfb388e4735b2c0028f788d8e97ef4f847c7f2157228226e467f00e7cd37a1b39f242f6c2742b5af401439d1cba9075a8b6b3233d68539fb554bea3e0597bcdd11d36c70cd394401720f0b552aafe35755579ada8e3761859f09bef55c44a237f8992fc105800dca4d0b2f59ffb9816d16fa1736c396fd49caca057b0318d51203e2238e15df7f5e69e456069dba82d6fd9dee7e53feea33beb086167f3518c293343cc1de4ac0bf9c0a0db5f6d6d8", 0xf8}], 0x1, &(0x7f0000000540)=[@assoc={0x18, 0x117, 0x4, 0x1000}, @iv={0x40, 0x117, 0x2, 0x2a, "16ed143265a5f8b53b993f1548a76ab93526aeb09ac58371f1d4dfb8f99a2462cef255aa26b477e01357"}], 0x58, 0x800}, 0x10) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f00000006c0)={0x0, @capture={0x0, 0x0, {0x6, 0x800}, 0x10000, 0x1}}) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000003c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000300), r4, 0x0, 0x2, 0x4}}, 0x20) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2614.327740] input: syz1 as /devices/virtual/input/input2681 00:44:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667310", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x7a, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2614.371170] input: failed to attach handler leds to device input2681, error: -6 00:44:14 executing program 4: [ 2614.424497] input: syz1 as /devices/virtual/input/input2682 [ 2614.482695] input: failed to attach handler leds to device input2682, error: -6 00:44:14 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667302", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:14 executing program 4: 00:44:14 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000580)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000540)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000005c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000900), r1, 0x2}}, 0x18) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x20400, &(0x7f0000000200)={'trans=unix,', {[{@cache_loose='cache=loose'}, {@mmap='mmap'}, {@version_u='version=9p2000.u'}, {@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@cachetag={'cachetag', 0x3d, 'macceltic'}}, {@fscache='fscache'}, {@aname={'aname', 0x3d, 'map=acorn'}}, {@cachetag={'cachetag', 0x3d, '$securityself'}}, {@debug={'debug', 0x3d, 0xb0f4}}], [{@smackfsdef={'smackfsdef', 0x3d, 'posix_acl_access'}}, {@permit_directio='permit_directio'}]}}) ioctl(r2, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000340)={0xffff, 0x5, 0x3, 0x0, 0x0, [{r2, 0x0, 0x8}, {r2, 0x0, 0x8}, {r2, 0x0, 0x9}]}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x80, 0x0) accept$unix(r3, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) r4 = dup2(r2, r2) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r4) getsockopt$bt_BT_VOICE(r4, 0x112, 0xb, &(0x7f0000000180)=0x101, &(0x7f0000000300)=0x2) write$cgroup_type(r4, &(0x7f0000000500)='threaded\x00', 0x9) ioctl$KDGETMODE(r3, 0x4b3b, &(0x7f0000000600)) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB="696f636861727365743d69736f000000002d322c6372750500000000000000727365743d6d616363656c7469632c636863742c73657373696f6e3d3078303030303030303030303030303031362c6769643d0000000000000000", @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) socket$inet6_udp(0xa, 0x2, 0x0) 00:44:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00z\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x7400000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:14 executing program 4: 00:44:14 executing program 4: [ 2614.703687] input: syz1 as /devices/virtual/input/input2683 [ 2614.730891] input: failed to attach handler leds to device input2683, error: -6 [ 2614.747982] ISOFS: Unable to identify CD-ROM format. 00:44:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xfcfdffff00000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebb800"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:15 executing program 4: [ 2614.906769] ISOFS: Unable to identify CD-ROM format. [ 2614.969779] input: syz1 as /devices/virtual/input/input2685 [ 2614.987137] input: failed to attach handler leds to device input2685, error: -6 00:44:15 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:15 executing program 0: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x7, 0x288001) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x3, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000400)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) 00:44:15 executing program 4: [ 2615.027549] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:15 executing program 4: 00:44:15 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xa00000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\a\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:15 executing program 4: 00:44:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x20200) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000100)={0x0, 0xfffffffffffffffd}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000180)={r2, 0x9e2}, &(0x7f0000000200)=0x8) 00:44:15 executing program 4: [ 2615.251243] input: syz1 as /devices/virtual/input/input2687 [ 2615.281187] input: failed to attach handler leds to device input2687, error: -6 [ 2615.288881] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x2000000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2615.306022] input: syz1 as /devices/virtual/input/input2688 00:44:15 executing program 4: [ 2615.353827] input: failed to attach handler leds to device input2688, error: -6 00:44:15 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:15 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x2000000000890e, &(0x7f00000001c0)="0a5c1d0800000000000000") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)=0x0) process_vm_readv(r1, &(0x7f0000000180)=[{&(0x7f0000000100)=""/75, 0x4b}], 0x1, &(0x7f0000000200)=[{&(0x7f0000000900)=""/4096, 0x1000}], 0x1, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x8, 0x80) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000240)={0x5, 0x200, 0x7, 0x5}, 0x6) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000340)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000240)=ANY=[]) 00:44:15 executing program 4: 00:44:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100deeb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x9, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:15 executing program 4: [ 2615.668448] input: syz1 as /devices/virtual/input/input2689 [ 2615.675512] input: failed to attach handler leds to device input2689, error: -6 [ 2615.693692] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2615.705365] input: syz1 as /devices/virtual/input/input2690 00:44:15 executing program 4: 00:44:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x500000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2615.752820] input: failed to attach handler leds to device input2690, error: -6 00:44:15 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB='iocharset=isoU859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB=',sontext=sysad;_u,\x00']) 00:44:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00h\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2615.914768] input: syz1 as /devices/virtual/input/input2691 [ 2615.924986] input: failed to attach handler leds to device input2691, error: -6 [ 2615.937712] input: syz1 as /devices/virtual/input/input2692 [ 2615.978946] input: failed to attach handler leds to device input2692, error: -6 [ 2615.986735] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:16 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:16 executing program 4: 00:44:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x8cffffff00000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00@\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673ce", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:16 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xaaaad9f, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000000c0)=0x3, 0x4) 00:44:16 executing program 4: [ 2616.222906] input: syz1 as /devices/virtual/input/input2693 [ 2616.237114] input: failed to attach handler leds to device input2693, error: -6 00:44:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x3f00000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2616.269579] input: syz1 as /devices/virtual/input/input2694 00:44:16 executing program 4: 00:44:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673ba", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2616.313557] input: failed to attach handler leds to device input2694, error: -6 00:44:16 executing program 4: [ 2616.369333] ISOFS: Unable to identify CD-ROM format. 00:44:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100c7eb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2616.497481] input: syz1 as /devices/virtual/input/input2695 [ 2616.532575] input: failed to attach handler leds to device input2695, error: -6 00:44:16 executing program 4: 00:44:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x4c000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:16 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfsD', 0x0, 0x0) 00:44:16 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x105000, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00z\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:16 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x400020000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000005c0)={{}, 'syz1\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 2616.716744] input: syz1 as /devices/virtual/input/input2697 [ 2616.723248] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2616.732794] input: failed to attach handler leds to device input2697, error: -6 00:44:16 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x800, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000240)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x5, 0x8, 0x5, 0x2}) 00:44:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x4800, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2616.774006] input: syz1 as /devices/virtual/input/input2698 [ 2616.787154] input: syz1 as /devices/virtual/input/input2699 00:44:16 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebbf00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2616.872349] input: failed to attach handler leds to device input2699, error: -6 [ 2616.900995] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$bt_rfcomm(r0, &(0x7f00000000c0)={0x1f, {0x1, 0xf1c2, 0x1, 0xa5, 0x80000000, 0x81}, 0x4}, 0xa) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100dfeb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2616.924381] input: syz1 as /devices/virtual/input/input2700 [ 2616.958579] input: failed to attach handler leds to device input2700, error: -6 00:44:17 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x6800, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2617.045313] input: syz1 as /devices/virtual/input/input2701 [ 2617.087286] input: failed to attach handler leds to device input2701, error: -6 [ 2617.116129] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2617.149245] input: syz1 as /devices/virtual/input/input2702 00:44:17 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = gettid() fcntl$getownex(r3, 0x10, &(0x7f0000000200)={0x0, 0x0}) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r0, &(0x7f0000000240)={r1, r3, 0x7fff}) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000140)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f00000004c0), 0x0, &(0x7f0000000300)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}, 0x0) sendmmsg$inet_sctp(r3, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c6d61706fed3d61636f724e8d7375626a5f747970653d24732c65994d643d000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) 00:44:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000200"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2617.192525] input: failed to attach handler leds to device input2702, error: -6 00:44:17 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667301", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000000000500"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x10000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2617.280541] input: syz1 as /devices/virtual/input/input2703 [ 2617.299466] input: failed to attach handler leds to device input2703, error: -6 00:44:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = getuid() setfsuid(r1) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2617.375517] input: syz1 as /devices/virtual/input/input2704 [ 2617.412670] input: failed to attach handler leds to device input2704, error: -6 00:44:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), r2, &(0x7f0000000dc0), 0x0, 0x5) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000300)=0x0) tee(r1, r0, 0x100000000, 0x3) sched_setparam(r3, &(0x7f0000000140)=0x800) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000580)={{0x2, 0x3}, 0x3, 0x0, 0x0, r3, 0x0, 0x4, 'syz1\x00', &(0x7f0000000340), 0x0, [], [0x2, 0x9, 0x3, 0x2]}) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x30000, &(0x7f0000000b40)=ANY=[@ANYBLOB='flushoncommit,ssd_spread,inode_cache,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2ced"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9097e116bcf3181884a7e723a37fec3bbd3d48d38a6e5f725074b96c09fe25bf1dc72c440a644"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x600000000000000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="15") unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r6, 0xc004ae0a, &(0x7f0000000280)) 00:44:17 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667301", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2617.447526] input: syz1 as /devices/virtual/input/input2705 [ 2617.482413] input: failed to attach handler leds to device input2705, error: -6 00:44:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x20000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:17 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x97b9, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000100)={0x9, 0x3, 0x8, 0x1, &(0x7f0000000040)=[{}, {}, {}]}) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000180)={0x8, 0x9}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100b9eb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:17 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:17 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfsL', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2617.676641] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 2617.685990] input: syz1 as /devices/virtual/input/input2706 [ 2617.694836] input: failed to attach handler leds to device input2706, error: -6 [ 2617.721410] input: syz1 as /devices/virtual/input/input2707 00:44:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000180)={0x3, 0x6}) mq_getsetattr(r1, &(0x7f0000000100)={0x81, 0x3, 0x8, 0xcb, 0x9, 0x7, 0x7, 0x3}, &(0x7f0000000140)) 00:44:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x7a000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="15") unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2617.782452] input: failed to attach handler leds to device input2707, error: -6 00:44:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100b7eb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:18 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673ff", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="15") unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x40000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='timers\x00') write$USERIO_CMD_REGISTER(r1, &(0x7f0000000180)={0x0, 0x7}, 0x2) pivot_root(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB="696f636861727365743d69736f383835392d321b63727566742c696f636861727365743d6d616363656c74696328636865636b3d7374726963742c73657373696f6e3d3078303030303030303030303030303031362c6769643d", @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) [ 2617.948072] input: syz1 as /devices/virtual/input/input2708 [ 2617.974565] input: failed to attach handler leds to device input2708, error: -6 00:44:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="15") unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:18 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2618.047069] input: syz1 as /devices/virtual/input/input2709 [ 2618.122497] input: failed to attach handler leds to device input2709, error: -6 [ 2618.158990] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:18 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$can_raw(0x1d, 0x3, 0x1) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="15") ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xfffffdfd, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebe100"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:18 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="15") ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2618.332957] input: syz1 as /devices/virtual/input/input2710 [ 2618.356169] input: failed to attach handler leds to device input2710, error: -6 00:44:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000200)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c6d61703d61636f726e2c7375626a5f747970653d24736563757269747973656c662cff0300003d7e669aa34a1bc22e637ee284fc3a74696f043032c7b3e27b287cf386872facb585ae81e3b92183bd1004e005a3b848f5a6930b0660fe740dbf8ed0cf76f985fefcd7997800adfe23d420850f9231cbeecf086d6f28aade305ab46ed6f64324f269d6eb96ac284d3fea2bb112e7653a3b8eb95f904f842318163a0bce682f20b53f95d0fab0cb8e698f9b82c82d5d2d45c39ec2e88bc911fc1e5520fc022831d82c8fda97cffe864c9e1773318565a1b7d89d8d211cc9dbc4", @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x16, 0x2000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001740)={'yam0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001880)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000004}, 0xc, &(0x7f0000001840)={&(0x7f0000001780)=@newqdisc={0x88, 0x24, 0x2, 0x70bd2b, 0x25dfdbfc, {0x0, r2, {0xf, 0xc}, {0xfff1, 0xffe0}, {0xfff1, 0xf}}, [@TCA_STAB={0x3c, 0x8, [@TCA_STAB_BASE={0x1c, 0x1, {0x4, 0x0, 0x100000001, 0x0, 0x2, 0x81, 0xffffffffffff8001, 0x9}}, @TCA_STAB_BASE={0x1c, 0x1, {0x5, 0x1f, 0x2, 0x3, 0x3, 0x1, 0x3}}]}, @qdisc_kind_options=@q_dsmark={{0xc, 0x1, 'dsmark\x00'}, {0x1c, 0x2, [@TCA_DSMARK_SET_TC_INDEX={0x4}, @TCA_DSMARK_SET_TC_INDEX={0x4}, @TCA_DSMARK_DEFAULT_INDEX={0x8, 0x2, 0x80000000}, @TCA_DSMARK_DEFAULT_INDEX={0x8}]}}]}, 0x88}, 0x1, 0x0, 0x0, 0x800}, 0x20044801) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$KDGKBLED(r3, 0x4b64, &(0x7f0000000100)) 00:44:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x400000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2618.389741] input: syz1 as /devices/virtual/input/input2711 [ 2618.395954] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="15") ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2618.463355] input: failed to attach handler leds to device input2711, error: -6 00:44:18 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2618.649974] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:18 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:18 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100e4ffffff00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x700000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000000280)) 00:44:18 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x80000, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = accept(r0, &(0x7f0000000040)=@can, &(0x7f0000000140)=0x80) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x1, 0x8001, 0x6, 0x4a89a548, 0x4, 0x0, 0x100000000, {0x0, @in6={{0xa, 0x4e24, 0x4a, @local}}, 0x3, 0x7ff, 0x7, 0xc18, 0xed58}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000002c0)={r2}, &(0x7f0000000300)=0x8) setsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000340)={@multicast2, @multicast2, @loopback}, 0xc) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7fffffff, 0x204000) bind$bt_rfcomm(r3, &(0x7f0000000100)={0x1f, {0x2, 0x0, 0x3, 0x4, 0x2, 0x3}, 0x38}, 0xa) [ 2618.813128] input: syz1 as /devices/virtual/input/input2712 [ 2618.850202] input: failed to attach handler leds to device input2712, error: -6 00:44:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r1, 0x8008ae9d, &(0x7f0000000280)) [ 2618.850996] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x7fffffff, &(0x7f0000000100)="0a5c2d618f4999e564a4904c227db0a85678a72c0240") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000900)=@newtclass={0x1d20, 0x28, 0x8, 0x70bd2c, 0x25dfdbfd, {0x0, r2, {0x8, 0x3}, {0xd, 0xffff}, {0xfffb, 0x4}}, [@TCA_RATE={0x8, 0x5, {0x3}}, @TCA_RATE={0x8, 0x5, {0x4b8, 0x8}}, @TCA_RATE={0x8, 0x5, {0x1, 0x1}}, @TCA_RATE={0x8, 0x5, {0x0, 0x1}}, @tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8, 0x1, 0x8}}}, @tclass_kind_options=@c_htb={{0x8, 0x1, 'htb\x00'}, {0xc40, 0x2, [@TCA_HTB_CTAB={0x404, 0x3, [0x8, 0x8, 0x800, 0x138, 0x2, 0x6, 0x8, 0x70, 0x10001, 0xf0c0, 0x20, 0x3f, 0x80000000, 0x5d0, 0x1, 0x1, 0xd0, 0x0, 0x8, 0x5, 0xee, 0x2, 0x799, 0xffffffffffffff34, 0xff7, 0x2, 0x800, 0x6, 0x7fffffff, 0x4, 0x7f, 0x1, 0x6, 0x8, 0xfffffffffffffffc, 0x5, 0x4, 0xfffffffffffffff9, 0x1000, 0x7, 0x1, 0xfffffffffffffff8, 0x6, 0x8001, 0x4, 0x8, 0x6, 0x2, 0x1, 0xffffffff, 0x7fff, 0x698, 0x40, 0x3, 0x0, 0xd4, 0x8, 0x8000000000, 0x5e0bffe, 0xf6, 0xce2c, 0x738ea73d, 0x82, 0x80000001, 0x7, 0x0, 0x6, 0x7, 0x0, 0x401, 0x4f34, 0x8, 0x4, 0x81, 0x2, 0x4, 0x4a3d, 0x1f, 0xf1, 0x3, 0x3, 0x6, 0x2, 0x2, 0xfffffffffffffff8, 0x10001, 0x8d6, 0xd97, 0x7, 0x2, 0xe6, 0x1, 0x7, 0x1f, 0xb26e, 0x8, 0x1, 0x1f, 0x6, 0x2, 0x80000001, 0xfffffffffffffffa, 0x2, 0x0, 0x81, 0x6, 0x10f, 0x4, 0x2, 0x2, 0x0, 0x34e, 0x3f, 0x1ff, 0x8e4, 0x4, 0x20, 0x400, 0xfffe0, 0x9, 0x6, 0xffffffff, 0x6ef, 0x2, 0x0, 0x1487, 0x6, 0x7, 0x401, 0x8, 0x6, 0x0, 0x2, 0x0, 0x1f, 0x7, 0x3, 0x14000000000000, 0x603618f5, 0x9, 0x9, 0x8, 0x6c, 0x1000, 0x66, 0x5, 0x9, 0xffff, 0x6, 0x15, 0x224, 0x1, 0x0, 0x0, 0x3, 0x4, 0x80, 0xfffffffffffff8ae, 0xfffffffffffffffe, 0xffffffc000000000, 0x5, 0x9, 0x6, 0x0, 0x15, 0x4, 0x401, 0x200, 0x8da, 0x2, 0x7, 0x80000001, 0x774, 0xd8, 0x5, 0x10000, 0x8, 0x100000000, 0x7, 0x4, 0x400, 0xff, 0xffffffffffffff80, 0x2, 0x634, 0x9, 0x9ea, 0x2864cd79, 0x9, 0x8, 0x4, 0x3, 0x80000000, 0x6, 0x0, 0x2, 0x0, 0x4, 0x2, 0xd2, 0x0, 0x73c, 0x5, 0x0, 0xfffffffffffffffb, 0x80, 0x5, 0x1, 0x6, 0xfd7, 0x2, 0x2040, 0x7f, 0x8, 0xff, 0x0, 0x80, 0x8000, 0x5, 0x1a, 0x4, 0x35ec, 0x1000, 0x8000, 0x0, 0x1, 0x8, 0x1, 0xfffffffffffffff8, 0x0, 0x401, 0x1, 0x80000001, 0x8001, 0x100000000, 0x0, 0xe996, 0xcd8e, 0x2, 0x4, 0x10001, 0x88, 0x5, 0x8, 0x40, 0x73d7581f, 0x0, 0x100, 0x80, 0x8, 0x1f0, 0x8, 0x7, 0x1401, 0x2, 0x9]}, @TCA_HTB_RTAB={0x404, 0x4, [0x2a, 0x2, 0x7, 0x2, 0x7ff, 0x3ff, 0x7ff, 0x7, 0x1, 0x1000, 0x0, 0x9, 0x6, 0xffffffff, 0x1, 0x6, 0x5, 0x8, 0x6, 0x7, 0x9, 0xe2, 0x2627, 0xff, 0x6, 0xffffffffffffff81, 0x8, 0x2, 0x1b4, 0x6, 0x4, 0x64f, 0x0, 0xffffffffffffff1b, 0x5, 0x8, 0x420d, 0x81, 0x20, 0x3, 0x8000, 0x7f, 0x1f, 0xffffffff, 0x3ff, 0x330, 0x5, 0xffffffffffffffff, 0x401, 0x100, 0x4, 0x1, 0x1ff, 0x1, 0x8, 0x6bb, 0x0, 0x3, 0x1, 0xffffffffffff7d39, 0x4, 0xef6, 0x80, 0x4d, 0x81, 0xffffffffffff62da, 0x6c, 0x3, 0x2, 0x2, 0x1f9f, 0x8000, 0x0, 0x81, 0x326838d3, 0x2, 0x7, 0x5, 0x7, 0x7, 0x0, 0x1, 0x6, 0x0, 0x7, 0x0, 0x20, 0x0, 0xc5b, 0x9, 0x8, 0x1ff, 0x0, 0x4, 0x80000000, 0xfffffffffffffff8, 0x4, 0x80000000, 0x9, 0x10000, 0x1, 0x7, 0x2, 0x80000, 0x6, 0x1, 0x2, 0x81, 0x6, 0xffff, 0x7, 0x200, 0x7ff, 0xffffffff80000001, 0x1, 0x1, 0x0, 0x80, 0x94e, 0x8001, 0x1, 0x17, 0x5, 0x7, 0x6, 0x6, 0xfffffffffffffff7, 0x7, 0x1, 0x5, 0x5, 0x5, 0x5, 0xe1fd, 0x50f8, 0xcf, 0x4, 0x10000, 0x3, 0x8, 0x1ff, 0x7, 0x6ea, 0x101, 0x0, 0x6, 0x1, 0x20, 0x80000001, 0x39, 0x1, 0x5, 0x800, 0x0, 0x0, 0x1, 0x5, 0x4, 0xb9, 0x10001, 0x85, 0x200, 0x2, 0x1, 0xffffffff, 0xc000000000000000, 0x1000, 0x7ff, 0x80000000, 0x6, 0x8, 0x0, 0x1, 0x81, 0x4, 0x7fffffff, 0x5, 0x5, 0xcd, 0x7, 0x7, 0x4, 0x4, 0x40, 0xffff, 0x9, 0x7, 0x9, 0x2, 0xdba, 0x7, 0x10000, 0xfff, 0xbf, 0x8, 0x0, 0x4, 0x6, 0x8, 0x4, 0x45a, 0x8, 0x5, 0x0, 0x5, 0x10000, 0x4, 0x2, 0x6, 0x4, 0x3, 0x200, 0x8, 0x3ff, 0xfffffffffffff5e0, 0x80000000, 0x5, 0xd5, 0x80000000, 0x4, 0x9, 0x6, 0x0, 0x5, 0x4, 0x765c, 0x9, 0x2, 0x1, 0x8, 0xffff, 0x5, 0x3, 0xffffffff, 0x3, 0x6a68, 0x2, 0xf23, 0x0, 0x7fffffff, 0xa4a, 0xff, 0x9, 0x8, 0x5, 0x0, 0xc221, 0x100000000, 0x8, 0xffffffffffffff7f, 0x2, 0x7fff, 0x8001, 0x6, 0x8, 0x101]}, @TCA_HTB_RTAB={0x404, 0x4, [0x5a, 0x10001, 0x1ff, 0x4, 0x8001, 0xbf1d, 0x9, 0x7fffffff, 0x4, 0x1, 0x3ffc, 0x800, 0x7a40, 0x200, 0x3, 0x1000, 0x8000, 0xfff, 0x1, 0xf438, 0xfd, 0x0, 0x1f, 0x101, 0x800, 0x9, 0x4, 0x0, 0x777, 0x200, 0x800, 0x1, 0xffffffff, 0x7, 0x9, 0x18000000000000, 0x4, 0x40, 0x1, 0x10001, 0x9, 0xfffffffffffffffe, 0xfffffffffffffbc9, 0x0, 0x2, 0x200, 0x4, 0xffffffffe1df65ee, 0x81, 0xb5c, 0x6070, 0x20, 0x2, 0xaff, 0x6, 0x7f, 0x7fff, 0x6, 0x3, 0x2, 0x1, 0x85, 0x9, 0x4863, 0x1, 0x200, 0x10001, 0x8000, 0x4, 0x80000000, 0x1, 0x80000001, 0x1, 0x101, 0x800, 0x9, 0x4, 0x0, 0x2, 0x4, 0x748a147c, 0x6, 0x2, 0x10000, 0xa69b, 0xb5cf, 0x7fffffff, 0x5, 0x5, 0xff, 0x74a8, 0x3ec6d8a4, 0x0, 0x1, 0x7, 0x7, 0x4, 0x6, 0x4, 0x0, 0x0, 0xfffffffffffffffb, 0x2, 0x3, 0x99, 0x2, 0x10001, 0x3, 0x1, 0xae, 0x0, 0x5, 0x1, 0x80000001, 0x7, 0x5, 0xffffffffffffffff, 0x9, 0x7ff, 0x0, 0xfff, 0x30000000, 0xffffffff, 0x4, 0x401, 0x200, 0x2, 0x0, 0x3, 0x4, 0xca6, 0x8, 0x3, 0x2, 0xffffffff80000000, 0x7fffffff, 0xffff, 0x80000001, 0xfff, 0x0, 0x0, 0x1, 0x7fff, 0x9, 0x100000001, 0x5, 0x101, 0x10000, 0x3, 0x3, 0x9, 0x8, 0x0, 0x7c0, 0x3f, 0x6, 0x7fffffff, 0x5, 0x6, 0x7fffffff, 0x9, 0x7322, 0x7, 0x80, 0xfffffffffffffffa, 0x2eb8, 0x7f, 0x7f, 0x3ff, 0x1, 0x5, 0x8, 0x1, 0x7fff, 0xfffffffffffffff8, 0x5, 0x760b, 0x29, 0x8b3, 0x80000001, 0x401, 0x1, 0x80000001, 0x10000, 0x5, 0x0, 0x4, 0x6, 0x2, 0x2, 0x0, 0x8, 0x1000, 0x0, 0x5, 0x8, 0x1, 0x258, 0x3f, 0x1, 0x0, 0xfffffffeffffffff, 0x7fff, 0x4, 0xffff, 0x4, 0xfffffffffffffc01, 0xffff, 0xfff, 0x8, 0x6, 0x20, 0x755, 0x80, 0x7ff, 0x3, 0x100, 0x1f, 0x7, 0x6, 0xbbf, 0x100000001, 0x2, 0x100, 0x7fffffff, 0x80, 0x101, 0x0, 0x10000, 0x0, 0x2, 0x7, 0x3ff, 0x5, 0x5, 0x7ff, 0x3f, 0xd3b, 0x7, 0x7, 0x381, 0x9, 0xfff, 0x8, 0x1, 0x7, 0x8326, 0x4, 0x9, 0xfffffffffffffff8, 0x3ff, 0x4, 0x8, 0x4, 0x0, 0x6]}, @TCA_HTB_PARMS={0x30, 0x1, {{0x8f, 0x1, 0xfffffffffffffffa, 0x1, 0xff, 0x6}, {0x8, 0x0, 0x100000000, 0xff, 0x2, 0x4}, 0x67ee, 0x1, 0x1, 0x9, 0x40}}]}}, @tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0x14, 0x2, [@TCA_ATM_HDR={0x10, 0x3, "730ff4dbe015d8867d"}]}}, @tclass_kind_options=@c_htb={{0x8, 0x1, 'htb\x00'}, {0x105c, 0x2, [@TCA_HTB_CTAB={0x404, 0x3, [0x7fff, 0xa0, 0x534f05d, 0x100, 0xff, 0x8, 0x7, 0x3f, 0x2, 0x401, 0x80, 0x9d, 0x1, 0x1, 0xd21, 0x9, 0x4, 0x8, 0x130d, 0xffffffffb1c7a7d1, 0x74d3, 0x752d, 0x20, 0x6, 0x200, 0x7, 0x1ff, 0x6, 0x2, 0x3f, 0x3, 0x6, 0x8, 0x401, 0xffff, 0x7, 0x4, 0x4, 0x31, 0x100000001, 0x4, 0x1, 0x5, 0xfff, 0x5, 0xffff000, 0x0, 0x0, 0xe04b, 0x3, 0x4, 0x110b, 0x1, 0x2, 0x1, 0x3, 0x9, 0x1, 0x400, 0x13, 0x5, 0x2, 0x8, 0xffffffffffffff00, 0xffffffffffffe340, 0x8001, 0x37df, 0x4, 0xffffffffffffffff, 0x8, 0x401, 0x80000000, 0x6a, 0x24, 0x9, 0x67e, 0x100000001, 0x4, 0x7, 0x0, 0xfffffffffffffff7, 0x1c, 0x8, 0x303, 0x7fff, 0x5, 0xeb, 0xc550, 0x80000001, 0x7, 0x8, 0xfffffffffffffff9, 0xd9c9, 0x4, 0x4d, 0x4, 0xffffffffffffffff, 0xdea, 0x5, 0x800, 0x6, 0x4, 0x4, 0x3, 0xf5c, 0xdb, 0x80000001, 0x10000000, 0x1, 0x8, 0x22, 0x1d0, 0x8001, 0x1, 0x5, 0x7, 0x3, 0x4, 0x0, 0x95, 0x2, 0x40, 0x81, 0xb8, 0x80000001, 0x7, 0x91, 0xa94, 0x101, 0x62b3, 0x2, 0x4, 0xe0, 0x5, 0xd3ad, 0x10001, 0xa4c, 0xcd, 0x8, 0x5, 0xd08, 0x3000000000, 0x7fffffff, 0x9, 0xfffffffffffffffa, 0x40, 0x5, 0x100000000, 0x16a44a84, 0x974, 0x4a52, 0x1, 0x3, 0x2, 0xfff, 0x0, 0x9, 0x0, 0x6, 0x6, 0xffffffffffff9911, 0x7fff, 0x20, 0x80000001, 0xc496, 0x0, 0x401, 0xfffffffffffffffc, 0xe22, 0x6, 0x401, 0x400, 0x1, 0x0, 0x1, 0xffffffff, 0x7, 0x5, 0x7ff, 0x81, 0xac9, 0x6, 0x3, 0x7, 0x1, 0xffff, 0x1f, 0x20, 0xffffffff, 0xfff, 0xc9, 0xc3f5, 0x800, 0x9, 0x100, 0xff, 0x7, 0x1, 0xda, 0x9, 0x1, 0xffffffffffffffff, 0x2, 0x7fff, 0x10000, 0x7, 0x7ff, 0x2, 0x4, 0x3, 0x6, 0x7, 0x400, 0x81, 0x0, 0x7, 0x0, 0x51e, 0x4, 0x100000001, 0x86, 0x9, 0x2, 0x5, 0x2dbf, 0x1, 0xff, 0xffffffffffffffc0, 0x2, 0x140, 0x4, 0x40, 0x400, 0xfffffffffffffff7, 0x5, 0x8385, 0x5e17b5, 0xb4b, 0x1f, 0x100, 0x8, 0x10001, 0x2, 0x3, 0x6, 0x8, 0xe95, 0xdde7, 0x1e, 0x9, 0x401, 0x9, 0x0, 0x9, 0x1f, 0x101]}, @TCA_HTB_RATE64={0xc, 0x6, 0x101}, @TCA_HTB_CTAB={0x404, 0x3, [0x816, 0x0, 0x15, 0x4, 0x9, 0x10001, 0x3, 0x1408, 0x10001, 0x993, 0x8000, 0x2ba, 0x1, 0xffffffffffffffff, 0x3, 0x66, 0xffff, 0x7, 0x82e5, 0x8, 0x1, 0xffffffff7fffffff, 0x9, 0x4, 0x6, 0x8001, 0x4, 0x5d6a, 0x590, 0x8, 0x7ff, 0x1, 0x9, 0x347, 0x3, 0x0, 0x6, 0x100000000, 0x7fff, 0x2, 0x2, 0x5, 0x5, 0x3, 0x3ff, 0x9, 0x10000, 0x6, 0x9, 0x7, 0x1, 0xd6f2, 0x5, 0x4, 0x200, 0x0, 0x100000001, 0x1, 0x5, 0x1, 0x1000, 0x8, 0x81, 0x60000, 0x5, 0x8001, 0x2, 0x6, 0x7, 0x4f946d52, 0x8, 0x4, 0x5, 0x0, 0xfffffffffffff800, 0x1, 0x6, 0x397, 0x52a, 0x3ff7, 0x100000000, 0x5, 0x1, 0x5, 0x6, 0x8, 0x9, 0x8, 0x4, 0xc, 0x9, 0x401, 0x7, 0x6b31, 0x1, 0x3, 0x9, 0x0, 0x6, 0x100, 0x9, 0x461127d6, 0x6, 0x10001, 0x63, 0x2, 0x8, 0xfffffffffffffff9, 0x10000, 0x3, 0x401, 0x1, 0x8000, 0x1, 0x100000001, 0x80, 0x40, 0x7, 0x8, 0x2, 0x8, 0x2, 0x401, 0x4, 0x2, 0x0, 0x2, 0x0, 0x8, 0x8, 0x8, 0x4, 0x8de, 0xbd4, 0xff, 0xd64, 0x3, 0xed, 0x9, 0x400, 0x6, 0x1, 0xa76, 0x6, 0x7fff, 0x0, 0x4, 0x9, 0x20, 0x400, 0x2, 0x3, 0xfffffffffffffffd, 0x80000000, 0x3, 0x1, 0x0, 0x401, 0x4, 0x2e3, 0x4, 0x22, 0x57c7, 0x10001, 0xcb6, 0x80000, 0x5, 0x20, 0x0, 0x15fbc0, 0x1, 0x3f, 0x0, 0x6, 0x1, 0x8, 0x1c, 0xf7d1, 0x1, 0x7, 0x3bc55c2, 0x1, 0x5, 0x80000000, 0x9, 0x5, 0x6, 0x1, 0xf4e2, 0x76, 0x1d6, 0xfffffffffffffffd, 0x5a8, 0x4, 0x2, 0xfffffffffffffffe, 0x1, 0x6d, 0x1, 0xd6, 0x2fec, 0xff, 0x4, 0x8000, 0xffffffff, 0x3ac15701, 0x7ff, 0x3, 0xe8, 0xa, 0x98, 0x0, 0x3, 0x8, 0x6, 0xffffffffffffffff, 0x27, 0x4e3d7b72, 0xae2, 0x5, 0x4, 0x200, 0x9, 0x8, 0xefb, 0x7, 0x2d, 0xff, 0x51b, 0x7, 0x8, 0x5, 0x8, 0x800, 0x0, 0x7fff, 0x5, 0x6, 0x1f, 0x7fff, 0x8, 0x1, 0x200000000000, 0x4, 0x4, 0x100, 0x1, 0x8, 0x4, 0x86, 0x4040000000, 0x1, 0x100000001, 0x6, 0xff, 0x7ff]}, @TCA_HTB_RTAB={0x404, 0x4, [0x0, 0x9, 0x0, 0xffffffffffffff7f, 0x1, 0x5, 0x401, 0x1, 0x80, 0x401, 0x5, 0x9, 0xfffffffffffffff8, 0x7, 0x0, 0x7, 0x77c, 0x1, 0x58b8, 0x0, 0x8c, 0x9, 0x0, 0x4, 0xffffffffffffffb3, 0x3ff, 0x5, 0x80000000, 0xdd, 0x9, 0x9, 0x1, 0x3f, 0x2, 0x8, 0x0, 0x800, 0x7fffffff, 0x7, 0x6, 0x25d92ae9, 0x800, 0x20, 0x9, 0x80, 0x5, 0xea8, 0x4, 0x188, 0x3, 0x0, 0x6, 0x2e, 0x2, 0x1f, 0x40400000, 0x3, 0x5, 0x9, 0x0, 0x9da, 0x6, 0x0, 0x4, 0x8001, 0x80, 0x1f, 0xeb, 0x4, 0x8, 0x8, 0x0, 0x5, 0xf0, 0x9, 0x6, 0x81, 0x1ff, 0x99ae, 0x200, 0xfffffffffffffffc, 0xb80, 0x781e, 0x7, 0x200000000, 0x101, 0x7, 0x80000001, 0x4, 0x0, 0x7fffffff, 0x4, 0x40, 0x8000, 0x8, 0xffffffffffff9809, 0xffffffffffffff00, 0xfe, 0x4, 0x0, 0x6, 0x4, 0x7, 0x7, 0x6, 0x8000, 0x0, 0x8000000000, 0x7, 0x0, 0x6, 0x0, 0x400, 0x3, 0xffff, 0x8, 0x1, 0x3, 0xafb2, 0x85, 0x8, 0x3ff, 0xfffffffffffffff7, 0x0, 0xfffffffffffffffe, 0xa5ae, 0x358, 0x100000000, 0x68fe, 0x2, 0x9, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x4, 0x6, 0x8, 0x4, 0x24de, 0x0, 0x800, 0x7, 0x1, 0x10000, 0xfffffffffffffffb, 0x1eecefcd, 0x3, 0x7, 0x7, 0x3f, 0xfffffffffffffffb, 0x1ff, 0x3, 0xfff, 0x7f, 0xa90f, 0x5, 0xffffffffffff752a, 0x7, 0x6, 0x8, 0x100, 0x3e0, 0x3ff, 0x9, 0x6, 0x80000000, 0x9, 0x956, 0x10000, 0x2, 0x1ff, 0x1f, 0x4, 0x8, 0x80000001, 0x100000000, 0x7fff, 0x9, 0x6, 0x8, 0x0, 0xffffffffffffff8e, 0xfffffffffffffffb, 0x84a8, 0x8, 0xffffffffffffff81, 0x100, 0xffff, 0x7d4a, 0xfffffffffffffffd, 0x3, 0x800000000000, 0x101, 0xaf, 0x4, 0xeb, 0x28e6, 0x8000, 0x7, 0x100000000, 0x7fff, 0x1, 0x100, 0x7, 0x4, 0x81, 0x1, 0x9, 0x9, 0x70, 0x5fe3, 0x4, 0x6, 0x3, 0x2, 0x8, 0x3, 0x6, 0x3, 0x7fffffff, 0x5, 0x3, 0x3, 0x9, 0x4, 0x2, 0xb496, 0xc0c9, 0x6, 0xb8f, 0x4, 0x7, 0xee, 0x0, 0x8, 0x6, 0x10, 0x0, 0x4, 0x8, 0x0, 0x0, 0x7fff, 0x9, 0x1, 0x4, 0x81, 0x3f, 0x1000, 0x3, 0x5, 0x5001]}, @TCA_HTB_PARMS={0x30, 0x1, {{0x4, 0x2, 0x4, 0x2, 0x3, 0x1}, {0xe0, 0x0, 0x10001, 0x6eaf, 0x4, 0x2457}, 0x8, 0x81, 0x50a010fc, 0x3, 0x40}}, @TCA_HTB_RTAB={0x404, 0x4, [0x7, 0x8a, 0x3, 0x4, 0x1, 0x2, 0x6, 0x8, 0x7, 0x8001, 0x9, 0x3, 0x1, 0xe2, 0xffff, 0x100, 0x2, 0x9, 0x8, 0x40000000000, 0x8, 0x0, 0x4, 0x2, 0x5, 0x4, 0xff, 0x4, 0x4, 0x6, 0x2, 0x0, 0x7fff, 0x9, 0xfff, 0x3, 0x0, 0x6000000000000000, 0x226, 0x0, 0x4, 0x6, 0x8, 0x557, 0x3, 0xb5c, 0x1, 0xffffffffffff5486, 0xfff, 0x6, 0x6, 0x7f, 0x9, 0x3, 0x8, 0x0, 0xffffffffffff60fe, 0x7, 0x9, 0xe74, 0x1, 0x3, 0x5, 0x6, 0x9, 0x42052af4, 0x2, 0x3a, 0x1f, 0xfffffffffffff69f, 0xd7, 0x200, 0x31, 0x4, 0x1ff, 0xfff, 0x1, 0x24ae, 0xdc95, 0x0, 0x4337, 0xdd1, 0x8001, 0x3, 0x401, 0x7, 0x1, 0x1dc, 0x20, 0x6, 0x4, 0x3f, 0x7, 0x4, 0x0, 0x1ff, 0xf92, 0x10000, 0x9, 0x8001, 0x0, 0x6, 0x6, 0x7fffffff, 0x0, 0x800, 0x40, 0x80000001, 0x9, 0x9, 0x9, 0x5, 0x3, 0x7, 0x12000000000, 0x80000001, 0x1, 0x2, 0x9, 0x0, 0x1, 0x8, 0x9, 0x80, 0x1, 0xfffffffffffffffe, 0x890, 0x1, 0x4c, 0x1, 0x8a, 0x9, 0x100, 0x10001, 0x315, 0x9, 0x8cc, 0x8, 0x8, 0x7, 0x0, 0x798c, 0x80, 0x3f, 0xf1, 0x7fff, 0x3, 0x7, 0x9, 0x6c3, 0x1000, 0xaf4d, 0x5, 0x981a, 0x5, 0x400000, 0x4, 0x58d, 0x7, 0x9, 0x5, 0x9, 0x4, 0x5, 0x0, 0x9, 0xb59, 0xff, 0x80000000000000, 0x3, 0x129e, 0x100000000, 0x1, 0x200, 0xa7, 0x200, 0x6, 0x7, 0x10000, 0x200, 0x8, 0x0, 0x0, 0x6, 0x3, 0x6, 0x80000001, 0x4, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0x3ff, 0x10000, 0x5, 0x9, 0x2fe7, 0x7, 0xff, 0x2, 0x7, 0x2, 0x800, 0xffffffffffffffef, 0x5, 0x7, 0xa32, 0x3, 0x6, 0x6, 0x81, 0xa8b6, 0x7, 0x5, 0x1f23, 0x9, 0xffffffffffffff4f, 0x20, 0x7201, 0x408000000, 0x7ff, 0x3, 0x1, 0xfffffffffffffff8, 0x2, 0x1, 0x5b6, 0x6, 0x1, 0x3, 0x0, 0x6, 0x6, 0x8000, 0x8, 0x100, 0x20, 0x7, 0xf01, 0xfa1, 0x4, 0x7ff, 0x2, 0xf55d, 0x84, 0x4, 0xc000, 0xfffffffffffffffe, 0x7, 0x9, 0x0, 0x0, 0x7fffffff, 0x9, 0x3ff, 0x47e]}, @TCA_HTB_CEIL64={0xc, 0x7, 0x9}]}}]}, 0x1d20}, 0x1, 0x0, 0x0, 0x1}, 0x90) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) 00:44:19 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xf6ffffff, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebde00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r1, 0x8008ae9d, &(0x7f0000000280)) [ 2619.050308] input: syz1 as /devices/virtual/input/input2714 [ 2619.065280] input: failed to attach handler leds to device input2714, error: -6 [ 2619.072944] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2619.091967] input: syz1 as /devices/virtual/input/input2715 [ 2619.097890] input: failed to attach handler leds to device input2715, error: -6 00:44:19 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r1, 0x8008ae9d, &(0x7f0000000280)) 00:44:19 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31007fffffff00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x6c00, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x41a0ae8d, 0xfffffffffffffffd) dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f0000000200)={@remote, @multicast1, @loopback}, &(0x7f0000000240)=0xc) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r5, 0x20000000008912, &(0x7f00000000c0)="0a5c2b88732d0240316285") fsetxattr$trusted_overlay_nlink(r5, &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'L/', 0x4}, 0x28, 0x3) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x200000, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r6, 0x4018aee2, &(0x7f0000000180)={0x0, 0x20, 0x175, &(0x7f0000000140)=0x857}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) syz_open_dev$video(&(0x7f0000000380)='/dev/video#\x00', 0x4, 0x80) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x3fc, &(0x7f0000000440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@uid_gt={'uid>', r7}}, {@smackfsfloor={'smackfsfloor', 0x3d, '$securityself'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r1, 0x8008ae9d, &(0x7f0000000280)) [ 2619.347321] input: syz1 as /devices/virtual/input/input2716 [ 2619.362049] input: failed to attach handler leds to device input2716, error: -6 [ 2619.369773] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2619.392221] input: syz1 as /devices/virtual/input/input2717 00:44:19 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r1, 0x8008ae9d, &(0x7f0000000280)) 00:44:19 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667303", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2619.443396] input: failed to attach handler leds to device input2717, error: -6 00:44:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x6, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000000000300"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:19 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB="2c636f6e74650f1b3d73797361646d5f132c00"]) [ 2619.637033] input: syz1 as /devices/virtual/input/input2718 [ 2619.661848] input: failed to attach handler leds to device input2718, error: -6 [ 2619.686535] input: syz1 as /devices/virtual/input/input2719 [ 2619.732951] input: failed to attach handler leds to device input2719, error: -6 00:44:19 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:19 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r1, 0x8008ae9d, &(0x7f0000000280)) 00:44:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xf9fdffff00000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:19 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667303", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:19 executing program 0: setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) r0 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x440000) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x1, 0x800) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000240)=r1) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e20, @local}}, [0xffff, 0x6, 0x6, 0x80, 0x8000, 0x9, 0x1, 0x2, 0x8, 0x3, 0x2, 0x80000001, 0x9, 0x8, 0x2]}, &(0x7f0000000380)=0x100) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000003c0)={r2, 0x8001, 0x6, [0x1, 0x7, 0x80000001, 0x3, 0xfffffffffffff60b, 0x6]}, &(0x7f0000000400)=0x14) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebc800"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:20 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r1, 0x8008ae9d, &(0x7f0000000280)) [ 2619.885950] input: syz1 as /devices/virtual/input/input2720 [ 2619.897587] input: failed to attach handler leds to device input2720, error: -6 [ 2619.922015] input: syz1 as /devices/virtual/input/input2721 00:44:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40000, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000100)) ioctl(r0, 0x1d, &(0x7f0000000b40)="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") syz_mount_image$iso9660(&(0x7f0000000340)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0xaaaaaaaaaaaad9f, &(0x7f0000000480)=[{&(0x7f0000000380)="2475b384e4e8124f1a2d46638767b05171e133d383306349cc05e5df25f6362684a6811f7a0bce0f74412f42a35c6b385821e908f712129cf7685b2dbc2b47fc44c2d61c764d9ebb4cd7c90e9617b43fb99a30fa96c1cb9bcef11ca4c9d3d7a6ec8583538aff860c3d0ffbead86b068628500f28a1d8d91ea763cb5a8fc9aeee1307fe4e3a1ba5393eb97546917aa40ab6edaae4d1a441fe6dd33c6d4c5b17adf0dd8050148041fe8609076c", 0x0, 0xfffffffffffffff9}, {&(0x7f0000000440)="fd1f7c664fb0277c772f1a55571641f7bed38d18ea07f86ba21f6abf213a2ad66d85c36d504eba1f3d0ad7b736a238cb7579bca7", 0x0, 0x7fff}], 0x400, &(0x7f0000000200)=ANY=[]) 00:44:20 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:20 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667390", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xae0d, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2619.963370] input: failed to attach handler leds to device input2721, error: -6 00:44:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2620.096206] input: syz1 as /devices/virtual/input/input2722 [ 2620.107052] input: failed to attach handler leds to device input2722, error: -6 [ 2620.136184] input: syz1 as /devices/virtual/input/input2723 [ 2620.192405] input: failed to attach handler leds to device input2723, error: -6 00:44:20 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d70667304", 0x0, 0x0) 00:44:20 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:20 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\b', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x7400, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2620.263685] ISOFS: Unable to identify CD-ROM format. 00:44:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100b5eb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:20 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r1, 0x8008ae9d, &(0x7f0000000280)) [ 2620.376412] input: syz1 as /devices/virtual/input/input2724 [ 2620.398070] input: failed to attach handler leds to device input2724, error: -6 00:44:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8, 0x12000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB="696f636861727365743d69736f383835392d322c63727566742c696f636861727365743d6d61630500000069632c636865636b3d7374726963742c73657373696f6e3d3078303030303030303030303030303031362c6769643d", @ANYRESHEX=0x0, @ANYBLOB="2c6d617070651f24736563757269ebf4e4826c662c657569643d", @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) 00:44:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x1f00, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:20 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100bbeb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r1, 0x8008ae9d, &(0x7f0000000280)) [ 2620.557224] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2620.600284] input: syz1 as /devices/virtual/input/input2726 [ 2620.620082] input: failed to attach handler leds to device input2726, error: -6 [ 2620.667803] ISOFS: Unable to identify CD-ROM format. 00:44:20 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d706673f6", 0x0, 0x0) 00:44:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r1, 0x8008ae9d, &(0x7f0000000280)) 00:44:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xffffff7f00000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:20 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebc400"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2620.804638] ISOFS: Unable to identify CD-ROM format. 00:44:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2620.849495] input: syz1 as /devices/virtual/input/input2727 [ 2620.859646] input: failed to attach handler leds to device input2727, error: -6 [ 2620.876075] input: syz1 as /devices/virtual/input/input2728 00:44:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x560a, &(0x7f0000000140)="0a5c2d027ef5b41f49c7b19f40311270001abb") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2620.920538] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2620.940094] input: failed to attach handler leds to device input2728, error: -6 00:44:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x600000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000000000600"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2621.124619] input: syz1 as /devices/virtual/input/input2729 [ 2621.130406] input: failed to attach handler leds to device input2729, error: -6 00:44:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f00000000c0)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB="2c636f6e746578743d73797361646d5f752c00f2051145d035b410e225fac39345742fbe6776e76dd732ef074282a9b4df25752db8fc72db8e10658f2564c2c48772018e638175413aa986b406"]) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x8) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f00000002c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x2, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000240)={0x1, 0x75}, 0x2) 00:44:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:21 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) [ 2621.203050] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2621.226361] input: syz1 as /devices/virtual/input/input2730 00:44:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x100000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2621.276540] input: failed to attach handler leds to device input2730, error: -6 00:44:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667303", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000000208800"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x0) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) process_vm_readv(r1, &(0x7f0000000180)=[{&(0x7f0000000140)=""/8, 0x8}, {&(0x7f0000000340)=""/205, 0xcd}, {&(0x7f0000000440)=""/122, 0x7a}, {&(0x7f00000004c0)=""/184, 0xb8}], 0x4, &(0x7f0000001b80)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f0000000580)=""/213, 0xd5}, {&(0x7f00000016c0)=""/253, 0xfd}, {&(0x7f00000017c0)=""/137, 0x89}, {&(0x7f0000001880)=""/105, 0x69}, {&(0x7f0000001900)=""/211, 0xd3}, {&(0x7f0000001a00)=""/76, 0x4c}, {&(0x7f0000001a80)=""/238, 0xee}], 0x8, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000200)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c6d61703d61636f726e2c7375626a5f747970653d24736563757269747973656c662c657569643de0ff901e144f10b1ed42bf43bd5d291c9ed47ce40bc484a73bb76e7698147ccda45387a4ce3b260b7f1b44ebf5c36765778f736ad67018b6c19e695bd6c4fd0da771ef471d3da3a99fa75b5cec06badd1cbc054aa5aafe3c0d19b6069a49d8eda048bdf22c2db8a9358fd7346537cfb8285a58e4", @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) [ 2621.422237] input: syz1 as /devices/virtual/input/input2731 [ 2621.437797] input: failed to attach handler leds to device input2731, error: -6 00:44:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2621.472779] input: syz1 as /devices/virtual/input/input2732 [ 2621.512043] input: failed to attach handler leds to device input2732, error: -6 00:44:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x0) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x48000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00l\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2621.613088] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:21 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000440)='/dev/midi#\x00', 0x80000000, 0x40080) getsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000480), &(0x7f00000004c0)=0x4) socket$can_raw(0x1d, 0x3, 0x1) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @multicast2}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x149}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000300)={r2, 0x6}, &(0x7f0000000340)=0x8) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") fchdir(r3) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xd8b, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0xfc18, 0x2}], 0x400, &(0x7f00000000c0)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB="2c636f6e746578743d00004e01edbaa92c00ec9729b47a20bcf500a5a78300e93c656416a021ca48ebbd951f0035d10c"]) 00:44:21 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x0) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2621.715262] input: syz1 as /devices/virtual/input/input2733 [ 2621.752702] input: failed to attach handler leds to device input2733, error: -6 00:44:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x6c000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:21 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000000280)) [ 2621.787966] input: syz1 as /devices/virtual/input/input2734 [ 2621.807636] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2621.832406] input: failed to attach handler leds to device input2734, error: -6 00:44:22 executing program 4 (fault-call:5 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x1, &(0x7f0000000140)=[{&(0x7f0000000200)="915433240d16560c09f2f0be735c672cffeaed6e99879266d1fbf587e72929daacfa215e4c9a87f053a4f74855cd5a76ee8dbc92618eb88871e248068ae346c8626d3f1cbd01631b1730e8e09fab3fca915fd842c5442d7cda72072cbf0f190612aaffc417adb3aae63b52bd05baad48506f2aeb748be15c74cea0c3cac98a72d74e8180297af4c0c5417de8fc760c63427f4200d57444eb", 0x98, 0x1000}], 0x0, &(0x7f00000003c0)={[{@commit={'commit', 0x3d, 0xfffffffffffffffb}}, {@usrjquota='usrjquota'}, {@usrquota='usrquota'}, {@data_writeback='data=writeback'}, {@resize_auto='resize=auto'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@uid_eq={'uid', 0x3d, r3}}, {@obj_type={'obj_type'}}]}) 00:44:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebc000"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:22 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667310", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x5, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2621.995979] input: syz1 as /devices/virtual/input/input2735 [ 2622.025325] input: failed to attach handler leds to device input2735, error: -6 00:44:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, &(0x7f0000000280)) [ 2622.072534] REISERFS warning (device loop0): super-6508 reiserfs_parse_options: bad value 0xfffffffffffffffb for -ocommit [ 2622.072534] 00:44:22 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:22 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667302", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebd800"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x5421, &(0x7f0000000280)) 00:44:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x300000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2622.192267] REISERFS warning (device loop0): super-6508 reiserfs_parse_options: bad value 0xfffffffffffffffb for -ocommit [ 2622.192267] 00:44:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x3, 0x8000) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2622.285315] input: syz1 as /devices/virtual/input/input2737 00:44:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc0045878, &(0x7f0000000280)) [ 2622.327771] input: failed to attach handler leds to device input2737, error: -6 00:44:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x40049409, &(0x7f0000000280)) 00:44:22 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfsl', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebc400"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x4800000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xd3a, 0x2801) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000200)=""/195) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000100)={0x3, 0x10001, 0x6, 0x3f, 0x1, 0x5}) [ 2622.516830] input: syz1 as /devices/virtual/input/input2739 [ 2622.536245] input: failed to attach handler leds to device input2739, error: -6 [ 2622.552257] input: syz1 as /devices/virtual/input/input2740 [ 2622.592381] input: failed to attach handler leds to device input2740, error: -6 00:44:22 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x2, &(0x7f0000000280)) 00:44:22 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673c0", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x6800000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000000000f00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB=',conu,\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 00:44:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc0189436, &(0x7f0000000280)) [ 2622.791691] input: syz1 as /devices/virtual/input/input2741 [ 2622.797468] input: failed to attach handler leds to device input2741, error: -6 00:44:23 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667301", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000000000400"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x3000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB="696f6f383835392d322c63727566742c696f63686172736556405212d77fcefb743d6d616363656c7469632c636865636b3dae509c8363742c73657373696f6e3d3078303030303030303030303030303031362c6769643d0000", @ANYRESHEX=0x0, @ANYBLOB="2c6d61703d61636f726e2c7375626a5f747970653d24736563757269747973656c662c65756964af", @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) 00:44:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xae03, &(0x7f0000000280)) [ 2623.025386] input: syz1 as /devices/virtual/input/input2743 [ 2623.036131] input: failed to attach handler leds to device input2743, error: -6 [ 2623.056110] input: syz1 as /devices/virtual/input/input2744 [ 2623.112566] input: failed to attach handler leds to device input2744, error: -6 00:44:23 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc004ae0a, &(0x7f0000000280)) 00:44:23 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x5, 0x5, 0x14, 0x15, "abeece7beff997c96df2f5bfeefa3d140edd14c680e5649581933d7d1cce9fc07a1cc7eb914f9ba87a0804337e74efa8aa3ab744bae2d93681b55eb45e8f7111", "ca72e44b4639d65370e1fb8a37b2920ba1b01f719982c29fce7686d1d70b48ad", [0x7ff, 0x40]}) 00:44:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebda00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x400000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc0045878, &(0x7f0000000280)) [ 2623.326561] input: syz1 as /devices/virtual/input/input2745 [ 2623.334236] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2623.341951] input: failed to attach handler leds to device input2745, error: -6 00:44:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xae01, &(0x7f0000000280)) 00:44:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000140)={@empty, @dev, @dev}, &(0x7f0000000180)=0xc) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000100)) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000200)={0x8, 0x1, 0x6, {0x0, 0x2cc2, 0xffffffffffffffc1, 0x5}}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB="696f636861727365743d69736f383835392d322c63727566742c696f636861727365743d6d619dc00b4c7469632c636865636b3d7374726963742c73657373696f6e3d3078303030303030303030303030303031362c6769643d", @ANYRESHEX=0x0, @ANYBLOB="2c6d61703d610600726e2c73757269747973656c662c657569643d00000000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) 00:44:23 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667303", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000001000"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x4020940d, &(0x7f0000000280)) [ 2623.523275] input: syz1 as /devices/virtual/input/input2747 [ 2623.557317] input: failed to attach handler leds to device input2747, error: -6 [ 2623.582824] input: syz1 as /devices/virtual/input/input2748 [ 2623.641135] input: failed to attach handler leds to device input2748, error: -6 00:44:23 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x4000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x5450, &(0x7f0000000280)) 00:44:23 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673f6", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:23 executing program 0: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000200)="840fd44b259d565e93e3edf7f63af3bd0eaac1801aaf33438b9c5c5420f39777e894e3c905cdde4a03fdf3c65ded6b36ae15d0abada1f16224042c72574c1e991ce8a6e6041f10765b461cf6f0c00f2773d2915c6e136e5d3e087a24669246f8", 0x60, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00?\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:23 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x5460, &(0x7f0000000280)) [ 2623.816125] input: syz1 as /devices/virtual/input/input2749 [ 2623.845822] input: failed to attach handler leds to device input2749, error: -6 00:44:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfsh', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc020660b, &(0x7f0000000280)) 00:44:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100b0eb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x5000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:24 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@session={'session', 0x3d, 0x34}}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2624.025785] input: syz1 as /devices/virtual/input/input2751 [ 2624.044849] input: failed to attach handler leds to device input2751, error: -6 [ 2624.059334] input: syz1 as /devices/virtual/input/input2752 [ 2624.111693] input: failed to attach handler leds to device input2752, error: -6 00:44:24 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae88, &(0x7f0000000280)) 00:44:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x4, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:24 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x8) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) setsockopt$llc_int(r1, 0x10c, 0x4, &(0x7f00000002c0)=0x6, 0x4) r2 = socket(0x5, 0x5, 0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x5b, "ff158691e1ffb031700d21ed037dd235b329d49232041eed2f7a889396771b6c32464e704408774c02243d3db4c7baa508d2730b2fcd4c8500725c8ea3460398f38ef75f9774a474db4bf8c75ac0e19a0fb0b2c4e9db51b01f9492"}, &(0x7f0000000180)=0x63) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x7, 0x20f, 0x3f, 0x1ff, r3}, 0x10) r4 = dup3(r0, r0, 0x80000) ioctl$SG_SET_COMMAND_Q(r4, 0x2271, &(0x7f00000000c0)=0x1) 00:44:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebb800"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2624.311480] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2624.337746] input: syz1 as /devices/virtual/input/input2753 00:44:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x5451, &(0x7f0000000280)) [ 2624.359793] input: failed to attach handler leds to device input2753, error: -6 [ 2624.379410] input: syz1 as /devices/virtual/input/input2754 00:44:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2624.423096] input: failed to attach handler leds to device input2754, error: -6 00:44:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae05, &(0x7f0000000280)) 00:44:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebb600"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:24 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x2010, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2624.570970] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2624.636495] input: syz1 as /devices/virtual/input/input2755 [ 2624.652113] input: failed to attach handler leds to device input2755, error: -6 [ 2624.683121] input: syz1 as /devices/virtual/input/input2756 00:44:24 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc004ae02, &(0x7f0000000280)) 00:44:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667302", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:24 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f00000000c0)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000440)=ANY=[@ANYBLOB="696f636861727365743d69736f383835392d322c63727566742c696f636861727365743d6d616363656c7469632c636865636b3d7374726963742c77657373696f6e3d3078303030303030303030303030303031362c6769643da7546dee5cd786e739b69303e8a081b97f809324cd591ed63f1e55916ef545c23013fa623c632400995db312f0f8766fd4566fb018c21c7126678948d377851c27c9eb53fa6cb97a764fb18fb8702798ef1cfaeaee0b0ca0d7beb50cdd009ecaece51097dbcf447979d7496a18684e8d751eb16054b7f3bd6a77f36c784a68cb", @ANYRESHEX=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) syz_read_part_table(0x8, 0x9, &(0x7f0000000940)=[{&(0x7f0000000200)="13da1d77b6531183c44611268cabe8c40a2cc6b1c9a2d6ed95b8e928b7bd9d80702fbd1b00caa585c3ad60291f5c61695bca7aa020216aafc24fe9283a0f53913c7b201dc636ef34c95ab82f66b2a932c05e6e58e7b8db053a6323d631a517d6ce5e098a454c08a1290cade2875499f9ecc4c00967a8bbc41916cf7279c8791e2a230be8ac1222a72fa419ac0e77f3bc42fd93b28a161ceb2fd7e0d1e0c5bf4c18b4d51f2def7fdecf522fac78065b725a1003732683900e3e13224b9dfccd953345ebfda4ec2d731c91154927f25cced18d1c4aa7ac90a5", 0xd8, 0x8001}, {&(0x7f0000000100)="f1b899a8fe3c13a9f2a0fe3370168f5aa7ab31e2a0bc50a20f0cb123c8164e9eb8fdef6b0b92ba36370dde92a3716d69c32500f437e69cdf53ee1a4443149af88b5dd2d2", 0x44}, {&(0x7f0000000080)="79d0f8bc15a9b8bdf6bf3164f5d118dfa9a70b17378db2f6e915dc7bf6900e", 0x1f, 0x8}, {&(0x7f0000000300)="abdd5da7f93ee16bd23eb65ce58a54aaae26ccebbf00154c5f6cda6f2306bd4ac60b531f0d7a91459210816d19fff7bec94a4195384c72a75ac59b6a035cf88d85439899732f035ff445c55f38a1f829d72aa08cd3add952deb0578490ff67737e989439a26f1e809336d42de9a8e660536ef136d5ed37a8bb77b88c59a41b1a7ea191a8d5cdf5d51195dd4cc0b6eda8cd3ba0381b85ea2f1e3922540ab6ee448a164dbaef358919c7f76de389d9abcbcd13ba2b7434d6be36d59c77c28308182e4da1fbc403e2cf272ad87c927c7a099ae3b50314e63aa93fd32adc1ee4de7204341b3d1f49ae08d50bd0da25b0afd21430b163377bccc0", 0xf8, 0x200}, {&(0x7f0000000180)="eb1c9bc39ac72054bac2cc346add9f", 0xf}, {&(0x7f00000006c0)="5fe99e21efb71b5c77c9a2d955b9fe75162978f093357a65c7d5f9a5d028f16eb16de2d675c9725ee96bab45fb9c5cd094d5eefb3fd718aa4b7a87cd3d8abc8f5af86e92f9006682bee37b920d11fc2810566e5b5f5e70fec3e49ddbcb7ccb621b8a6e27d66ca669ba17adfaef03071b353f32ab83c827032bb4b34f05710e821f0dd00802b4805a5752bd234a5cca01feff", 0x92, 0x36}, {&(0x7f0000000780)="99bf88b9c53ffdc956e4e9ae3ff3974b39b348f80ad4d26a0cf6c8f316d33ace6ee095f7184e1d354b640a9654419046a882d460d131a17da562d5970bac335750c83c4f07087ce76980575b04f7d06eb3d98bd972f220f7da889ede4c7af7af55fad1d5fee65e343a9e2d02a06399170b0a11730dd6a2fd39197a14ed2e7ea90254b4a61eeee72134053dee385c86075e9aa240d1185978fa0e027b6848ff48273b8baac97bf02cf27e3783f607f374c5afa85cfb46b6ddf9e7a3af8d4ea9a27ca7597068037f797518a924", 0xcc, 0x3}, {&(0x7f0000000400)="0fdbe489a36d1f9435f1aa504ffa6d97", 0x10, 0x2}, {&(0x7f0000000880)="104e6a9bc427e253656654477f4672012c8babfae4256afc9c3b7b58838fe10897e95cf8f1a83cb73f1cef9a6de7713c453c1d31296d38715b036fc2612b0f28114795a77b109c63b6a68df59addeb380cd7d2f57aabcc93b1f399f386ab3493a75fad5867238dd9e2034675eb05c0144b246ebe2244a28a98c1af0f69e37be3a1cd2cee75bbb337c9f9ffd663f1b0b4a7c8e65667aefe45b3504738b2c1e1178c7f49", 0xa3, 0xffff}]) 00:44:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x3, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2624.732509] input: failed to attach handler leds to device input2756, error: -6 00:44:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00h\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xae08, &(0x7f0000000280)) [ 2624.874723] input: syz1 as /devices/virtual/input/input2757 [ 2624.890558] input: failed to attach handler leds to device input2757, error: -6 00:44:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xfffffff6, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x4008ae06, &(0x7f0000000280)) [ 2624.932803] input: syz1 as /devices/virtual/input/input2758 00:44:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xae04, &(0x7f0000000280)) 00:44:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f00000000c0)=ANY=[@ANYBLOB="696b6389c36861727365743d69736f381d35392d322c63727501742c696f636861727365743d6d61c2dad75165ec74696324636865636b3d7374726963742c73652310696f6e3d3078303030c7302c6769643d0000000000001e324b", @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) [ 2625.005694] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2625.016583] input: failed to attach handler leds to device input2758, error: -6 00:44:25 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d70667303", 0x0, 0x0) 00:44:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00t\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x5452, &(0x7f0000000280)) 00:44:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xffffffffffffffff, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xae00, &(0x7f0000000280)) 00:44:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2625.262387] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2625.277585] input: syz1 as /devices/virtual/input/input2759 [ 2625.289947] input: failed to attach handler leds to device input2759, error: -6 [ 2625.304537] input: syz1 as /devices/virtual/input/input2760 00:44:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xae07, &(0x7f0000000280)) 00:44:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667302", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2625.362416] input: failed to attach handler leds to device input2760, error: -6 00:44:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x1020, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00`\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:25 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000100)={'\x00', {0x2, 0x4e24, @multicast2}}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000140)={0x8, 0x2, 0x100000000, 0x9, 0x2, 0x10000}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r2, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000240)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) [ 2625.570184] input: syz1 as /devices/virtual/input/input2761 [ 2625.604101] input: failed to attach handler leds to device input2761, error: -6 [ 2625.645258] input: syz1 as /devices/virtual/input/input2762 00:44:25 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d70667306", 0x0, 0x0) 00:44:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xe482, 0x301080) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x7fffffff, 0x6d40000000000000}, 0x8) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r4, 0x8008ae9d, &(0x7f0000000280)) 00:44:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673aa", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:25 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x900000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2625.702648] input: failed to attach handler leds to device input2762, error: -6 00:44:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000000001000"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x10100, 0x0) r2 = fcntl$dupfd(r1, 0x80000000000000, r0) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000180)) 00:44:25 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x40000, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x14d) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008910, &(0x7f0000000140)="0a5c2d825d0e6d6218ef9e1a437be514f28c5b0240316285717070") ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000400)={0x0, 0x0, 0x5, 0x0, [], [{0x1, 0xfff, 0x8a43, 0x400, 0xa321, 0x6}, {0x7fff, 0x6, 0x6, 0x4, 0x5, 0x457f}], [[], [], [], [], []]}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000300)={{0x3, 0x9}, {0x1f, 0x7}, 0x192a00, 0x3, 0xc4}) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x400, &(0x7f0000000080)=ANY=[@ANYRES32=r2, @ANYRES64=r2, @ANYRESHEX=r2, @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setgroups(0x1, &(0x7f0000000600)=[r3]) [ 2625.838003] input: syz1 as /devices/virtual/input/input2763 [ 2625.844572] input: failed to attach handler leds to device input2763, error: -6 00:44:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r0, 0x8008ae9d, &(0x7f0000000040)) [ 2625.897311] input: syz1 as /devices/virtual/input/input2764 00:44:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x6c00000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x80, 0x9) getdents64(r0, &(0x7f0000000080)=""/21, 0x15) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2625.972661] input: failed to attach handler leds to device input2764, error: -6 [ 2626.004179] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebda00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:26 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d70667310", 0x0, 0x0) 00:44:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=ma#celtic,chec~=stric4,session=0x0000000040000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) r1 = dup3(r0, r0, 0x80000) accept$nfc_llcp(r1, &(0x7f00000000c0), &(0x7f0000000140)=0x60) 00:44:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xedc000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x8000) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5, 0x400400) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/udplite6\x00') r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2626.162944] input: syz1 as /devices/virtual/input/input2765 [ 2626.181187] input: failed to attach handler leds to device input2765, error: -6 00:44:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100ffffffff882000"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2626.278935] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x21000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000240)="6590a7a50200000000000000b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a9c8f675c546cbdfb10a10277ba8331b1b1223bbffac391655681c114f2335446578cf269085e51ab89baa4612e4e0ffe4be14b57d450efc4d6b9b42e3f9354a69ddd7fef1e901a36e95a4ad6dee974bd1c74ba1d1b3376d4e3b4c9963d32fb8412c0fe0000007d007ea329a43bdf13ac2d8131203abadc6332b139a36a01a7d8af3411cf10325343254742a25ca4b5936ee74cca923b13", 0xb8, 0x2}], 0x400, &(0x7f00000000c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@session={'session', 0x3d, 0x4c}}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_emit_ethernet(0x1e, &(0x7f0000000040)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [], {@can={0xc, {{0x4, 0x100, 0x3, 0x6}, 0x7, 0x3, 0x0, 0x0, "af79676656368789"}}}}, &(0x7f0000000080)={0x1, 0x2, [0x3ab, 0xed6, 0x160, 0x441]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) getsockname(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000180)=0x80) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f00000001c0)=""/231, &(0x7f00000002c0)=0xe7) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2626.357915] input: syz1 as /devices/virtual/input/input2767 [ 2626.377768] input: failed to attach handler leds to device input2767, error: -6 00:44:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x2, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2626.409876] input: syz1 as /devices/virtual/input/input2768 00:44:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) r3 = msgget$private(0x0, 0x10) msgctl$MSG_STAT(r3, 0xb, &(0x7f0000000100)=""/247) [ 2626.472368] input: failed to attach handler leds to device input2768, error: -6 [ 2626.492793] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x100, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000100)={0x1, 0x0, 0x52, 0x80000001, 0x73f8, 0x7, 0x3}) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x8002, 0x7) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xaaaaaaaaaaaacb9, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:26 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d706673ff", 0x0, 0x0) 00:44:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebe200"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:26 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:26 executing program 4: r0 = accept4$llc(0xffffffffffffff9c, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000080)=0x10, 0x800) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0xa4, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xfffffffffffffff7) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000180)) 00:44:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x9000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2626.673257] input: syz1 as /devices/virtual/input/input2769 [ 2626.679043] input: failed to attach handler leds to device input2769, error: -6 00:44:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f0000000040)={0x1, 0x1, 0x102, 0x1, {0x3f, 0x8001, 0xba, 0x2}}) [ 2626.723790] input: syz1 as /devices/virtual/input/input2770 [ 2626.739050] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:26 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r1, 0x8008ae9d, &(0x7f0000000280)) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000000)) 00:44:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x8cffffff, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2626.813117] input: failed to attach handler leds to device input2770, error: -6 [ 2626.829860] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 00:44:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebc700"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r2, 0x3c, 0x0, @ib={0x1b, 0x9, 0x5, {"991c22404c63913716528cc70690873c"}, 0x1f, 0x100, 0x3}}}, 0x90) 00:44:27 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2627.004803] input: syz1 as /devices/virtual/input/input2771 [ 2627.025647] input: failed to attach handler leds to device input2771, error: -6 00:44:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x1, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:27 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xf9fdffff, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2627.072476] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100e4eb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111, 0x9}}, 0x20) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000100)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)=0x0) write$FUSE_LK(r2, &(0x7f0000000140)={0x28, 0x0, 0x7, {{0xffffffff, 0x18, 0x0, r3}}}, 0x28) openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x1, 0x0) 00:44:27 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000040)={0x0, 0x451, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x400000000000, 0x47e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffd, 0x800000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000280)={0x3e76, {}, {{0x2, 0x4e20}}}, 0x108) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmat(0x0, &(0x7f0000492000/0x4000)=nil, 0x2000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) socket$netlink(0x10, 0x3, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f0d1c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000480)=ANY=[@ANYBLOB="696f636861727365743d69736f383835392d322c63727566742c696f636861727365743d6d616363656c7469632c636865636b3d7374726963742c73657373696f6e3d3078303030303030303030303030303031362c6769643d6634e21e9544653edc553e6739b799324184fa48a63ae4d97d257bd137447e5a210f7a98e88ff3fb82df383979278ba58cab67f9b2bcd33ec3f9d2827f13b405a99d2de4ea08f6eeb57e2a5ff28765e814a4913a3ff45065f3db71c3a106d3326bf80febcfd40bcfa096fb96647d", @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) [ 2627.204076] input: syz1 as /devices/virtual/input/input2773 [ 2627.219291] input: failed to attach handler leds to device input2773, error: -6 [ 2627.267616] input: syz1 as /devices/virtual/input/input2774 [ 2627.277078] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x3f00, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x4, r0) unshare(0x400) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x9) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U-', 0x4}, 0x28, 0x2) [ 2627.351646] input: failed to attach handler leds to device input2774, error: -6 00:44:27 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667304", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000000000500"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvfrom(r0, &(0x7f0000000100)=""/168, 0xa8, 0x12001, &(0x7f0000000040)=@rc={0x1f, {0x64f8, 0x7, 0xdd3, 0xd02, 0x1f, 0x7f}, 0x81fe}, 0x80) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0xa66c, 0x2000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x100, 0x0) fchdir(r3) 00:44:27 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x1000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2627.604997] input: syz1 as /devices/virtual/input/input2775 [ 2627.634024] input: failed to attach handler leds to device input2775, error: -6 00:44:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x8001, 0x50000) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)='ppp0cpusetppp0)#.\x00') syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) lseek(r0, 0x0, 0x7) r3 = fcntl$dupfd(r2, 0x0, r2) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) 00:44:27 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000080)=0xffffffffffffe7e4, 0x4) bind$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) r4 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r4, 0x8008ae9d, &(0x7f0000000280)) 00:44:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebc700"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2627.763450] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xfffffdf9, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2627.857066] input: syz1 as /devices/virtual/input/input2777 [ 2627.863337] input: failed to attach handler leds to device input2777, error: -6 00:44:28 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r1, 0x8008ae9d, &(0x7f0000000280)) 00:44:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000340)=ANY=[@ANYBLOB="696f636861727365743d69736f383835392d322c63727566742c696f636861727365743d6d616363656c7469632c636865636b3d7374726963742c73657373696f6e3d3078303030303030303030303030303031362c6769643de48450159569271a087293705ebdc95931c84a1cc98579e358762c40b2a7a634dadfec793ac42370fb008361deb4069e51ba2c9919ec76afa1f5aa0b25ea155bde58d13eb4fa3b4a32dbc56c014f2b1a7b838cdd05d22f6326c41ea70f2e00002a7d07a3d68be07dc7e3058596e0a8de2b01cdbfab42daf5af", @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB="0a63abb2b94378743d73797361646d5f75534a3f9af86d18b3a1752c00"]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='map_files\x00') getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000200)={0x1, [0x5]}, &(0x7f0000000240)=0x6) getdents(r1, &(0x7f0000000000)=""/127, 0x2fb) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x1a1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000140)={@loopback, @remote, r3}, 0xc) [ 2627.906804] input: syz1 as /devices/virtual/input/input2778 [ 2627.967160] input: failed to attach handler leds to device input2778, error: -6 00:44:28 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000100)={0x6, 0x1}) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCNOTTY(r0, 0x5422) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$int_in(r2, 0x5421, &(0x7f0000000080)) unshare(0x400) restart_syscall() ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) 00:44:28 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebb100"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2628.009505] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xf6ffffff00000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="d303000038016affbeca66546140903bef1d8922298f19ffdc11fe01e63c3c8c36e1c5"], &(0x7f0000000080)=0x27) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000100)={0x4, 0x8000, 0x6, 0x8, r3}, &(0x7f0000000140)=0x10) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:28 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667303", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2628.118624] input: syz1 as /devices/virtual/input/input2779 [ 2628.131003] input: failed to attach handler leds to device input2779, error: -6 00:44:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x3, 0x200001) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f00000002c0)) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000200)={r3, 0xa2, "1a501c6b472054cb5cbc2674c2289565b7f1bf1068681faaa134019564203abe45e061b4550f5c80da784fbf619dcf877799b0b766ac91f5d9a28e8bfb753e412f387ea22dc5561773816bc02eca572824279462583eff8aa982c231e938c98b364a78bf58c2f4f06bd96e1db29414e6cb48d279e9d186ca4ce11abbf692958f0be82a4c3d5ca1147c90c17666821a39179f713eff249b816c9f76cc3217e9abad89"}, &(0x7f0000000140)=0xaa) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept(r0, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x80) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@remote, @in=@local}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r4, 0x8008ae9d, &(0x7f0000000280)) [ 2628.188122] input: syz1 as /devices/virtual/input/input2780 00:44:28 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfsH', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2628.253309] input: failed to attach handler leds to device input2780, error: -6 00:44:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000500)='/dev/kvm\x00') lsetxattr$security_smack_entry(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='security.SMACK64\x00', &(0x7f0000000600)='/dev/kvm\x00', 0x9, 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sync_file_range(r0, 0x6, 0x7, 0x6) unshare(0x400) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000000100)={"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"}) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r3, 0x5386, &(0x7f0000000040)) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000540)=0x7, 0x4) 00:44:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x2010000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebc100"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x198, 0x404000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000100)={0x5, 0x6, 0xfffffffffffff801, 0x9, 'syz0\x00', 0x6}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB="2c6395610a8214685975baeaf06f6e74657874"]) 00:44:28 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d70667302", 0x0, 0x0) 00:44:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000100)={0x0, 0x9, 0x8001, 'queue0\x00', 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) unshare(0x400) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x117}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000200)={0xf, 0x8, 0xfa00, {r4, 0x13}}, 0x10) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) 00:44:28 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2628.454144] input: syz1 as /devices/virtual/input/input2781 [ 2628.476754] input: failed to attach handler leds to device input2781, error: -6 00:44:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x4000000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x22400, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r2, &(0x7f0000000100)="766698b2a8ae38e3a20dae41be1cd9f75368d24ed091a676222b783ec0b5e60a29b8eccb03cd92bb294b700c035e7b0de02cd9d06af57e9f383e98f0994606b04c0aeddcf69c3ff77cdcaa40716d090a27c3ab72f51cfb9e2f69f0c504536236f191db4a9b6488a151bd619899f6f9aa55d0cbe001755c645e1bd17b716914352dfb53d36aea15178ecd5ddf98ccd2b636521729170c1fd5603f16462aa9fd81d250db3ad008c2aeed9756a5f49cd04d993a9927bc183e5dcc636d453b047359bf4ccb3ffe3e901b9bf5420b6b96f3777f36e0d43293114da079877003cf93215935f5e0e381cda4eed2039e5717e0955785af4368232eb1630e", 0xfa, 0x1, &(0x7f0000000080)={0xa, 0x4e20, 0x7, @mcast1, 0xfffffffffffffffb}, 0x1c) r3 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) 00:44:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebb500"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:28 executing program 0: prctl$getreaper(0x19, &(0x7f00000000c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000140)=0xdffb) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2628.584919] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:28 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667302", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2628.676325] input: syz1 as /devices/virtual/input/input2783 [ 2628.698108] input: failed to attach handler leds to device input2783, error: -6 00:44:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0xf5bf}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000140)={r3, 0x5, 0x2, 0x9}, 0x10) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x80002, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000100)={0x2, 0x5}) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r5, 0x8008ae9d, &(0x7f0000000280)) 00:44:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x200000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:28 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x84601, 0x0) renameat(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000180)='./file0\x00') syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2628.728235] input: syz1 as /devices/virtual/input/input2784 00:44:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup(r0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000040)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) [ 2628.812269] input: failed to attach handler leds to device input2784, error: -6 00:44:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100c8eb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:29 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673fd", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:29 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xfdfdffff, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x2, 0x0) getpeername$llc(r3, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000200)={0x0, 0x5}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000280)={r4, 0x3}, &(0x7f00000002c0)=0x8) r5 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000a40)=0xe8) syz_mount_image$hfsplus(&(0x7f00000003c0)='hfsplus\x00', &(0x7f0000000400)='./file0\x00', 0xb40, 0x7, &(0x7f0000000880)=[{&(0x7f0000000440)="ec81ce2d82386f77a35f8334312ddac2c6a6e60965273bd0bd7247b5ff80dc70629c117c0458a45012073332eaf50d681e20ff8fc088b550be0162349fad897b16414b63cb8e1db34b6340676794e5acd7b83b942aded06cca268d91efe8aa94bbd7d35425882efebf7f9580ba6608ed3f6251fba425af1e6d5075", 0x7b, 0x100000000}, {&(0x7f00000004c0)="856738a71aa1186679642538495cd659344c9ccfbc47cdaac096443aa747a33fb16679492a6bf7d516bd31842b0448", 0x2f}, {&(0x7f0000000500)="4eaba20e913b6b9c17cd5c6e6677f4dbbae6e200ef279f26e6e35d3efc9b8fba0d2fde75e05654398e19233ae45ac92455094e5c6a3f44b52f2342713acdfea982b1b91d91eab649f5aeda33f634b9", 0x4f, 0x20}, {&(0x7f0000000580)="e922b4ecbe76509f7c2b22f76ea5385f41b48addd0de9b2137f2bc400743d0e1778ba6b75b389bc38921bfe0504b8958566589b34ea2b0ac9ba53da6eb28f20761d91d4709834099d63f45740412c083382ec98c7d2d0ee456532b7145f7c5e5cfcb9db45fa08e51bd1bc279ff37cc34bc581262e76657fbbdcbaf6c0cf8f54c11343f4128353d6c4de7abc2d9e843a9be0a234bdd", 0x95, 0x1}, {&(0x7f0000000640)="6c82e4bc6ae091d88574307cfa8230efe753a5cef5925472196f5ee26fb87587aeb2525f0412df6f1830bf478f54447ae9d7e88ed2b7b5ed21881c8993e530fd8ecc85428b201367c25fb0b87096cff7b7e873fde3d5d8d6ecc5a39e2150c02a03afce696604ef3f12339aa29003a7f92d3937884d400a361951542f98bbc2570c97607518eb71f789f8c4706dae01f443cc8ef4777765560158f00b9e7cbd11548936534ab601835ca0572ad705202a28b9557440d051c0a78db772c7b1010b1aea1c25ab74ff86ffc5e20d6533c3", 0xcf, 0x7}, {&(0x7f0000000740)="1cb0bc92d27846cb84e09afec68dbc71a9d0634a9af6a94747c5ae585bc0da2ee78aa5689da5003394837a157d6d888e76ee726aa846cacd57fba73fd6094599de50581bf4ebe203706f52384e4af3a4b0c1c38f5fc6baf7466d1eb2e2d8c73cbafa11309639acb48c8dd6c0311ddb6f877235ef", 0x74, 0x26ea}, {&(0x7f00000007c0)="05693dd3b935c776a21bfafbff86ffc59ad1dd7b3a14f14ac35f52666f4ce637c27256b6070e558973049620cd5f1d6bab7f06d2a90c615f7730a2ad60d0ee8e3c265552531d1a7abb0a6b348782be17bae8a023ff0272bd589a4ffb0ad32c0125e9f7b8152a7f412a81de1c604f3f97f4bd1037f82c349deaa970b053495dd93551cf659be61aff2273cad1de37eb56e42c77e957565c9a06acd42b23571cf34625f77313f7369b", 0xa8, 0x8}], 0x800000, &(0x7f0000000a80)={[{@uid={'uid', 0x3d, r5}}, {@session={'session', 0x3d, 0x3ff}}], [{@subj_type={'subj_type', 0x3d, '(vmnet0em1+\\'}}, {@pcr={'pcr', 0x3d, 0x1}}, {@obj_type={'obj_type'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/snd/pcmC#D#p\x00'}}, {@euid_lt={'euid<', r6}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#losecurityeth1keyringppp0^*],wlan1\\md5sum'}}]}) getsockname$inet(r2, &(0x7f0000000080)={0x2, 0x0, @multicast2}, &(0x7f0000000100)=0x10) write$P9_RREAD(r3, &(0x7f0000000340)={0x5d, 0x75, 0x2, {0x52, "91f943887b56ef4b40c5a95b7d33b92ea5b4937b8ad5a077ce0f70e51ee4b31c0e4164df3c66e906dc91a6b17b444fb856e7822d93dddef83f96341428bb3db9aabc6dac27e5d44c770f3803c54a249600da"}}, 0x5d) r7 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r7, 0x8008ae9d, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r7, 0x80045300, &(0x7f0000000300)) 00:44:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000040)=0x3, 0x8) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2629.070111] input: syz1 as /devices/virtual/input/input2785 [ 2629.082442] input: failed to attach handler leds to device input2785, error: -6 00:44:29 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebb500"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB='Gocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0e000,gid=\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=0x0, @ANYBLOB=',mae=$securityself,euid=\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) 00:44:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x68000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x400002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x1000000000, r0) ioctl$VIDIOC_SUBDEV_G_CROP(r3, 0xc038563b, &(0x7f0000000080)={0x1, 0x2, {0x6, 0x6, 0x80000001, 0x800}}) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000040)) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) [ 2629.256028] input: syz1 as /devices/virtual/input/input2787 [ 2629.265128] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2629.269940] input: failed to attach handler leds to device input2787, error: -6 00:44:29 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673be", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x4000000000000, r0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x800) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x7, 0x208000) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x4e22, @loopback}}, 0x5, 0x0, 0x6, "7ce8dfee562c4fe57097ce85a7558e41d61821be7318a5b27f0f78047ad1ac65f15d96b00b62261737205fe1d2c9f45c6e2e1680abc999aadd92b4e54955ab89eaed70474208234f0687748ff26d6a66"}, 0xd8) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000300)={0x917, 0x10000000}) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000340)=ANY=[@ANYBLOB="696f636861727365743d69736f383835392d322c63727566742c696f636861727365743d6d616363656c7469632c636865636b3d7374726963742c73657373696f6e3d3078303030303030303030303030303031362c6769643da862220e18973af5429cd4521406a9a90ed34b8dfac8e988", @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) pipe2(&(0x7f0000000140), 0x80000) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x10200, 0x0) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000100)={0x0, 0x10001, 0x5, 0x14b5d4481426a7c3, &(0x7f0000ffa000/0x3000)=nil, 0xac0}) 00:44:29 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebe200"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xc0ed0000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:29 executing program 4: socketpair$unix(0x1, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000100)=""/244) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) getsockopt$inet_tcp_buf(r2, 0x6, 0x1a, &(0x7f0000000080)=""/46, &(0x7f0000000200)=0x2e) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000003c0)={@mcast2, @mcast2, @ipv4, 0x1, 0x1f, 0x1, 0x400, 0x10001, 0x200100, r3}) [ 2629.533637] input: syz1 as /devices/virtual/input/input2789 [ 2629.553377] input: failed to attach handler leds to device input2789, error: -6 [ 2629.583156] input: syz1 as /devices/virtual/input/input2790 00:44:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x2, 0xd00) 00:44:29 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socketpair(0xf, 0x1, 0x5, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000180)={0x9, 0x0, 0x72c}) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x100, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x1000) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@int=0x8001, 0x4) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',n,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) 00:44:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x300, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2629.633397] input: failed to attach handler leds to device input2790, error: -6 00:44:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000000000300"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2629.705481] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) fcntl$getflags(r0, 0x401) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) 00:44:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c29f2cdee151d024a31") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:29 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:30 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x1000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2629.847005] input: syz1 as /devices/virtual/input/input2791 [ 2629.879912] input: failed to attach handler leds to device input2791, error: -6 00:44:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) fcntl$setpipe(r0, 0x407, 0x1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e0000000400000080040000000000000000000000000000d802000000000000e8030000e8030000e8030000e8030000e803000004000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB="00002000000000000000000000000000000000000000000000000000d26baef30000000000000000000000000000000000000000000000000000fb008c6800006dbef118130175117471376cf34ecf3ea5092f3c51777a52d79cf1bc32732a5cd272ebec41"], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009001f001000000000000000000000000000000000000000000000000f800726563656e740000000000000000000000000000000000000000000000004000000048ae8f68200073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000006000434c5553544552495000000000000000000000000000000000000000000000000000aaaaaaaaaaaa04000e00360033002d001b002a0026002d00120040002400260020000d00270013003100000000000000030000000000000000000000ac1414aa00000000ffffffff00000000766c616e3000000000000000000000007663616e300000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000730002400000000000000000000000000000c000e800000000000000000000000000000000000000000000000000280074746c000000000000000000000000000000000000000000000000000000000700000000000028004e4651554555450000000000000000000000000000000000000000000002010000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e80010010000000000000000000000000000000000000000000000002800746f730000000000000000000000000000000000000000000000000000000305000000000000280065636e00000000000000000000000000000000000000000000000000000030200706000000002800434f4e4e5345434d41524b000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff000000003ddeb4dd3371b820f18f2a6862b248be527c93aa55e860e62af2b32100f6bba2cc68c3ab0b57e39a361235cdc925278619ad4803b3fc399dd9d3e74401a5e0a00da2e7676ef7e535f1a3292e1c82bdbb9f603da1f10358dd36e2733f565879cb0e6159ca341838979d35c8d2502b5d69ea20cbab08f06bdab008809a366525ca286372e301e2f5015db55041c720ea1197bea6557c1b8da3f9d3c367"], 0x4e0) unshare(0x400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, 0x0, 0x7, 0x0, "4877bb1f56d48eb1fa5fac76a792a929a57f6062b013ec6b7a9ee231ea85a1c7f5c8fdf3bcaf6c5bb203dab4011d7c6096609012d3e979295204ae936681b23832f302a5020f3f6af0b1d2fb5a00eb09"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) bind$inet6(r5, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r6, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000200)) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000080)={0x1, 0x9, 0xffffffff, 0x9, 0x30b4}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, r3, 0xf, 0x2}, 0x14) 00:44:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebb900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2629.967964] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\n', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000400)="0a5c2d0240316285717070500fbc5599c0adf417bfb715718286887b784f658c8c79d1e9f2605665ac4787b5a2d084a5d1fd02efccf09409eda40fa642b5b3ee0a1a898dbffb08885b7cb991a2e2d935ad03c751739840add0bbe17194ab4754f618201f76d013f9d07ebebb0af9a0a711a14b5aeecf01005894b8b9a71d1db7eb3f699420de2e89e008cebe11ab3073fad0cbfc0d71b45ebbc280ac2e0190421ff58511ef11e6a0ba0f4d696af6ce0e5609c0fb3f65b7c4e8950814777315eaf764b257119862d8e589806bcf52d870a8861501e25b3e60888580e222ae21229b97bb4b35d53b74b853a22db644024553f572") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c6d61703d61636f726e2c7375626a5f747970653d24736563757269747973658638c8cc40bba45c", @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@empty, 0x0, 0x1, 0x3, 0x6, 0x1, 0x9}, &(0x7f0000000100)=0x20) 00:44:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x8, r1) unshare(0x400) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000100)=[@in={0x2, 0x4e22}, @in6={0xa, 0x4e24}, @in6={0xa, 0x4e20, 0x0, @mcast1, 0x9}, @in6={0xa, 0x4e22, 0x6, @loopback, 0x7}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0xff, @dev={0xfe, 0x80, [], 0x18}, 0x1aff}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0x15}, 0x3}, @in6={0xa, 0x4e22, 0x5, @mcast2, 0x2}, @in6={0xa, 0x4e24, 0x1000, @empty, 0x7}], 0xf4) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x2000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2630.123114] input: syz1 as /devices/virtual/input/input2793 [ 2630.128889] input: failed to attach handler leds to device input2793, error: -6 00:44:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2630.246692] input: syz1 as /devices/virtual/input/input2794 00:44:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfsc', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") signalfd4(r0, &(0x7f00000000c0)={0x1}, 0x8, 0x80800) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,c\x00\x00\x00\x00\x00\x00\x00\x00ict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) 00:44:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x900, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:30 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() write$FUSE_ENTRY(r2, &(0x7f0000000180)={0x90, 0x0, 0x5, {0x4, 0x1, 0x1ff, 0x4, 0x0, 0xffffffff, {0x0, 0x4648, 0x3, 0x20, 0x80000000, 0x2, 0x5, 0x8, 0x3fef, 0x5, 0x4d8, r3, r4, 0x1, 0x2}}}, 0x90) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\n\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2630.561826] input: syz1 as /devices/virtual/input/input2795 00:44:30 executing program 0: socket$vsock_dgram(0x28, 0x2, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x7f7, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x6, 0x40000) getpeername$inet(r1, &(0x7f0000000140)={0x2, 0x0, @rand_addr}, &(0x7f0000000180)=0x10) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xaaaaaaaaaaaad54, &(0x7f0000000100)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',mtype=$sgceuid=\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) 00:44:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6(0xa, 0xa, 0xffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000080)={0x7, 0x669, 0xfffffffffffffff7}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) [ 2630.603847] input: failed to attach handler leds to device input2795, error: -6 00:44:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xa00, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2630.660007] input: syz1 as /devices/virtual/input/input2796 [ 2630.704696] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000000100)=""/223) 00:44:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2630.811041] input: failed to attach handler leds to device input2796, error: -6 00:44:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebb300"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fsetxattr$security_smack_entry(r1, &(0x7f0000000040)='security.SMACK64IPOUT\x00', &(0x7f0000000080)='/dev/kvm\x00', 0x9, 0x0) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x600, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2630.988343] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:31 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) 00:44:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fcntl$setsig(r0, 0xa, 0xb) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2631.041892] input: syz1 as /devices/virtual/input/input2797 [ 2631.047652] input: failed to attach handler leds to device input2797, error: -6 [ 2631.123531] input: syz1 as /devices/virtual/input/input2798 00:44:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0xa51b05f2b91f0d1e, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) unshare(0x400) rt_sigreturn() ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000100)) [ 2631.192291] input: failed to attach handler leds to device input2798, error: -6 00:44:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x4000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:31 executing program 0: mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1, 0x8) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebdd00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2631.291679] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x20100, 0x0) fcntl$dupfd(r2, 0x0, r2) unshare(0x80007ff) ioctl$KVM_GET_EMULATED_CPUID(r1, 0x8008ae9d, &(0x7f0000000280)) 00:44:31 executing program 0: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2631.397703] input: syz1 as /devices/virtual/input/input2799 [ 2631.427019] input: failed to attach handler leds to device input2799, error: -6 00:44:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x7a00000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) unshare(0x400) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f00000001c0)) [ 2631.545783] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:31 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)="746d7066730e", 0x0, 0x0) 00:44:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebe400"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x10) r2 = getuid() fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x80000, &(0x7f0000000280)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3}}, {@blksize={'blksize'}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x8}}], [{@appraise_type='appraise_type=imasig'}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x31, 0x66, 0x62, 0x62, 0x0, 0x75], 0x2d, [0x38, 0x61, 0x30], 0x2d, [0x33, 0x36, 0x0, 0x7e], 0x2d, [0x77, 0x0, 0x31, 0x3f], 0x2d, [0x38, 0x3f, 0x38, 0x39, 0x33, 0x64, 0x33, 0x66]}}}, {@appraise='appraise'}, {@dont_hash='dont_hash'}, {@seclabel='seclabel'}]}}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) unshare(0x400) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000000)=0x1000820, 0x4) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667384", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) ioctl$VHOST_RESET_OWNER(r2, 0xaf02, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000100)={&(0x7f0000000040)=[0x2, 0x1f, 0x1, 0x2, 0x8, 0x8], 0x6, 0x81, 0x2, 0x3, 0x10000, 0x7, {0xeef4, 0x47b, 0x6, 0x20000000000000, 0x0, 0x0, 0xffffffff, 0x2, 0x6, 0x2, 0x1, 0x200, 0x6, 0xfffffffffffffff9, "a071b348434827163035083e09ebbf02052fecc6e238e227c940f43457feb0a9"}}) [ 2631.683052] input: syz1 as /devices/virtual/input/input2801 [ 2631.691937] input: failed to attach handler leds to device input2801, error: -6 [ 2631.714554] input: syz1 as /devices/virtual/input/input2802 00:44:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x4c00000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000040)={r2}) [ 2631.762460] input: failed to attach handler leds to device input2802, error: -6 00:44:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebc200"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x100000001, &(0x7f00000000c0)="f42b831e53ee02e98ca41d3af7b7a62e6208cee34e43df1884a4dc1214451e5da2ba1d668603ddb297fc2ec73d504ec4de73b35f3984b8074fd16b2147aee382a6489ad1467b345c05822b431f1c6ab5d23297258913336be222e93afcd8656c04e802439af902ba1576c981c079ab99d8ff0758f4de0e25ec5ff544bc47a267ebe04f7c811d26356556125581c8536be33180b41246a13c81aad415b41e1324e0f5d6b01324bd8055e18660f16093") ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673ae", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:32 executing program 4: socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_S390_UCAS_MAP(r2, 0x4018ae50, &(0x7f0000000040)={0x5, 0x7, 0x1}) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2631.936159] input: syz1 as /devices/virtual/input/input2803 [ 2631.953841] input: failed to attach handler leds to device input2803, error: -6 00:44:32 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\f', 0x0, 0x0) 00:44:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x1f00000000000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c6d61703d61636f726e2c7375626a5f747970653d24736563757272747973656c662c657569643dc52b8ea32518a35c0ea5abd3205d8303ffeb0ca42d1f3f94ca8ebe019af8ee32db62abf240908c0ebf655d5b06ed9e8abf5ce692f44d9c90c89aa22ab08ca5590de5b08d6a92a3206e0aa09dbe191c8c3f95d0bcc738b3a52e6b157976e0e4cee1b817a11144773bce2ff2f1be0f1397750fc9fe9f7ff9ae64374fc275540dab385885f2af23d04b121c46953a34292b57a1da4af3e5959f35c57b145e24e7d3f86bb23dea2018cb034053071dc4ca6cb8f445d1aa333fbef486a720d5d66cae35a24b2a215704d69161", @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x20000) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000000140)) readlinkat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)=""/170, 0xaa) 00:44:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00l\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) dup3(r1, r0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80000, 0x130) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x3f) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) unshare(0x20000200400) ioctl$KVM_GET_EMULATED_CPUID(r4, 0x8008ae9d, &(0x7f0000000280)) [ 2632.161732] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2632.187406] input: syz1 as /devices/virtual/input/input2804 [ 2632.215551] input: failed to attach handler leds to device input2804, error: -6 00:44:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000200)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB="2c636f6e746578740b8e797361640104752c00bc3570062ce598dc9c7cd3f4ea2c7fb5b9249c09f2619c12410000d8f5e36c7358982277"]) 00:44:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x6000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2632.291348] input: syz1 as /devices/virtual/input/input2805 [ 2632.344062] input: failed to attach handler leds to device input2805, error: -6 [ 2632.419964] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00L\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000040)) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x4c, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:32 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0xc00000000000000, 0x0) 00:44:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x7, 0x4, 0x1, 0x7f, 0x7, [{0x5ca62234, 0x4, 0x6, 0x0, 0x0, 0x3280}, {0x7, 0x4, 0x1ff, 0x0, 0x0, 0x1}, {0xffffffff, 0x9, 0x3, 0x0, 0x0, 0x180}, {0x8f, 0x7fffffff, 0x8, 0x0, 0x0, 0x8}, {0x100000000, 0x1, 0xffff, 0x0, 0x0, 0x2888}, {0x5a, 0x7, 0x10000, 0x0, 0x0, 0x2008}, {0x1, 0x4, 0x10001, 0x0, 0x0, 0x1}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}, {@gid={'gid'}}, {@map_acorn='map=acorn'}], [{@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2632.557851] input: syz1 as /devices/virtual/input/input2806 [ 2632.597284] input: failed to attach handler leds to device input2806, error: -6 00:44:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt(r1, 0x3ff, 0x3ff, &(0x7f0000000140)="0b869be13c5911537d25473b4643567cd0f59d19246bd176dc6a1e4ef49d9f2dba96a633604f02b85c34ac24b6916f3cae7b61c8597402de9e4c2cf56afd5596d4fc5c67901f3d294d8b1ad03c097eb50b69f4d3b4198381fb5109ba0a23ad43aef33c42ab3967b9aa5ad759ca0bb98c98fc3dbedbb6a9e25568a8de318fc5a85c76998fc509b5aba5926948d1e0a02ea89cbc5141dec1f38e656f15d0e2e8bd537390c09ed3d16e8ce11eb663c31e170d8ce45c0f5488023a1b8d073ec1122c7d6e4108b8970b64a58a88", 0xcb) unshare(0x400) openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x2000, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r1, 0x8008ae9d, &(0x7f0000000280)) epoll_pwait(r1, &(0x7f0000000040)=[{}, {}, {}, {}, {}], 0x5, 0x1ff, &(0x7f0000000080)={0x7}, 0x8) [ 2632.607287] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:32 executing program 4: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$binfmt_script(r1, &(0x7f0000000180)={'#! ', './file0', [{0x20, '/dev/kvm\x00'}, {0x20, 'eth0'}, {0x20, 'GPLð1{md5sum'}, {0x20, '{mime_typeposix_acl_access&wlan1vmnet1selinux]vmnet0posix_acl_accessGPL'}], 0xa, "4c2cb5dbe3c3752fa8086ab4e6b217acd696db9aaad578f268a4053e15f2439aee508bd4120690b79ff60cef521d0351149bf087e0ac5ffd1bdcf360589e727f87b2e348b7d80251e5a485eb6403b265174f812b5d76fa37ded9684c62eb4fb937f5f5c80828a37ef19bdd5f4b7801b2064676eaeb3ba36d7957346d51a47750bd03cee989647e0252978e9fd1befc9600ce9097aafca175679925b627e9b128a66e1a1a91759e3f5a04a2857be4c4eb1e5c9baa142666f8efc82f5130881cad298d9100939da6680e9ff5acce8704a768"}, 0x143) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)={'team0\x00', r3}) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0xfffffffffffff9a3, 0x2) 00:44:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebb000"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = memfd_create(&(0x7f00000000c0)='iso9660\x00', 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x2f, "d7e5dcb4074d682f48369bdbd42a00c0d0a0d988a60a3b4cf279c2f1e9f370ec06984d8b9a3df56dfd67fabe35bb97"}, &(0x7f0000000140)=0x37) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000180)={r2, 0x80000013c}, &(0x7f0000000200)=0x8) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000840)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c6d61703d61636f726e2c7375626a5f747970653d24736563757269747973656c662c6505000000", @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) 00:44:32 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667303", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x74, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) fcntl$dupfd(r0, 0x0, r0) [ 2632.784471] input: syz1 as /devices/virtual/input/input2807 [ 2632.816008] input: failed to attach handler leds to device input2807, error: -6 00:44:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000040)={0x0, 0x451, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x400000000000, 0x47e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffd, 0x800000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000280)={0x3e76, {}, {{0x2, 0x4e20}}}, 0x108) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmat(0x0, &(0x7f0000492000/0x4000)=nil, 0x2000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) socket$netlink(0x10, 0x3, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f0d1c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000480)=ANY=[@ANYBLOB="696f636861727365743d69736f383835392d322c63727566742c696f636861727365743d6d616363656c7469632c636865636b3d7374726963742c73657373696f6e3d3078303030303030303030303030303031362c6769643d6634e21e9544653edc553e6739b799324184fa48a63ae4d97d257bd137447e5a210f7a98e88ff3fb82df383979278ba58cab67f9b2bcd33ec3f9d2827f13b405a99d2de4ea08f6eeb57e2a5ff28765e814a4913a3ff45065f3db71c3a106d3326bf80febcfd40bcfa096fb96647d", @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB=',context=sysadm_u,\x00']) 00:44:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x10, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:33 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x14, 0x0) 00:44:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000280)={"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"}) unshare(0x400) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r3, 0x111, 0x5, 0x7, 0x4) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r3}, 0x10) 00:44:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebad00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2632.970976] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2633.001771] input: syz1 as /devices/virtual/input/input2808 [ 2633.008179] input: failed to attach handler leds to device input2808, error: -6 00:44:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xfffffffffffffff9, 0x80000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x100000000}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r2, 0x7fffffff}, &(0x7f00000001c0)=0x8) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000080)) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) unshare(0x400) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)) ioctl$KVM_GET_EMULATED_CPUID(r4, 0x8008ae9d, &(0x7f0000000280)) 00:44:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2633.033129] input: syz1 as /devices/virtual/input/input2809 [ 2633.075367] input: failed to attach handler leds to device input2809, error: -6 00:44:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_dccp_buf(r2, 0x21, 0x2, &(0x7f0000000040)="4de3a468f847b8fb6e8ec82012b07f73135173debee23891a05908a4c2462bb5e0abf1e0d145c86cfc530568202e0974e03bd739419882ba002c9a016e4a98346385d16c2590d3ba6dc957e5875340ef1919d64690113cf79dae384ecc470d2bfb3f67b55f04c7", 0x67) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2633.140173] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x48, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100fffffdfd00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) unshare(0x3fa) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x6, @local, 0x100000001}}, 0x3, 0xff, 0x9, 0x8f, 0x20}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={r4, 0x9}, 0x8) [ 2633.301872] input: syz1 as /devices/virtual/input/input2810 [ 2633.329877] input: failed to attach handler leds to device input2810, error: -6 [ 2633.393860] input: syz1 as /devices/virtual/input/input2811 [ 2633.428628] input: failed to attach handler leds to device input2811, error: -6 00:44:33 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000100)={'\x00', {0x2, 0x4e24, @multicast2}}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000140)={0x8, 0x2, 0x100000000, 0x9, 0x2, 0x10000}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r2, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000080)="6590a7a5ec7a6fa83dc78506b9a11fce477c5d2309b42a12cd3744981ffc0c4f2a", 0x21, 0x2}], 0x400, &(0x7f0000000240)=ANY=[@ANYBLOB='iocharset=iso8859-2,cruft,iocharset=macceltic,check=strict,session=0x0000000000000016,gid=', @ANYRESHEX=0x0, @ANYBLOB=',map=acorn,subj_type=$securityself,euid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 00:44:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:33 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x16000000, 0x0) 00:44:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xfffffdfc, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x48f) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x2002, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unshare(0x10000000) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000080)={'veth1_to_bridge\x00'}) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000100)) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000140)={0xd7d, 0x1a, 0x3, 0x2, "dd371c1a7b4b07cce8e1e5d062f328dd85e81eefc7dd152cbcd93aec54616039"}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000000)) 00:44:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebe000"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x80) r2 = fcntl$dupfd(r1, 0x10, r1) unshare(0x400) prctl$setmm(0x23, 0x2, &(0x7f0000000000/0x3000)=nil) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2633.547296] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfsw', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2633.607000] input: syz1 as /devices/virtual/input/input2812 [ 2633.623525] input: failed to attach handler leds to device input2812, error: -6 00:44:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) unshare(0x400) 00:44:33 executing program 0 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x3f000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2633.683159] input: syz1 as /devices/virtual/input/input2813 [ 2633.716012] input: failed to attach handler leds to device input2813, error: -6 [ 2633.728860] FAULT_INJECTION: forcing a failure. [ 2633.728860] name failslab, interval 1, probability 0, space 0, times 0 [ 2633.748498] CPU: 1 PID: 5005 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2633.756656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2633.756664] Call Trace: [ 2633.756692] dump_stack+0x244/0x39d [ 2633.756724] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2633.777453] ? trace_hardirqs_on+0xbd/0x310 00:44:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r2, 0x0, 0xc, &(0x7f0000000040)="3a76626f786e657431e32f00"}, 0x30) syz_open_procfs(r3, &(0x7f0000000100)='net/snmp\x00') [ 2633.781786] ? kasan_check_read+0x11/0x20 [ 2633.785963] ? finish_task_switch+0x1f4/0x920 [ 2633.790472] should_fail.cold.4+0xa/0x17 [ 2633.794567] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2633.799688] ? _raw_spin_unlock_irq+0x60/0x80 [ 2633.804197] ? finish_task_switch+0x1f4/0x920 [ 2633.808700] ? finish_task_switch+0x1b4/0x920 [ 2633.808716] ? __switch_to_asm+0x34/0x70 [ 2633.808737] ? preempt_notifier_register+0x200/0x200 [ 2633.808751] ? __switch_to_asm+0x34/0x70 [ 2633.808766] ? __switch_to_asm+0x34/0x70 [ 2633.808779] ? __switch_to_asm+0x40/0x70 [ 2633.808793] ? __switch_to_asm+0x34/0x70 [ 2633.808811] ? __switch_to_asm+0x34/0x70 [ 2633.817363] ? __switch_to_asm+0x40/0x70 [ 2633.817377] ? __switch_to_asm+0x34/0x70 [ 2633.817393] ? __switch_to_asm+0x34/0x70 [ 2633.817406] ? __switch_to_asm+0x40/0x70 [ 2633.817420] ? __switch_to_asm+0x34/0x70 [ 2633.817433] ? __switch_to_asm+0x40/0x70 [ 2633.817454] ? find_held_lock+0x36/0x1c0 [ 2633.826616] ? load_image_lzo.cold.17+0xa65/0x1a69 [ 2633.834717] ? perf_trace_sched_process_exec+0x860/0x860 [ 2633.834737] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2633.834757] ? trace_hardirqs_on_caller+0xc0/0x310 [ 2633.834779] __should_failslab+0x124/0x180 [ 2633.834801] should_failslab+0x9/0x14 [ 2633.899245] __kmalloc+0x2e0/0x760 [ 2633.902797] ? strncpy_from_user+0x5a0/0x5a0 [ 2633.907237] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2633.912008] ? __x64_sys_memfd_create+0x142/0x4f0 [ 2633.916868] __x64_sys_memfd_create+0x142/0x4f0 [ 2633.921546] ? memfd_fcntl+0x1910/0x1910 [ 2633.925642] do_syscall_64+0x1b9/0x820 00:44:34 executing program 4: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) set_tid_address(&(0x7f0000000540)) r2 = syz_open_dev$video4linux(&(0x7f0000000500)='/dev/v4l-subdev#\x00', 0x101, 0x200) r3 = syz_open_procfs(0x0, &(0x7f0000000940)='task\x00') ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f00000009c0)={0x9, &(0x7f0000000980)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f00000008c0)={0x3, 0x4}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r0, 0x80000406, r4) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000480)='./file0\x00', 0x4800000000000, 0x6, &(0x7f0000000740)=[{&(0x7f00000004c0)="a3c76c691fe1bede92d23cb6e07f83b5f89e1588", 0x14, 0x5}, {&(0x7f0000000500), 0x0, 0xb8}, {&(0x7f0000000580)="dd6495a2e7e8c46b5ef1bb1cbc25c1fbd6ee85eab93a2b7f0c1a1d1037b29da417901d966ace3f444c", 0x29, 0x8}, {&(0x7f00000005c0)="8ebf6e6d498ba6b12c0860735540db1efeaacf4dc5463eaa51c8ce7f53db774dd1e00271d9f2d44909cbc029df9cd38b0e8c376c4ca0d63a9ea7ced7caa533f614779ce8519ab3a9283ab6ac655a4519d1ee2864900d71f48c0c34434c8e35ebb73166903703b8d261720209a2eb17615dc9f480", 0x74, 0x101}, {&(0x7f0000000640)="2442188f69a025967c2b7e94f9244000def1de8585e9f8940273d9b1a49e56092a2df120176d506e7ed8c62ac903", 0x2e, 0xffffffffffffff39}, {&(0x7f0000000680)="ff53c1b9520e2ef202c7d126e97761d08c0f5797d402a9ddaaa79eeaf4deaa53c3d6e389a11541319f5a33dce08be84e39732b10cb7e30880a11823048748d9b2045a9eb189395f6b9b7f8d6a04707d595b05a8826cbfb7935d14e981ef77783ea895fe3a12fa0f4f871039a635b29ffc8e01980d3ccd199afbbfcf85e2d06d3022526ac2b83", 0x86, 0x100000001}], 0x12009, &(0x7f0000000fc0)=ANY=[@ANYBLOB="6e6f71756f74612c737065637461746f722c6572726f72733d77697468647261772c6c6f63616c63616368696e672c6d6574612c6e6f726772706c76622c7374617466735f7175616e74756d3d3078303030303030303038303030303030312c6c6f63636f6f6b69652c6e6f737569646469722c6e6f7265636f766572792c6f626a5f747970653d2c00fe862a2918f0d96cab811b8bdcca092de2bab4d7c4b0d8349556c1627f2d341fd6751ca50e070a53e861dc8cf886bdcde38fff2921160165524ad6a6"]) unshare(0x400) signalfd(r4, &(0x7f00000002c0)={0x1000}, 0x8) write$P9_RCREATE(r5, &(0x7f0000000900)={0x18, 0x73, 0x2, {{0x0, 0x2, 0x1}, 0x8}}, 0x18) getsockopt$inet_sctp_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000300)=@assoc_id=0x0, &(0x7f0000000340)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000380)={r6, @in6={{0xa, 0x4e24, 0x238, @loopback, 0xfffffffffffffffe}}, 0x2, 0xf0, 0x43, 0x5, 0x12}, &(0x7f0000000440)=0x98) io_setup(0x80000001, &(0x7f0000000100)=0x0) io_cancel(r7, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x6, r5, &(0x7f0000000140)="74a40803a37bcb4181f72f0edc998f0b34fa5a3d91c4b07cac6ab7d34a853b3def65997e8831f7cbdc1b19ac6f6f7870bbf3aaed9dc5cb7512de5eff64bcca96a3f2fa3d1be1f3822628b1098962396e112bc5687b98addf58f05628cfb3022753ab518a67a56c8d756b4eecc035718607b1670a7d6b0b7877e581055b3288b6e93e2be21a43d9ede3dd9f59672490380916a1fdb83175273f80a330277c64b059b1029adbd6810302195ce084ab8d4c03622833526222b83d527f9f0777f9506beaba817077c2c5e95c46aa089b68dcfb597ce3520d83b24b", 0xd9, 0x7, 0x0, 0x2, r5}, &(0x7f0000000280)) ioctl$KVM_SET_BOOT_CPU_ID(r5, 0xae78, &(0x7f0000000080)=0x1) prctl$setmm(0x23, 0x2, &(0x7f0000ffb000/0x4000)=nil) prctl$setmm(0x23, 0x4000000000000001, &(0x7f0000ff1000/0x2000)=nil) getpeername$llc(r5, &(0x7f0000000800)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000840)=0x10) vmsplice(r4, &(0x7f0000000f40)=[{&(0x7f0000000a00)="9bafca063340889bd93a36633de971428c324463e7a277383ea8be6c02dbc9f4bf14cb41072c375c6322d7da957fd9d9124c91d90cdcc49a8ebd8cbe3146f5e5eadb7d94cbe378d159224f682f054212c3333e0b3bf088f65baa92ea7e49e641ff813241ca3cbbb01903536c209f4772964b6e25c9fc02301b85defb00ea9d22e87fa90e171f424261f7e323805902dfd93559ed3385eab1e1510b6278ec779b69ccc75129c5e085d368b3369e33705715aff20b8cbd6111673d1e95f4201288cf46f1c383d4e1ffe76a0b11eeb7631b866d3a3a14410a878a5d7041b82f7b", 0xdf}, {&(0x7f0000000b00)="54249282612e1c2a883136876c5e5072b045f405", 0x14}, {&(0x7f0000000b40)="cbd50139fc7268b52939365e96de907dbd1a2266a722895275616ea48a4ab3c8cb5a4dd18d57f01b525c0d67999489ed64b5e3c68e61c94780cd1e50361f39243449c151f74f65e969e466dbb5ba6e422da8819cdb99b9bbce651faa0d15182b8cfe30f317537c85ee440a89", 0x6c}, {&(0x7f0000000bc0)="08dddbda5f0be50686a86d4ad55f32746712daf3b32874dd23f1d495f1c57638026a1dfcf3776d88ab47624b3eb7143ab46591477eaa59cbbff2b62db9041e996ddd496a8f7fbf79c19078f3d527413ec1ae6bbc14428a777a5d61537944f17261a4ce9be88b62e005d4fd9db0855bbbe4601c174e8751ef23abd240d1eaab0ec10bd2ebdf61c5fde33f7df0257a813ed3c691", 0x93}, {&(0x7f0000000c80)="c6e2b2b52f97db603a9b7e8a230dc227180f313ef761b2043930caa0846df574bd9b3681555f2d9ddebb6cd81df991f48e98e4cde3d5ccaa9e5eb455a6bbddd0b41290a35b9844a060d27fbbcc209d3d81fb0a26a43a448d429903dfaa570f23bb346985d4986032a8ee5262f03c19655adfaeca522bac00a5b63cc749ddb628ffa41a52ea75770cbb95973fec6f728c018729b5cae071b56005f58f284e42e95d586429dc2e2fb7896d5d04cdc04dc0bc1cfffefdf21d42fb794400c8c8b475c1bffbf3d2432f91d75a41151a8c5b5bb521c3e9832b507b740df7409fce8586ae4b5fafe314bdf3c7bcb2c883", 0xed}, {&(0x7f0000000d80)="662a247d9806c5bc9c8d5fcd6e4bd856fc2fcaab90a6b6050054a787fd3082c645dc92a5c1bb553d72a1d89d1f182ed4afe75522027b369303209bd5b27224598f440871bb6aa137246818dc1ad6290c1a", 0x51}, {&(0x7f0000000e00)="f275582ed8ba893c87dc424a2f048540e8509e9916cc9d55bd051c10a53624435c03d1231dc0571e0211ff31ac0eaacaf47923aae671b9ad", 0x38}, {&(0x7f0000000e40)="705675320bd7b9c5408a921af1ab106b17f24725e8713aab9645dfcae1003e66c2f2ebf00d1ba6962b23a2339e10c52adca21826c949863b44cfb5fa5b34c1d8a03d410b4408875f95d604571fdb27d3997c4767683ea7a262063f6d1b09ceb4d038d812987e74f1c7b37777153d9246f20f5a92c2fb21ccd12e7c22440f0147c91d261ddbaa510be4560a6aa937fdca98d0bdbf439e66cef844c103124311730c3dc039f3f93a0046afd345a73808a491b4b5bc52c0b300914ee881b7ec01f97648b2efdab18d544d", 0xc9}], 0x8, 0x4) ioctl$KVM_GET_EMULATED_CPUID(r5, 0x8008ae9d, &(0x7f0000000280)) [ 2633.929542] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2633.934917] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2633.939860] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2633.944717] ? trace_hardirqs_on_caller+0x310/0x310 [ 2633.949750] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2633.954777] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2633.954802] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2633.954839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2633.964690] RIP: 0033:0x457569 [ 2633.964707] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2633.964716] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2633.964731] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457569 [ 2633.964740] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 2633.964750] RBP: 000000000072bf00 R08: 0000000000000020 R09: 00000000fbad8001 [ 2633.964769] R10: 0000000020000200 R11: 0000000000000246 R12: 00007fe3108686d4 00:44:34 executing program 4: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x11, 0x2, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) r3 = accept$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) bind$bt_hci(r1, &(0x7f0000000440)={0x1f, r4}, 0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x2, 0x200, 0x4, 0x1, r2}, &(0x7f0000000140)=0x10) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socketpair(0x1d, 0x3, 0x4, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_DEASSIGN_PCI_DEVICE(r6, 0x4040ae72, &(0x7f00000001c0)={0x7f4cdc4, 0x81, 0x5, 0x3, 0x2}) r7 = fcntl$dupfd(r5, 0x0, r5) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r7, 0x8008ae9d, &(0x7f0000000280)) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000240), &(0x7f0000000280)=0xc) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r7, 0x84, 0x20, &(0x7f0000000180)=0x7, 0x4) [ 2634.028790] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 00:44:34 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0xcc000000, 0x0) 00:44:34 executing program 0 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebbc00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:34 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfsu', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x2000000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2634.149660] can: request_module (can-proto-4) failed. [ 2634.191027] can: request_module (can-proto-4) failed. [ 2634.211553] FAULT_INJECTION: forcing a failure. [ 2634.211553] name failslab, interval 1, probability 0, space 0, times 0 [ 2634.228611] input: syz1 as /devices/virtual/input/input2814 [ 2634.235964] input: failed to attach handler leds to device input2814, error: -6 [ 2634.246092] CPU: 1 PID: 5037 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2634.254252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2634.263612] Call Trace: [ 2634.263641] dump_stack+0x244/0x39d [ 2634.263669] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2634.263701] should_fail.cold.4+0xa/0x17 [ 2634.279129] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2634.284257] ? zap_class+0x640/0x640 [ 2634.284274] ? __lock_acquire+0x62f/0x4c20 [ 2634.284291] ? lock_downgrade+0x900/0x900 [ 2634.284306] ? check_preemption_disabled+0x48/0x280 [ 2634.284328] ? find_held_lock+0x36/0x1c0 [ 2634.284361] ? expand_files.part.8+0x571/0x9a0 [ 2634.310051] ? perf_trace_sched_process_exec+0x860/0x860 [ 2634.315516] ? find_held_lock+0x36/0x1c0 [ 2634.319609] __should_failslab+0x124/0x180 [ 2634.323865] should_failslab+0x9/0x14 [ 2634.327673] kmem_cache_alloc+0x2be/0x730 [ 2634.331845] ? shmem_destroy_callback+0xc0/0xc0 [ 2634.336526] shmem_alloc_inode+0x1b/0x40 [ 2634.340601] alloc_inode+0x63/0x190 [ 2634.344238] new_inode_pseudo+0x71/0x1a0 [ 2634.348336] ? prune_icache_sb+0x1c0/0x1c0 [ 2634.352592] ? _raw_spin_unlock+0x2c/0x50 [ 2634.356755] new_inode+0x1c/0x40 [ 2634.360135] shmem_get_inode+0xf1/0x920 [ 2634.364125] ? shmem_encode_fh+0x340/0x340 [ 2634.368368] ? lock_downgrade+0x900/0x900 [ 2634.372529] ? lock_release+0xa10/0xa10 [ 2634.376510] ? perf_trace_sched_process_exec+0x860/0x860 [ 2634.381967] ? usercopy_warn+0x110/0x110 [ 2634.386055] __shmem_file_setup.part.50+0x83/0x2a0 [ 2634.390999] shmem_file_setup+0x65/0x90 [ 2634.394985] __x64_sys_memfd_create+0x2af/0x4f0 [ 2634.399667] ? memfd_fcntl+0x1910/0x1910 [ 2634.403751] do_syscall_64+0x1b9/0x820 [ 2634.407649] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2634.413255] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2634.418195] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2634.423050] ? trace_hardirqs_on_caller+0x310/0x310 [ 2634.428080] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2634.433114] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2634.437974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2634.443170] RIP: 0033:0x457569 [ 2634.446370] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2634.465274] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2634.472986] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457569 [ 2634.480257] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 2634.487529] RBP: 000000000072bf00 R08: 0000000000000020 R09: 00000000fbad8001 [ 2634.494805] R10: 0000000020000200 R11: 0000000000000246 R12: 00007fe3108686d4 [ 2634.502086] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 00:44:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000040)={0x32, 0x2, {0x3, 0x3, 0x8, 0x3, 0x7}}) listen(r1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x80000, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) creat(&(0x7f00000007c0)='./file0\x00', 0x21) ioctl$TCXONC(r3, 0x540a, 0x1) syz_open_dev$dspn(&(0x7f0000000780)='/dev/dsp#\x00', 0xa5d3, 0x20000) unshare(0x400) recvmsg(r0, &(0x7f0000000740)={&(0x7f0000000100)=@hci, 0x80, &(0x7f0000000640)=[{&(0x7f0000000180)=""/207, 0xcf}, {&(0x7f0000000280)=""/97, 0x61}, {&(0x7f0000000300)=""/169, 0xa9}, {&(0x7f00000003c0)=""/227, 0xe3}, {&(0x7f00000004c0)=""/245, 0xf5}, {&(0x7f00000005c0)=""/102, 0x66}], 0x6, &(0x7f00000006c0)=""/104, 0x68, 0x3f}, 0x40012042) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) 00:44:34 executing program 0 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:34 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673ff", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2634.515931] input: syz1 as /devices/virtual/input/input2815 00:44:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0xae0d0000, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000040)={0x401, 0x600000000000000, 0xa1}) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2634.591191] input: failed to attach handler leds to device input2815, error: -6 [ 2634.615358] FAULT_INJECTION: forcing a failure. [ 2634.615358] name failslab, interval 1, probability 0, space 0, times 0 [ 2634.648592] CPU: 0 PID: 5051 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2634.656764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2634.666129] Call Trace: [ 2634.668730] dump_stack+0x244/0x39d [ 2634.672381] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2634.677603] should_fail.cold.4+0xa/0x17 [ 2634.681688] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2634.686805] ? __kernel_text_address+0xd/0x40 [ 2634.691327] ? unwind_get_return_address+0x61/0xa0 00:44:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0xc0000, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/158, 0x9e}], 0x1, 0x0) r4 = getpgrp(0x0) syz_open_procfs(r4, &(0x7f0000000280)='net/ip6_flowlabel\x00') ioctl$VIDIOC_QUERYCAP(r3, 0x80685600, &(0x7f0000000200)) getsockname$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) 00:44:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2634.696288] ? find_held_lock+0x36/0x1c0 [ 2634.700380] ? perf_trace_sched_process_exec+0x860/0x860 [ 2634.705863] __should_failslab+0x124/0x180 [ 2634.710125] should_failslab+0x9/0x14 [ 2634.713939] kmem_cache_alloc+0x2be/0x730 [ 2634.718106] ? mpol_shared_policy_init+0x235/0x650 [ 2634.723051] ? current_time+0x72/0x1b0 [ 2634.726968] __d_alloc+0xc8/0xb90 [ 2634.730443] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 2634.735472] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2634.740500] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 2634.745703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2634.751257] ? timespec64_trunc+0xea/0x180 [ 2634.755501] ? inode_init_owner+0x340/0x340 [ 2634.759850] ? _raw_spin_unlock+0x2c/0x50 [ 2634.764023] ? current_time+0x10b/0x1b0 [ 2634.768020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2634.773578] ? __lockdep_init_map+0x105/0x590 [ 2634.778098] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2634.783654] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2634.789208] d_alloc_pseudo+0x1d/0x30 [ 2634.793025] alloc_file_pseudo+0x158/0x3f0 [ 2634.797273] ? alloc_file+0x4d0/0x4d0 [ 2634.801098] ? usercopy_warn+0x110/0x110 [ 2634.805183] __shmem_file_setup.part.50+0x110/0x2a0 [ 2634.805208] shmem_file_setup+0x65/0x90 [ 2634.805227] __x64_sys_memfd_create+0x2af/0x4f0 [ 2634.805243] ? memfd_fcntl+0x1910/0x1910 [ 2634.805269] do_syscall_64+0x1b9/0x820 [ 2634.814243] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2634.814262] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2634.814278] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2634.814298] ? trace_hardirqs_on_caller+0x310/0x310 [ 2634.814316] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2634.814335] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2634.814357] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2634.814379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2634.814391] RIP: 0033:0x457569 [ 2634.814407] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2634.814416] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2634.814431] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457569 [ 2634.814440] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 2634.814450] RBP: 000000000072bf00 R08: 0000000000000020 R09: 00000000fbad8001 [ 2634.814460] R10: 0000000020000200 R11: 0000000000000246 R12: 00007fe3108686d4 [ 2634.814469] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 00:44:35 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x334, 0x0) 00:44:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in6=@mcast1, 0x4e22, 0x1000, 0x4e22, 0x5, 0x2, 0xa0, 0x20, 0x29, 0x0, r3}, {0x1, 0x41, 0x3, 0xffff, 0x677, 0x0, 0x4}, {0x0, 0x2b000000, 0xfffffffffffffff8, 0xa085}, 0x1f, 0x0, 0x1, 0x0, 0x1, 0x1}, {{@in=@multicast1, 0x4d5, 0x33}, 0xa, @in=@multicast2, 0x3505, 0x1, 0x3, 0x5, 0x0, 0x40, 0x40}}, 0xe8) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:35 executing program 0 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebb000"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:35 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:35 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x7, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2635.092396] FAULT_INJECTION: forcing a failure. [ 2635.092396] name failslab, interval 1, probability 0, space 0, times 0 [ 2635.116286] input: syz1 as /devices/virtual/input/input2816 [ 2635.130983] CPU: 1 PID: 5078 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2635.138829] input: failed to attach handler leds to device input2816, error: -6 [ 2635.139144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2635.139155] Call Trace: [ 2635.158537] dump_stack+0x244/0x39d [ 2635.162178] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2635.167383] ? __save_stack_trace+0x8d/0xf0 [ 2635.171722] should_fail.cold.4+0xa/0x17 [ 2635.171743] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2635.171762] ? save_stack+0x43/0xd0 [ 2635.171777] ? kasan_kmalloc+0xc7/0xe0 [ 2635.171802] ? percpu_ref_put_many+0x11c/0x260 [ 2635.193029] ? zap_class+0x640/0x640 [ 2635.196755] ? find_held_lock+0x36/0x1c0 [ 2635.200850] ? i8042_init+0x264/0xa1d [ 2635.204677] ? perf_trace_sched_process_exec+0x860/0x860 [ 2635.210140] ? lock_downgrade+0x900/0x900 [ 2635.214307] __should_failslab+0x124/0x180 [ 2635.218557] should_failslab+0x9/0x14 [ 2635.222371] kmem_cache_alloc+0x2be/0x730 [ 2635.226526] ? d_set_d_op+0x31d/0x410 [ 2635.230349] __alloc_file+0xa8/0x470 [ 2635.234077] ? file_free_rcu+0xd0/0xd0 [ 2635.237975] ? d_instantiate+0x79/0xa0 [ 2635.241872] ? lock_downgrade+0x900/0x900 [ 2635.246036] ? kasan_check_read+0x11/0x20 [ 2635.250194] ? do_raw_spin_unlock+0xa7/0x330 [ 2635.254641] ? do_raw_spin_trylock+0x270/0x270 [ 2635.259244] alloc_empty_file+0x72/0x170 [ 2635.263318] alloc_file+0x5e/0x4d0 [ 2635.266866] ? _raw_spin_unlock+0x2c/0x50 [ 2635.271029] alloc_file_pseudo+0x261/0x3f0 [ 2635.275279] ? alloc_file+0x4d0/0x4d0 [ 2635.279095] ? usercopy_warn+0x110/0x110 [ 2635.283189] __shmem_file_setup.part.50+0x110/0x2a0 [ 2635.288220] shmem_file_setup+0x65/0x90 [ 2635.292203] __x64_sys_memfd_create+0x2af/0x4f0 [ 2635.296882] ? memfd_fcntl+0x1910/0x1910 [ 2635.300967] do_syscall_64+0x1b9/0x820 [ 2635.304864] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2635.310235] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2635.315175] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2635.320035] ? trace_hardirqs_on_caller+0x310/0x310 [ 2635.325062] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2635.330092] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2635.335122] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2635.339982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2635.345177] RIP: 0033:0x457569 [ 2635.348383] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2635.367294] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2635.375015] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457569 [ 2635.382287] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a 00:44:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x9, 0x800001fc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x406, r0) unshare(0x3fd) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x8, 0x185000) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) [ 2635.389559] RBP: 000000000072bf00 R08: 0000000000000020 R09: 00000000fbad8001 [ 2635.396853] R10: 0000000020000200 R11: 0000000000000246 R12: 00007fe3108686d4 [ 2635.404125] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 [ 2635.412438] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:35 executing program 0 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000040)=[@in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e24}, @in={0x2, 0x4e20}, @in={0x2, 0x4e23}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}], 0x50) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2635.472675] input: syz1 as /devices/virtual/input/input2817 [ 2635.512332] input: failed to attach handler leds to device input2817, error: -6 00:44:35 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667380", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:35 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x7a00, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100b8eb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2635.664073] FAULT_INJECTION: forcing a failure. [ 2635.664073] name failslab, interval 1, probability 0, space 0, times 0 [ 2635.678756] input: syz1 as /devices/virtual/input/input2818 [ 2635.695048] input: failed to attach handler leds to device input2818, error: -6 [ 2635.705122] CPU: 0 PID: 5117 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2635.713290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2635.722658] Call Trace: [ 2635.725271] dump_stack+0x244/0x39d [ 2635.728922] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2635.734130] ? lock_downgrade+0x900/0x900 [ 2635.738286] ? check_preemption_disabled+0x48/0x280 [ 2635.743318] should_fail.cold.4+0xa/0x17 [ 2635.747389] ? rcu_softirq_qs+0x20/0x20 [ 2635.751374] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2635.756502] ? is_bpf_text_address+0xd3/0x170 [ 2635.761019] ? kernel_text_address+0x79/0xf0 [ 2635.765438] ? __kernel_text_address+0xd/0x40 [ 2635.769942] ? unwind_get_return_address+0x61/0xa0 [ 2635.774883] ? __save_stack_trace+0x8d/0xf0 [ 2635.779221] ? find_held_lock+0x36/0x1c0 [ 2635.783358] ? write_byte+0x1ef/0x27b [ 2635.787185] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 2635.792042] ? perf_trace_sched_process_exec+0x860/0x860 [ 2635.797510] __should_failslab+0x124/0x180 [ 2635.801767] should_failslab+0x9/0x14 [ 2635.805584] kmem_cache_alloc_trace+0x2d7/0x750 [ 2635.810279] ? __might_sleep+0x95/0x190 [ 2635.814290] apparmor_file_alloc_security+0x17b/0xac0 [ 2635.819496] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2635.825048] ? apparmor_path_rename+0xcd0/0xcd0 [ 2635.829733] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2635.834766] ? kmem_cache_alloc+0x33a/0x730 [ 2635.839103] ? d_set_d_op+0x31d/0x410 [ 2635.842925] security_file_alloc+0x4c/0xa0 [ 2635.847210] __alloc_file+0x12a/0x470 [ 2635.851025] ? file_free_rcu+0xd0/0xd0 [ 2635.854928] ? d_instantiate+0x79/0xa0 [ 2635.858865] ? lock_downgrade+0x900/0x900 [ 2635.863037] ? kasan_check_read+0x11/0x20 [ 2635.867197] ? do_raw_spin_unlock+0xa7/0x330 [ 2635.871642] ? do_raw_spin_trylock+0x270/0x270 [ 2635.876240] alloc_empty_file+0x72/0x170 [ 2635.880321] alloc_file+0x5e/0x4d0 [ 2635.883873] ? _raw_spin_unlock+0x2c/0x50 [ 2635.883897] alloc_file_pseudo+0x261/0x3f0 [ 2635.883917] ? alloc_file+0x4d0/0x4d0 [ 2635.892293] ? usercopy_warn+0x110/0x110 [ 2635.892324] __shmem_file_setup.part.50+0x110/0x2a0 [ 2635.892347] shmem_file_setup+0x65/0x90 [ 2635.892364] __x64_sys_memfd_create+0x2af/0x4f0 [ 2635.892381] ? memfd_fcntl+0x1910/0x1910 [ 2635.892409] do_syscall_64+0x1b9/0x820 [ 2635.921844] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2635.927229] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2635.932183] ? trace_hardirqs_on_caller+0x310/0x310 [ 2635.937215] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2635.942243] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 2635.948920] ? __switch_to_asm+0x40/0x70 [ 2635.952991] ? __switch_to_asm+0x34/0x70 [ 2635.957072] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2635.961939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2635.967136] RIP: 0033:0x457569 [ 2635.970342] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2635.989251] RSP: 002b:00007fe310825a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2635.996966] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000457569 [ 2636.004239] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 2636.011516] RBP: 000000000072c040 R08: 0000000000000020 R09: 00000000fbad8001 [ 2636.018791] R10: 0000000020000200 R11: 0000000000000246 R12: 00007fe3108266d4 [ 2636.026075] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 [ 2636.043423] input: syz1 as /devices/virtual/input/input2819 00:44:36 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0xa, 0x0) 00:44:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:36 executing program 0 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:36 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x700, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2636.082307] input: failed to attach handler leds to device input2819, error: -6 [ 2636.137901] FAULT_INJECTION: forcing a failure. [ 2636.137901] name failslab, interval 1, probability 0, space 0, times 0 [ 2636.161606] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2636.180202] CPU: 1 PID: 5132 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2636.188364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2636.188372] Call Trace: [ 2636.188400] dump_stack+0x244/0x39d [ 2636.188436] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2636.200362] ? find_held_lock+0x36/0x1c0 [ 2636.200387] should_fail.cold.4+0xa/0x17 [ 2636.200402] ? find_held_lock+0x36/0x1c0 [ 2636.200426] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2636.209239] ? lock_downgrade+0x900/0x900 [ 2636.209254] ? current_time+0x72/0x1b0 [ 2636.209276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2636.209295] ? timespec64_trunc+0xea/0x180 [ 2636.226542] ? inode_init_owner+0x340/0x340 [ 2636.226566] ? find_held_lock+0x36/0x1c0 [ 2636.226615] ? perf_trace_sched_process_exec+0x860/0x860 [ 2636.244390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2636.244417] __should_failslab+0x124/0x180 [ 2636.244439] should_failslab+0x9/0x14 [ 2636.244455] kmem_cache_alloc+0x2be/0x730 [ 2636.244474] ? do_sys_ftruncate+0x428/0x550 [ 2636.252849] ? lock_downgrade+0x900/0x900 [ 2636.252871] getname_flags+0xd0/0x590 [ 2636.252887] ? __lock_is_held+0xb5/0x140 [ 2636.252904] getname+0x19/0x20 [ 2636.252920] do_sys_open+0x383/0x700 [ 2636.252938] ? filp_open+0x80/0x80 [ 2636.263923] ? trace_hardirqs_off_caller+0x300/0x300 [ 2636.263938] ? do_sys_ftruncate+0x449/0x550 [ 2636.263959] __x64_sys_open+0x7e/0xc0 [ 2636.263980] do_syscall_64+0x1b9/0x820 [ 2636.264001] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2636.325279] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2636.325297] ? trace_hardirqs_off_thunk+0x1a/0x1c 00:44:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x4, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00H\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2636.325317] ? trace_hardirqs_on_caller+0x310/0x310 [ 2636.325335] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2636.325356] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2636.340125] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2636.340152] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2636.340165] RIP: 0033:0x4111a1 [ 2636.340182] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 00:44:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r3, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x840}, 0x4000) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2636.340196] RSP: 002b:00007fe310867a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2636.360221] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004111a1 [ 2636.360232] RDX: 00007fe310867afa RSI: 0000000000000002 RDI: 00007fe310867af0 [ 2636.360242] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2636.360251] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2636.360260] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 2636.429179] input: syz1 as /devices/virtual/input/input2820 00:44:36 executing program 0 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2636.437005] input: failed to attach handler leds to device input2820, error: -6 00:44:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2636.508106] FAULT_INJECTION: forcing a failure. [ 2636.508106] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2636.519957] CPU: 1 PID: 5154 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2636.528108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2636.537468] Call Trace: [ 2636.540077] dump_stack+0x244/0x39d [ 2636.544204] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2636.549428] should_fail.cold.4+0xa/0x17 [ 2636.553511] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2636.558631] ? print_usage_bug+0xc0/0xc0 [ 2636.563201] ? mark_held_locks+0x130/0x130 [ 2636.567451] ? zap_class+0x640/0x640 [ 2636.571182] ? print_usage_bug+0xc0/0xc0 [ 2636.575255] ? zap_class+0x640/0x640 [ 2636.575272] ? lock_downgrade+0x900/0x900 [ 2636.575288] ? check_preemption_disabled+0x48/0x280 [ 2636.575321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2636.575341] ? should_fail+0x22d/0xd01 [ 2636.588201] ? find_held_lock+0x36/0x1c0 [ 2636.588221] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2636.588247] __alloc_pages_nodemask+0x34b/0xdd0 [ 2636.588261] ? current_time+0x72/0x1b0 [ 2636.588282] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 2636.601745] ? inode_init_owner+0x340/0x340 [ 2636.601767] ? find_held_lock+0x36/0x1c0 [ 2636.601810] ? trace_hardirqs_off+0xb8/0x310 [ 2636.601842] cache_grow_begin+0xa5/0x8c0 [ 2636.601863] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2636.611627] ? check_preemption_disabled+0x48/0x280 [ 2636.611651] kmem_cache_alloc+0x66b/0x730 [ 2636.611667] ? do_sys_ftruncate+0x428/0x550 [ 2636.611690] getname_flags+0xd0/0x590 [ 2636.611705] ? __lock_is_held+0xb5/0x140 [ 2636.611726] getname+0x19/0x20 [ 2636.667430] do_sys_open+0x383/0x700 [ 2636.671165] ? filp_open+0x80/0x80 [ 2636.674720] ? trace_hardirqs_off_caller+0x300/0x300 [ 2636.679844] ? do_sys_ftruncate+0x449/0x550 [ 2636.684193] __x64_sys_open+0x7e/0xc0 [ 2636.688014] do_syscall_64+0x1b9/0x820 [ 2636.691918] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2636.697298] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2636.702234] ? trace_hardirqs_off_thunk+0x1a/0x1c 00:44:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x4000000000406, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:36 executing program 4: eventfd2(0xf07c, 0x80001) socketpair$inet(0x2, 0x6, 0x7fff, &(0x7f0000000100)) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400002, 0x0) accept$inet6(r1, &(0x7f00000000c0), &(0x7f0000000480)=0x1c) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000180)={0x7fff, 0x8c4, 0x1017, 0x8, 0x3, {0x9, 0x40}, 0x1}) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x400000, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r2, 0xc040564a, &(0x7f0000000080)={0x400, 0x6, 0x703f, 0x4, 0x1, 0x4, 0x80000000}) r3 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x6, 0x30001) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000300)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000440)={r4, &(0x7f0000000340)=""/245}) sendto$inet6(r3, &(0x7f0000000200)="db44c67d2a02a4a5d76f4d30f3324f30be3ae30c8eeb0440ae65aa893872714b1e3751cc91d4f6bc9441b2156ee2de7abb0e46de3b63ecba7492e92ca47c950fe7bdea0dd98a249c41266435655fe01e9b7532bec049283d883f1147ce9f9d2dbf05c8b332a0bc6109bf554b67f2053aca4ec91997552c5b39fdd8253c55793a16c02a4b629e5e7ccf3a3ad0f9f379677f6205ce678a12dac787d1ca078ec13c67ba1640d06c27a6a2b8a63b3df3cd976db4c393e73cbadb29ccca86695646d548", 0xc1, 0x40, 0x0, 0x0) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000000280)) [ 2636.702255] ? trace_hardirqs_on_caller+0x310/0x310 [ 2636.702273] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2636.702292] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2636.702314] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2636.702343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2636.712189] RIP: 0033:0x4111a1 [ 2636.712206] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2636.712215] RSP: 002b:00007fe310867a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2636.712231] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004111a1 [ 2636.712241] RDX: 00007fe310867afa RSI: 0000000000000002 RDI: 00007fe310867af0 [ 2636.712251] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2636.712260] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2636.712269] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 2636.771151] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,,errors=continue 00:44:36 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0xd000000000000000, 0x0) 00:44:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x49}) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:36 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x4c00, 0x77], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100e0eb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2636.839047] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getuid() fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r2, r3) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) unshare(0x400) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e20, @multicast2}}, 0x400, 0x7fffffff, 0x100000001, 0x4, 0x400}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r6, 0xfe5}, &(0x7f00000001c0)=0x8) ioctl$KVM_GET_EMULATED_CPUID(r5, 0x8008ae9d, &(0x7f0000000280)) 00:44:37 executing program 0 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:37 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2636.924518] input: syz1 as /devices/virtual/input/input2821 [ 2636.945678] input: failed to attach handler leds to device input2821, error: -6 [ 2637.001963] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2637.013598] FAULT_INJECTION: forcing a failure. [ 2637.013598] name failslab, interval 1, probability 0, space 0, times 0 [ 2637.039862] CPU: 1 PID: 5183 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2637.048028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2637.057385] Call Trace: [ 2637.057414] dump_stack+0x244/0x39d [ 2637.057441] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2637.057461] ? print_usage_bug+0xc0/0xc0 [ 2637.057489] should_fail.cold.4+0xa/0x17 [ 2637.063683] ? find_held_lock+0x36/0x1c0 [ 2637.063702] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2637.063726] ? lock_downgrade+0x900/0x900 [ 2637.063746] ? check_preemption_disabled+0x48/0x280 [ 2637.072989] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2637.100245] ? kasan_check_read+0x11/0x20 [ 2637.100273] ? find_held_lock+0x36/0x1c0 [ 2637.100309] ? perf_trace_sched_process_exec+0x860/0x860 [ 2637.113952] __should_failslab+0x124/0x180 [ 2637.118199] should_failslab+0x9/0x14 [ 2637.122017] kmem_cache_alloc+0x2be/0x730 [ 2637.126172] ? zap_class+0x640/0x640 [ 2637.126188] ? print_usage_bug+0xc0/0xc0 [ 2637.126206] ? mark_held_locks+0x130/0x130 [ 2637.126229] __alloc_file+0xa8/0x470 [ 2637.126249] ? file_free_rcu+0xd0/0xd0 [ 2637.138236] ? find_held_lock+0x36/0x1c0 [ 2637.138265] ? is_bpf_text_address+0xac/0x170 [ 2637.138283] ? lock_downgrade+0x900/0x900 [ 2637.138304] ? check_preemption_disabled+0x48/0x280 [ 2637.154423] alloc_empty_file+0x72/0x170 [ 2637.154443] path_openat+0x170/0x5150 [ 2637.154459] ? rcu_softirq_qs+0x20/0x20 [ 2637.154474] ? unwind_dump+0x190/0x190 [ 2637.154497] ? zap_class+0x640/0x640 [ 2637.167709] ? path_lookupat.isra.43+0xc00/0xc00 [ 2637.167726] ? unwind_get_return_address+0x61/0xa0 [ 2637.167745] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2637.167760] ? expand_files.part.8+0x571/0x9a0 [ 2637.167782] ? find_held_lock+0x36/0x1c0 [ 2637.183132] ? __alloc_fd+0x347/0x6e0 [ 2637.183152] ? lock_downgrade+0x900/0x900 [ 2637.183164] ? getname+0x19/0x20 [ 2637.183189] ? kasan_check_read+0x11/0x20 [ 2637.183204] ? do_raw_spin_unlock+0xa7/0x330 [ 2637.183223] ? do_raw_spin_trylock+0x270/0x270 [ 2637.192898] ? __lock_is_held+0xb5/0x140 [ 2637.192913] ? __check_object_size+0xb1/0x782 [ 2637.192937] ? _raw_spin_unlock+0x2c/0x50 [ 2637.192953] ? __alloc_fd+0x347/0x6e0 [ 2637.192980] do_filp_open+0x255/0x380 [ 2637.202553] ? may_open_dev+0x100/0x100 [ 2637.202585] ? get_unused_fd_flags+0x122/0x1a0 [ 2637.202611] ? __alloc_fd+0x6e0/0x6e0 [ 2637.210786] input: syz1 as /devices/virtual/input/input2823 [ 2637.214599] ? __lock_is_held+0xb5/0x140 [ 2637.214624] do_sys_open+0x568/0x700 [ 2637.214642] ? filp_open+0x80/0x80 [ 2637.221385] input: failed to attach handler leds to device input2823, error: -6 [ 2637.222141] ? trace_hardirqs_off_caller+0x300/0x300 [ 2637.222157] ? do_sys_ftruncate+0x449/0x550 [ 2637.222177] __x64_sys_open+0x7e/0xc0 [ 2637.222197] do_syscall_64+0x1b9/0x820 [ 2637.235226] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2637.235247] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2637.235263] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2637.235283] ? trace_hardirqs_on_caller+0x310/0x310 [ 2637.235300] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2637.235320] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2637.335473] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2637.340339] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2637.345536] RIP: 0033:0x4111a1 [ 2637.348737] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2637.367652] RSP: 002b:00007fe310867a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2637.375378] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004111a1 [ 2637.382664] RDX: 00007fe310867afa RSI: 0000000000000002 RDI: 00007fe310867af0 [ 2637.389947] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 00:44:37 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) 00:44:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0x4c00000000000000], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2637.397224] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2637.404497] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 00:44:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @multicast2}}}, &(0x7f0000000040)=0x84) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000080)={r3, 0xfffffffeffffffff}, 0x8) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:37 executing program 0 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2637.560514] FAULT_INJECTION: forcing a failure. [ 2637.560514] name failslab, interval 1, probability 0, space 0, times 0 [ 2637.571971] CPU: 0 PID: 5211 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2637.580126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2637.580139] Call Trace: [ 2637.592086] dump_stack+0x244/0x39d [ 2637.592119] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2637.592138] ? lock_downgrade+0x900/0x900 [ 2637.592160] ? check_preemption_disabled+0x48/0x280 [ 2637.610118] should_fail.cold.4+0xa/0x17 [ 2637.614190] ? rcu_softirq_qs+0x20/0x20 [ 2637.618174] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2637.623300] ? is_bpf_text_address+0xd3/0x170 [ 2637.627808] ? kernel_text_address+0x79/0xf0 [ 2637.632240] ? __kernel_text_address+0xd/0x40 [ 2637.636746] ? unwind_get_return_address+0x61/0xa0 [ 2637.641687] ? __save_stack_trace+0x8d/0xf0 [ 2637.646025] ? find_held_lock+0x36/0x1c0 [ 2637.650122] ? do_syscall_64+0x1b9/0x820 [ 2637.654197] ? perf_trace_sched_process_exec+0x860/0x860 [ 2637.659668] __should_failslab+0x124/0x180 [ 2637.663913] should_failslab+0x9/0x14 [ 2637.667721] kmem_cache_alloc_trace+0x2d7/0x750 [ 2637.672403] ? __might_sleep+0x95/0x190 [ 2637.676394] apparmor_file_alloc_security+0x17b/0xac0 [ 2637.681592] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2637.687144] ? apparmor_path_rename+0xcd0/0xcd0 [ 2637.691843] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2637.696871] ? kmem_cache_alloc+0x33a/0x730 [ 2637.701199] ? zap_class+0x640/0x640 [ 2637.704937] security_file_alloc+0x4c/0xa0 [ 2637.709181] __alloc_file+0x12a/0x470 [ 2637.712997] ? file_free_rcu+0xd0/0xd0 [ 2637.716898] ? find_held_lock+0x36/0x1c0 [ 2637.720978] ? is_bpf_text_address+0xac/0x170 [ 2637.725482] ? lock_downgrade+0x900/0x900 [ 2637.729634] ? check_preemption_disabled+0x48/0x280 [ 2637.734662] alloc_empty_file+0x72/0x170 [ 2637.738735] path_openat+0x170/0x5150 [ 2637.742548] ? rcu_softirq_qs+0x20/0x20 [ 2637.746530] ? unwind_dump+0x190/0x190 [ 2637.750432] ? zap_class+0x640/0x640 [ 2637.754159] ? path_lookupat.isra.43+0xc00/0xc00 [ 2637.758925] ? unwind_get_return_address+0x61/0xa0 [ 2637.763865] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2637.768887] ? expand_files.part.8+0x571/0x9a0 [ 2637.773484] ? find_held_lock+0x36/0x1c0 [ 2637.777562] ? __alloc_fd+0x347/0x6e0 [ 2637.781371] ? lock_downgrade+0x900/0x900 [ 2637.785521] ? getname+0x19/0x20 [ 2637.788904] ? kasan_check_read+0x11/0x20 [ 2637.793062] ? do_raw_spin_unlock+0xa7/0x330 [ 2637.797486] ? do_raw_spin_trylock+0x270/0x270 [ 2637.802076] ? __lock_is_held+0xb5/0x140 [ 2637.806150] ? __check_object_size+0xb1/0x782 [ 2637.810659] ? _raw_spin_unlock+0x2c/0x50 [ 2637.814824] ? __alloc_fd+0x347/0x6e0 [ 2637.818648] do_filp_open+0x255/0x380 [ 2637.822456] ? may_open_dev+0x100/0x100 [ 2637.826454] ? get_unused_fd_flags+0x122/0x1a0 [ 2637.831043] ? __alloc_fd+0x6e0/0x6e0 [ 2637.834863] ? __lock_is_held+0xb5/0x140 [ 2637.838942] do_sys_open+0x568/0x700 [ 2637.842672] ? filp_open+0x80/0x80 [ 2637.846228] ? trace_hardirqs_off_caller+0x300/0x300 [ 2637.851336] ? do_sys_ftruncate+0x449/0x550 [ 2637.855671] __x64_sys_open+0x7e/0xc0 [ 2637.859485] do_syscall_64+0x1b9/0x820 [ 2637.863380] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2637.868753] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2637.873687] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2637.878538] ? trace_hardirqs_on_caller+0x310/0x310 [ 2637.883563] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2637.888589] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2637.893617] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2637.898480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2637.903678] RIP: 0033:0x4111a1 [ 2637.906877] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2637.925782] RSP: 002b:00007fe310867a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2637.933505] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004111a1 [ 2637.940777] RDX: 00007fe310867afa RSI: 0000000000000002 RDI: 00007fe310867af0 [ 2637.948050] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2637.955325] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2637.962600] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 00:44:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100b4eb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:38 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0xffffff7f, 0x0) 00:44:38 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667303", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1000400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000040)={0x79e6bea5, 0x0, 0x10001, 0x3}) ioctl$KDMKTONE(r2, 0x4b30, 0x7) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000080)={0x7, r3}) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0x700], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:38 executing program 0 (fault-call:2 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:38 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2638.137543] input: syz1 as /devices/virtual/input/input2824 [ 2638.149269] FAULT_INJECTION: forcing a failure. [ 2638.149269] name failslab, interval 1, probability 0, space 0, times 0 [ 2638.165780] input: failed to attach handler leds to device input2824, error: -6 [ 2638.174506] CPU: 0 PID: 5229 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2638.182662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2638.182669] Call Trace: [ 2638.182699] dump_stack+0x244/0x39d [ 2638.182728] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2638.203473] should_fail.cold.4+0xa/0x17 [ 2638.207545] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2638.212651] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2638.212670] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2638.212685] ? retint_kernel+0x1b/0x2d [ 2638.212711] ? zap_class+0x640/0x640 [ 2638.212729] ? lock_acquire+0x1ed/0x520 [ 2638.222924] ? lo_ioctl+0x8e/0x1d60 [ 2638.222948] ? find_held_lock+0x36/0x1c0 [ 2638.222969] ? __lock_is_held+0xb5/0x140 [ 2638.222999] ? perf_trace_sched_process_exec+0x860/0x860 [ 2638.251701] __should_failslab+0x124/0x180 [ 2638.255961] should_failslab+0x9/0x14 [ 2638.259776] kmem_cache_alloc_trace+0x2d7/0x750 [ 2638.264466] ? check_preemption_disabled+0x48/0x280 [ 2638.269507] __kthread_create_on_node+0x137/0x540 [ 2638.274360] ? loop_get_status64+0x140/0x140 [ 2638.278781] ? kthread_parkme+0xb0/0xb0 [ 2638.282795] ? __lockdep_init_map+0x105/0x590 [ 2638.287308] ? __lockdep_init_map+0x105/0x590 [ 2638.291827] ? loop_get_status64+0x140/0x140 [ 2638.296248] kthread_create_on_node+0xb1/0xe0 [ 2638.300751] ? __kthread_create_on_node+0x540/0x540 [ 2638.305781] ? kasan_check_read+0x11/0x20 [ 2638.309956] lo_ioctl+0x7f6/0x1d60 [ 2638.313509] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2638.313525] blkdev_ioctl+0x98e/0x21b0 [ 2638.313541] ? blkpg_ioctl+0xc10/0xc10 [ 2638.313558] ? lock_downgrade+0x900/0x900 [ 2638.313574] ? check_preemption_disabled+0x48/0x280 [ 2638.313592] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2638.321362] ? kasan_check_read+0x11/0x20 [ 2638.321379] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2638.321395] ? rcu_softirq_qs+0x20/0x20 [ 2638.321421] ? __fget+0x4d1/0x740 [ 2638.321444] ? ksys_dup3+0x680/0x680 [ 2638.321472] block_ioctl+0xee/0x130 [ 2638.329482] ? blkdev_fallocate+0x400/0x400 [ 2638.329500] do_vfs_ioctl+0x1de/0x1790 [ 2638.329521] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2638.329540] ? ioctl_preallocate+0x300/0x300 [ 2638.339467] ? __fget_light+0x2e9/0x430 [ 2638.339485] ? fget_raw+0x20/0x20 [ 2638.339505] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2638.339525] ? kmem_cache_free+0x24f/0x290 [ 2638.348936] ? putname+0xf7/0x130 [ 2638.348956] ? do_syscall_64+0x9a/0x820 [ 2638.348978] ? do_syscall_64+0x9a/0x820 [ 2638.363708] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2638.363730] ? security_file_ioctl+0x94/0xc0 [ 2638.363749] ksys_ioctl+0xa9/0xd0 [ 2638.369244] input: syz1 as /devices/virtual/input/input2825 [ 2638.371955] __x64_sys_ioctl+0x73/0xb0 [ 2638.371974] do_syscall_64+0x1b9/0x820 [ 2638.371992] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2638.372010] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2638.372023] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2638.372040] ? trace_hardirqs_on_caller+0x310/0x310 [ 2638.372059] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2638.394393] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2638.394417] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2638.394441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2638.402107] RIP: 0033:0x4573d7 00:44:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000100)={0x3ff, {{0xa, 0x4e21, 0x0, @mcast1, 0xfd3}}, {{0xa, 0x4e24, 0x6, @mcast2, 0xa7a5}}}, 0x108) 00:44:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0xa00], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2638.402126] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2638.402135] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2638.402149] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 2638.402158] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2638.402167] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2638.402176] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 00:44:38 executing program 0 (fault-call:2 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2638.402184] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 00:44:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000040)=0x6, 0x4) [ 2638.571725] input: failed to attach handler leds to device input2825, error: -6 00:44:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100c2eb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2638.656521] FAULT_INJECTION: forcing a failure. [ 2638.656521] name failslab, interval 1, probability 0, space 0, times 0 [ 2638.708596] CPU: 0 PID: 5249 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2638.716768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2638.726128] Call Trace: [ 2638.726156] dump_stack+0x244/0x39d [ 2638.726191] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2638.732398] should_fail.cold.4+0xa/0x17 [ 2638.741629] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2638.746742] ? pick_next_task_fair+0xa35/0x1c90 [ 2638.751423] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2638.756454] ? zap_class+0x640/0x640 [ 2638.756473] ? print_usage_bug+0xc0/0xc0 [ 2638.756495] ? find_held_lock+0x36/0x1c0 [ 2638.768317] ? __lock_is_held+0xb5/0x140 [ 2638.772411] ? reweight_entity+0x10f0/0x10f0 [ 2638.776842] ? perf_trace_sched_process_exec+0x860/0x860 [ 2638.782313] __should_failslab+0x124/0x180 [ 2638.782335] should_failslab+0x9/0x14 [ 2638.782351] kmem_cache_alloc+0x2be/0x730 [ 2638.782374] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2638.782393] __kernfs_new_node+0x127/0x8d0 [ 2638.794563] ? trace_hardirqs_off_caller+0x300/0x300 [ 2638.794580] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2638.794606] ? _raw_spin_unlock_irq+0x60/0x80 [ 2638.794624] ? __schedule+0x168b/0x21d0 [ 2638.794639] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2638.794657] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2638.803891] ? zap_class+0x640/0x640 [ 2638.803910] ? zap_class+0x640/0x640 [ 2638.803929] ? enqueue_task_fair+0x24d/0xa50 [ 2638.809033] input: syz1 as /devices/virtual/input/input2826 [ 2638.813788] ? find_held_lock+0x36/0x1c0 [ 2638.813825] kernfs_new_node+0x95/0x120 [ 2638.813848] kernfs_create_dir_ns+0x4d/0x160 [ 2638.813872] internal_create_group+0x5fc/0xd80 [ 2638.822336] ? remove_files.isra.1+0x190/0x190 [ 2638.822351] ? up_write+0x7b/0x220 [ 2638.822368] ? down_write_nested+0x130/0x130 [ 2638.822383] ? down_read+0x120/0x120 [ 2638.822413] sysfs_create_group+0x1f/0x30 [ 2638.841285] input: failed to attach handler leds to device input2826, error: -6 [ 2638.844429] lo_ioctl+0x1307/0x1d60 [ 2638.844455] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2638.844471] blkdev_ioctl+0x98e/0x21b0 [ 2638.844489] ? blkpg_ioctl+0xc10/0xc10 [ 2638.858209] ? lock_downgrade+0x900/0x900 [ 2638.858226] ? check_preemption_disabled+0x48/0x280 [ 2638.858246] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2638.858267] ? kasan_check_read+0x11/0x20 [ 2638.871806] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2638.871833] ? rcu_softirq_qs+0x20/0x20 [ 2638.871862] ? __fget+0x4d1/0x740 [ 2638.871883] ? ksys_dup3+0x680/0x680 [ 2638.879832] block_ioctl+0xee/0x130 [ 2638.879851] ? blkdev_fallocate+0x400/0x400 [ 2638.879869] do_vfs_ioctl+0x1de/0x1790 [ 2638.906513] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2638.906534] ? ioctl_preallocate+0x300/0x300 [ 2638.906554] ? __fget_light+0x2e9/0x430 [ 2638.914578] ? fget_raw+0x20/0x20 [ 2638.928646] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2638.945115] ? kmem_cache_free+0x24f/0x290 [ 2638.945132] ? putname+0xf7/0x130 [ 2638.945152] ? do_syscall_64+0x9a/0x820 [ 2638.945171] ? do_syscall_64+0x9a/0x820 [ 2638.956987] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2638.957009] ? security_file_ioctl+0x94/0xc0 [ 2638.957028] ksys_ioctl+0xa9/0xd0 [ 2639.007340] __x64_sys_ioctl+0x73/0xb0 [ 2639.011245] do_syscall_64+0x1b9/0x820 [ 2639.015143] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2639.020518] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2639.025455] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2639.030310] ? trace_hardirqs_on_caller+0x310/0x310 [ 2639.035336] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2639.040366] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2639.045407] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2639.050267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2639.055461] RIP: 0033:0x4573d7 [ 2639.058665] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2639.077567] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2639.085282] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 2639.092556] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2639.099834] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2639.107112] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2639.114387] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 2639.125812] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,,errors=continue 00:44:39 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x5002, 0x0) 00:44:39 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="726569736572667386", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x2, 0xa800) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, &(0x7f0000000100)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) 00:44:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0x900], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100001f00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:39 executing program 0 (fault-call:2 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2639.253552] input: syz1 as /devices/virtual/input/input2828 [ 2639.282163] input: failed to attach handler leds to device input2828, error: -6 [ 2639.284290] FAULT_INJECTION: forcing a failure. [ 2639.284290] name failslab, interval 1, probability 0, space 0, times 0 00:44:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f0000000100)=""/255) [ 2639.307743] CPU: 0 PID: 5276 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2639.315914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2639.315922] Call Trace: [ 2639.315946] dump_stack+0x244/0x39d [ 2639.315970] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2639.327893] ? radix_tree_tag_set+0x3d0/0x3d0 [ 2639.327920] should_fail.cold.4+0xa/0x17 [ 2639.327940] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2639.327963] ? kernfs_activate+0x8e/0x2c0 [ 2639.336770] ? zap_class+0x640/0x640 [ 2639.336787] ? lock_release+0xa10/0xa10 [ 2639.336802] ? perf_trace_sched_process_exec+0x860/0x860 [ 2639.336834] ? find_held_lock+0x36/0x1c0 [ 2639.345373] ? __lock_is_held+0xb5/0x140 [ 2639.345406] ? perf_trace_sched_process_exec+0x860/0x860 [ 2639.345423] ? find_held_lock+0x36/0x1c0 [ 2639.345448] __should_failslab+0x124/0x180 [ 2639.354679] should_failslab+0x9/0x14 [ 2639.354697] kmem_cache_alloc+0x2be/0x730 [ 2639.354712] ? find_held_lock+0x36/0x1c0 [ 2639.354733] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2639.362405] __kernfs_new_node+0x127/0x8d0 [ 2639.362428] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2639.362445] ? kasan_check_write+0x14/0x20 [ 2639.362467] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 2639.376012] ? __kernfs_new_node+0x697/0x8d0 [ 2639.376033] ? wait_for_completion+0x8a0/0x8a0 [ 2639.376052] ? zap_class+0x640/0x640 [ 2639.376072] ? kasan_check_write+0x14/0x20 [ 2639.393578] ? __lock_is_held+0xb5/0x140 [ 2639.393594] ? wait_for_completion+0x8a0/0x8a0 [ 2639.393625] ? mutex_unlock+0xd/0x10 [ 2639.393640] ? kernfs_activate+0x21a/0x2c0 [ 2639.393660] kernfs_new_node+0x95/0x120 [ 2639.401863] __kernfs_create_file+0x5a/0x340 [ 2639.401887] sysfs_add_file_mode_ns+0x222/0x530 [ 2639.401914] internal_create_group+0x3df/0xd80 [ 2639.401943] ? remove_files.isra.1+0x190/0x190 [ 2639.401957] ? up_write+0x7b/0x220 [ 2639.401979] ? down_write_nested+0x130/0x130 [ 2639.409318] input: syz1 as /devices/virtual/input/input2829 [ 2639.411208] ? down_read+0x120/0x120 [ 2639.411241] sysfs_create_group+0x1f/0x30 [ 2639.411260] lo_ioctl+0x1307/0x1d60 [ 2639.411284] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2639.411299] blkdev_ioctl+0x98e/0x21b0 [ 2639.411315] ? blkpg_ioctl+0xc10/0xc10 [ 2639.411330] ? lock_downgrade+0x900/0x900 [ 2639.411349] ? check_preemption_disabled+0x48/0x280 [ 2639.526787] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2639.531737] ? kasan_check_read+0x11/0x20 [ 2639.535894] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2639.541182] ? rcu_softirq_qs+0x20/0x20 [ 2639.545176] ? __fget+0x4d1/0x740 [ 2639.548651] ? ksys_dup3+0x680/0x680 [ 2639.552391] block_ioctl+0xee/0x130 [ 2639.556031] ? blkdev_fallocate+0x400/0x400 [ 2639.560362] do_vfs_ioctl+0x1de/0x1790 [ 2639.564294] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2639.569852] ? ioctl_preallocate+0x300/0x300 [ 2639.574275] ? __fget_light+0x2e9/0x430 [ 2639.578259] ? fget_raw+0x20/0x20 [ 2639.581725] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2639.586753] ? kmem_cache_free+0x24f/0x290 [ 2639.591008] ? putname+0xf7/0x130 [ 2639.594474] ? do_syscall_64+0x9a/0x820 [ 2639.598463] ? do_syscall_64+0x9a/0x820 [ 2639.602450] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2639.607046] ? security_file_ioctl+0x94/0xc0 [ 2639.611468] ksys_ioctl+0xa9/0xd0 [ 2639.614932] __x64_sys_ioctl+0x73/0xb0 [ 2639.618843] do_syscall_64+0x1b9/0x820 [ 2639.622741] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2639.628120] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2639.633061] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2639.637921] ? trace_hardirqs_on_caller+0x310/0x310 [ 2639.642947] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2639.647974] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2639.653007] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2639.657878] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2639.663076] RIP: 0033:0x4573d7 [ 2639.666288] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2639.685195] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2639.692912] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 2639.700184] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 00:44:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2639.707457] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2639.714733] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2639.722005] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 2639.742846] input: failed to attach handler leds to device input2829, error: -6 00:44:39 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673f8", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2639.756974] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,,errors=continue 00:44:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0xffffffffffffffff], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00t\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:39 executing program 0 (fault-call:2 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2639.908586] input: syz1 as /devices/virtual/input/input2830 [ 2639.915428] input: failed to attach handler leds to device input2830, error: -6 [ 2639.946665] FAULT_INJECTION: forcing a failure. [ 2639.946665] name failslab, interval 1, probability 0, space 0, times 0 [ 2639.958112] CPU: 1 PID: 5304 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2639.966262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2639.966270] Call Trace: [ 2639.966299] dump_stack+0x244/0x39d [ 2639.966327] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2639.987051] should_fail.cold.4+0xa/0x17 [ 2639.991122] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2639.991144] ? lock_release+0xa10/0xa10 [ 2639.991159] ? perf_trace_sched_process_exec+0x860/0x860 [ 2639.991184] ? zap_class+0x640/0x640 [ 2639.991210] ? find_held_lock+0x36/0x1c0 [ 2639.991230] ? __lock_is_held+0xb5/0x140 [ 2640.005748] ? perf_trace_sched_process_exec+0x860/0x860 [ 2640.005765] ? kernfs_activate+0x21a/0x2c0 [ 2640.005792] __should_failslab+0x124/0x180 [ 2640.017609] should_failslab+0x9/0x14 [ 2640.017628] kmem_cache_alloc+0x2be/0x730 [ 2640.017645] ? lock_downgrade+0x900/0x900 [ 2640.017666] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2640.035355] __kernfs_new_node+0x127/0x8d0 [ 2640.035378] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2640.035395] ? zap_class+0x640/0x640 [ 2640.035421] ? __lock_is_held+0xb5/0x140 [ 2640.043702] ? wait_for_completion+0x8a0/0x8a0 [ 2640.057682] ? mutex_unlock+0xd/0x10 [ 2640.057699] ? kernfs_activate+0x21a/0x2c0 [ 2640.057718] ? kernfs_walk_and_get_ns+0x340/0x340 [ 2640.057740] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2640.070061] ? kernfs_link_sibling+0x1d2/0x3b0 [ 2640.070086] kernfs_new_node+0x95/0x120 [ 2640.070108] __kernfs_create_file+0x5a/0x340 [ 2640.070131] sysfs_add_file_mode_ns+0x222/0x530 [ 2640.070157] internal_create_group+0x3df/0xd80 [ 2640.082921] ? remove_files.isra.1+0x190/0x190 [ 2640.082940] ? up_write+0x7b/0x220 [ 2640.097005] ? down_write_nested+0x130/0x130 [ 2640.097022] ? down_read+0x120/0x120 [ 2640.097053] sysfs_create_group+0x1f/0x30 [ 2640.097072] lo_ioctl+0x1307/0x1d60 [ 2640.097095] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2640.110724] blkdev_ioctl+0x98e/0x21b0 [ 2640.110743] ? blkpg_ioctl+0xc10/0xc10 [ 2640.110759] ? lock_downgrade+0x900/0x900 [ 2640.110774] ? check_preemption_disabled+0x48/0x280 [ 2640.110794] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2640.110810] ? kasan_check_read+0x11/0x20 [ 2640.110840] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2640.160478] ? rcu_softirq_qs+0x20/0x20 [ 2640.160507] ? __fget+0x4d1/0x740 [ 2640.160530] ? ksys_dup3+0x680/0x680 [ 2640.160559] block_ioctl+0xee/0x130 [ 2640.169960] ? blkdev_fallocate+0x400/0x400 [ 2640.169978] do_vfs_ioctl+0x1de/0x1790 [ 2640.169999] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2640.170018] ? ioctl_preallocate+0x300/0x300 [ 2640.170036] ? __fget_light+0x2e9/0x430 [ 2640.206851] ? fget_raw+0x20/0x20 [ 2640.210319] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2640.215346] ? kmem_cache_free+0x24f/0x290 [ 2640.219603] ? putname+0xf7/0x130 [ 2640.223069] ? do_syscall_64+0x9a/0x820 [ 2640.227054] ? do_syscall_64+0x9a/0x820 [ 2640.231042] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2640.235640] ? security_file_ioctl+0x94/0xc0 [ 2640.240066] ksys_ioctl+0xa9/0xd0 [ 2640.243539] __x64_sys_ioctl+0x73/0xb0 [ 2640.247438] do_syscall_64+0x1b9/0x820 [ 2640.251336] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2640.256711] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2640.261646] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2640.266502] ? trace_hardirqs_on_caller+0x310/0x310 [ 2640.271527] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2640.276554] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2640.281597] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2640.286460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2640.291660] RIP: 0033:0x4573d7 [ 2640.294861] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2640.313764] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2640.321476] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 2640.328749] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2640.336020] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2640.343291] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2640.350569] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 00:44:40 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x3f00, 0x0) 00:44:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) restart_syscall() ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = dup(r0) getsockopt$inet6_dccp_int(r2, 0x21, 0x10, &(0x7f0000000100), &(0x7f0000000140)=0x4) unshare(0x800) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000000280)) r3 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x207, 0x2000) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000080)=0x3, 0x4) 00:44:40 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100882000"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2640.366851] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,,errors=continue 00:44:40 executing program 0 (fault-call:2 fault-nth:13): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0xae0d000000000000], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000080)=0x6) r3 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) [ 2640.469697] input: syz1 as /devices/virtual/input/input2832 [ 2640.479932] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2640.500943] input: failed to attach handler leds to device input2832, error: -6 00:44:40 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00`\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2640.572439] FAULT_INJECTION: forcing a failure. [ 2640.572439] name failslab, interval 1, probability 0, space 0, times 0 [ 2640.640872] CPU: 0 PID: 5334 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2640.649049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2640.649058] Call Trace: [ 2640.649087] dump_stack+0x244/0x39d [ 2640.649135] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2640.661066] should_fail.cold.4+0xa/0x17 [ 2640.661095] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2640.661117] ? lock_release+0xa10/0xa10 [ 2640.661131] ? perf_trace_sched_process_exec+0x860/0x860 00:44:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f0000000080)=[{0x800, 0xffff, 0x7, 0x2}, {0x0, 0x0, 0x1, 0xffff}]}, 0x10) r3 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f0000000140)={0x3, [0x0, 0x0, 0x0]}) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) [ 2640.661156] ? zap_class+0x640/0x640 [ 2640.661183] ? find_held_lock+0x36/0x1c0 [ 2640.680576] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2640.683079] ? __lock_is_held+0xb5/0x140 [ 2640.683120] ? perf_trace_sched_process_exec+0x860/0x860 [ 2640.683136] ? kernfs_activate+0x21a/0x2c0 [ 2640.683164] __should_failslab+0x124/0x180 [ 2640.683184] should_failslab+0x9/0x14 [ 2640.683200] kmem_cache_alloc+0x2be/0x730 [ 2640.683215] ? lock_downgrade+0x900/0x900 [ 2640.683233] ? __sanitizer_cov_trace_cmp8+0x18/0x20 00:44:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x202000, 0x30) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x200, 0x0) bind$xdp(r1, &(0x7f00000003c0)={0x2c, 0x1, r2, 0x28, r3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r5, 0x8008ae9d, &(0x7f0000000280)) [ 2640.683252] __kernfs_new_node+0x127/0x8d0 [ 2640.683271] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2640.749830] ? zap_class+0x640/0x640 [ 2640.753574] ? __lock_is_held+0xb5/0x140 [ 2640.757648] ? wait_for_completion+0x8a0/0x8a0 [ 2640.757680] ? mutex_unlock+0xd/0x10 [ 2640.757697] ? kernfs_activate+0x21a/0x2c0 [ 2640.757717] ? kernfs_walk_and_get_ns+0x340/0x340 [ 2640.757737] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2640.757752] ? kernfs_link_sibling+0x1d2/0x3b0 [ 2640.757774] kernfs_new_node+0x95/0x120 [ 2640.775128] __kernfs_create_file+0x5a/0x340 [ 2640.775152] sysfs_add_file_mode_ns+0x222/0x530 [ 2640.775180] internal_create_group+0x3df/0xd80 [ 2640.775209] ? remove_files.isra.1+0x190/0x190 [ 2640.775227] ? up_write+0x7b/0x220 [ 2640.775246] ? down_write_nested+0x130/0x130 [ 2640.798367] ? down_read+0x120/0x120 [ 2640.798403] sysfs_create_group+0x1f/0x30 [ 2640.798422] lo_ioctl+0x1307/0x1d60 [ 2640.798448] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2640.798465] blkdev_ioctl+0x98e/0x21b0 [ 2640.798481] ? blkpg_ioctl+0xc10/0xc10 00:44:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000140)=0xc) creat(&(0x7f0000000040)='./file0\x00', 0x8) socketpair(0x3, 0xf, 0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xffffffffffffff7f) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) [ 2640.798502] ? lock_downgrade+0x900/0x900 [ 2640.815591] ? check_preemption_disabled+0x48/0x280 [ 2640.815611] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2640.815629] ? kasan_check_read+0x11/0x20 [ 2640.815645] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2640.815661] ? rcu_softirq_qs+0x20/0x20 [ 2640.815689] ? __fget+0x4d1/0x740 [ 2640.815712] ? ksys_dup3+0x680/0x680 [ 2640.815742] block_ioctl+0xee/0x130 [ 2640.877051] ? blkdev_fallocate+0x400/0x400 [ 2640.881395] do_vfs_ioctl+0x1de/0x1790 [ 2640.881418] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2640.881438] ? ioctl_preallocate+0x300/0x300 [ 2640.881455] ? __fget_light+0x2e9/0x430 [ 2640.881472] ? fget_raw+0x20/0x20 [ 2640.881489] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2640.881506] ? kmem_cache_free+0x24f/0x290 [ 2640.881522] ? putname+0xf7/0x130 [ 2640.881540] ? do_syscall_64+0x9a/0x820 [ 2640.881554] ? do_syscall_64+0x9a/0x820 [ 2640.881572] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2640.881594] ? security_file_ioctl+0x94/0xc0 [ 2640.891024] ksys_ioctl+0xa9/0xd0 [ 2640.891046] __x64_sys_ioctl+0x73/0xb0 [ 2640.891066] do_syscall_64+0x1b9/0x820 [ 2640.891084] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2640.891111] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2640.891124] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2640.891143] ? trace_hardirqs_on_caller+0x310/0x310 [ 2640.891160] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2640.891178] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2640.891198] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2640.979839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2640.985034] RIP: 0033:0x4573d7 [ 2640.988237] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2641.007142] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2641.014864] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 2641.022139] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2641.029412] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2641.029426] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2641.043959] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 2641.053657] input: syz1 as /devices/virtual/input/input2835 [ 2641.059638] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,,errors=continue [ 2641.070001] input: failed to attach handler leds to device input2835, error: -6 00:44:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0x900000000000000], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f0000000080)=0x8001) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:41 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:41 executing program 0 (fault-call:2 fault-nth:14): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebaf00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:41 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0xcc00, 0x0) [ 2641.305529] FAULT_INJECTION: forcing a failure. [ 2641.305529] name failslab, interval 1, probability 0, space 0, times 0 [ 2641.322476] input: syz1 as /devices/virtual/input/input2836 [ 2641.328224] input: failed to attach handler leds to device input2836, error: -6 [ 2641.340924] CPU: 0 PID: 5367 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2641.349087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2641.358452] Call Trace: [ 2641.358479] dump_stack+0x244/0x39d [ 2641.358507] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2641.361228] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2641.364715] should_fail.cold.4+0xa/0x17 [ 2641.364739] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2641.379184] ? lock_release+0xa10/0xa10 [ 2641.379200] ? perf_trace_sched_process_exec+0x860/0x860 [ 2641.379223] ? zap_class+0x640/0x640 [ 2641.388378] ? find_held_lock+0x36/0x1c0 [ 2641.388402] ? __lock_is_held+0xb5/0x140 [ 2641.388431] ? perf_trace_sched_process_exec+0x860/0x860 [ 2641.405594] ? kernfs_activate+0x21a/0x2c0 [ 2641.405623] __should_failslab+0x124/0x180 [ 2641.405644] should_failslab+0x9/0x14 [ 2641.423585] kmem_cache_alloc+0x2be/0x730 [ 2641.423604] ? lock_downgrade+0x900/0x900 [ 2641.423624] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2641.423648] __kernfs_new_node+0x127/0x8d0 [ 2641.431590] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2641.431608] ? zap_class+0x640/0x640 [ 2641.431634] ? __lock_is_held+0xb5/0x140 [ 2641.431652] ? wait_for_completion+0x8a0/0x8a0 [ 2641.431685] ? mutex_unlock+0xd/0x10 [ 2641.453615] ? kernfs_activate+0x21a/0x2c0 [ 2641.462240] ? kernfs_walk_and_get_ns+0x340/0x340 [ 2641.462259] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2641.462274] ? kernfs_link_sibling+0x1d2/0x3b0 [ 2641.462298] kernfs_new_node+0x95/0x120 [ 2641.462320] __kernfs_create_file+0x5a/0x340 [ 2641.493566] sysfs_add_file_mode_ns+0x222/0x530 [ 2641.498263] internal_create_group+0x3df/0xd80 [ 2641.502870] ? remove_files.isra.1+0x190/0x190 [ 2641.507460] ? up_write+0x7b/0x220 [ 2641.511008] ? down_write_nested+0x130/0x130 [ 2641.515427] ? down_read+0x120/0x120 [ 2641.519169] sysfs_create_group+0x1f/0x30 [ 2641.523332] lo_ioctl+0x1307/0x1d60 [ 2641.526977] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2641.530871] blkdev_ioctl+0x98e/0x21b0 [ 2641.534775] ? blkpg_ioctl+0xc10/0xc10 [ 2641.538676] ? lock_downgrade+0x900/0x900 [ 2641.542843] ? check_preemption_disabled+0x48/0x280 [ 2641.547876] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2641.552814] ? kasan_check_read+0x11/0x20 [ 2641.556982] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2641.562267] ? rcu_softirq_qs+0x20/0x20 [ 2641.566262] ? __fget+0x4d1/0x740 [ 2641.569729] ? ksys_dup3+0x680/0x680 [ 2641.573468] block_ioctl+0xee/0x130 [ 2641.577112] ? blkdev_fallocate+0x400/0x400 [ 2641.581444] do_vfs_ioctl+0x1de/0x1790 [ 2641.585346] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2641.590903] ? ioctl_preallocate+0x300/0x300 [ 2641.595320] ? __fget_light+0x2e9/0x430 [ 2641.599314] ? fget_raw+0x20/0x20 [ 2641.602779] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2641.607837] ? kmem_cache_free+0x24f/0x290 [ 2641.612086] ? putname+0xf7/0x130 [ 2641.615559] ? do_syscall_64+0x9a/0x820 [ 2641.619542] ? do_syscall_64+0x9a/0x820 [ 2641.623527] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2641.628130] ? security_file_ioctl+0x94/0xc0 [ 2641.632550] ksys_ioctl+0xa9/0xd0 [ 2641.636016] __x64_sys_ioctl+0x73/0xb0 [ 2641.639916] do_syscall_64+0x1b9/0x820 [ 2641.643826] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2641.649204] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2641.654149] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2641.659002] ? trace_hardirqs_on_caller+0x310/0x310 [ 2641.664032] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2641.669061] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2641.674106] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2641.678967] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2641.684164] RIP: 0033:0x4573d7 [ 2641.687368] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2641.706277] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2641.713996] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 2641.721273] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2641.728546] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2641.735831] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2641.743114] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 00:44:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f0000000040)={0x77359400}, 0x10) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) 00:44:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebdd00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2641.755921] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,,errors=continue 00:44:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) statx(r2, &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f0000000100)) 00:44:41 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0x68000000], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:42 executing program 0 (fault-call:2 fault-nth:15): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2641.867043] input: syz1 as /devices/virtual/input/input2838 [ 2641.879194] input: failed to attach handler leds to device input2838, error: -6 [ 2641.910239] input: syz1 as /devices/virtual/input/input2839 [ 2641.929360] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(r1, r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) [ 2641.962306] input: failed to attach handler leds to device input2839, error: -6 00:44:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfsj', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2642.005758] FAULT_INJECTION: forcing a failure. [ 2642.005758] name failslab, interval 1, probability 0, space 0, times 0 [ 2642.054002] CPU: 1 PID: 5410 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2642.062175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2642.062183] Call Trace: [ 2642.062211] dump_stack+0x244/0x39d [ 2642.062239] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2642.062272] should_fail.cold.4+0xa/0x17 [ 2642.062294] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2642.062317] ? lock_release+0xa10/0xa10 [ 2642.062336] ? perf_trace_sched_process_exec+0x860/0x860 [ 2642.062362] ? zap_class+0x640/0x640 [ 2642.062391] ? find_held_lock+0x36/0x1c0 [ 2642.092268] ? __lock_is_held+0xb5/0x140 [ 2642.092300] ? perf_trace_sched_process_exec+0x860/0x860 [ 2642.092315] ? kernfs_activate+0x21a/0x2c0 [ 2642.092342] __should_failslab+0x124/0x180 [ 2642.092363] should_failslab+0x9/0x14 [ 2642.113579] kmem_cache_alloc+0x2be/0x730 [ 2642.113605] ? lock_downgrade+0x900/0x900 [ 2642.113625] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2642.113645] __kernfs_new_node+0x127/0x8d0 [ 2642.113671] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2642.127571] ? zap_class+0x640/0x640 [ 2642.127606] ? __lock_is_held+0xb5/0x140 [ 2642.127624] ? wait_for_completion+0x8a0/0x8a0 [ 2642.127655] ? mutex_unlock+0xd/0x10 [ 2642.135603] ? kernfs_activate+0x21a/0x2c0 [ 2642.144747] ? kernfs_walk_and_get_ns+0x340/0x340 [ 2642.144768] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2642.144784] ? kernfs_link_sibling+0x1d2/0x3b0 [ 2642.144806] kernfs_new_node+0x95/0x120 [ 2642.144838] __kernfs_create_file+0x5a/0x340 [ 2642.153828] sysfs_add_file_mode_ns+0x222/0x530 [ 2642.153857] internal_create_group+0x3df/0xd80 [ 2642.153885] ? remove_files.isra.1+0x190/0x190 [ 2642.153906] ? up_write+0x7b/0x220 [ 2642.161666] ? down_write_nested+0x130/0x130 [ 2642.173303] input: syz1 as /devices/virtual/input/input2840 [ 2642.174167] ? down_read+0x120/0x120 [ 2642.174197] sysfs_create_group+0x1f/0x30 [ 2642.185449] input: failed to attach handler leds to device input2840, error: -6 [ 2642.189145] lo_ioctl+0x1307/0x1d60 [ 2642.189171] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2642.189187] blkdev_ioctl+0x98e/0x21b0 [ 2642.189203] ? blkpg_ioctl+0xc10/0xc10 [ 2642.189223] ? lock_downgrade+0x900/0x900 [ 2642.206850] ? check_preemption_disabled+0x48/0x280 [ 2642.206870] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2642.206887] ? kasan_check_read+0x11/0x20 [ 2642.206902] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2642.206918] ? rcu_softirq_qs+0x20/0x20 [ 2642.206944] ? __fget+0x4d1/0x740 [ 2642.286720] ? ksys_dup3+0x680/0x680 [ 2642.290458] block_ioctl+0xee/0x130 [ 2642.294094] ? blkdev_fallocate+0x400/0x400 [ 2642.298432] do_vfs_ioctl+0x1de/0x1790 [ 2642.302334] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2642.307888] ? ioctl_preallocate+0x300/0x300 [ 2642.312305] ? __fget_light+0x2e9/0x430 [ 2642.316290] ? fget_raw+0x20/0x20 [ 2642.319769] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2642.324802] ? kmem_cache_free+0x24f/0x290 [ 2642.329058] ? putname+0xf7/0x130 [ 2642.332521] ? do_syscall_64+0x9a/0x820 [ 2642.336509] ? do_syscall_64+0x9a/0x820 [ 2642.340497] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2642.345093] ? security_file_ioctl+0x94/0xc0 [ 2642.349516] ksys_ioctl+0xa9/0xd0 [ 2642.352984] __x64_sys_ioctl+0x73/0xb0 [ 2642.356891] do_syscall_64+0x1b9/0x820 [ 2642.360812] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2642.366203] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2642.371144] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2642.376003] ? trace_hardirqs_on_caller+0x310/0x310 [ 2642.381049] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2642.386079] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2642.391110] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2642.395970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2642.401165] RIP: 0033:0x4573d7 [ 2642.404371] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2642.423491] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2642.431206] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 2642.438483] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2642.445759] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 00:44:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebc500"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2642.453033] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2642.460310] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 00:44:42 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x4, 0x0) 00:44:42 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0xedc0], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x200, 0xc0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000240)) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x301000, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000540)={0x4, &(0x7f00000002c0)=[{}, {}, {}, {}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) unshare(0x400) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r4) ioctl$KVM_GET_EMULATED_CPUID(r4, 0x8008ae9d, &(0x7f0000000280)) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@mcast1, @in6, 0x4e21, 0xffffffff, 0x4e21, 0x0, 0x0, 0xa0, 0x0, 0x88, r5, r6}, {0x7f, 0x8, 0x2, 0x1000, 0x8, 0x84, 0x6, 0x8}, {0x81, 0x0, 0x2, 0x8}, 0xfff, 0x6e6bbf, 0x0, 0x0, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x1d}, 0x4d5, 0x3f}, 0x2, @in=@broadcast, 0x3507, 0x1, 0x3, 0x3f80000000000, 0x2dc6, 0x9e, 0x4}}, 0xe8) open_by_handle_at(r2, &(0x7f00000006c0)=ANY=[@ANYBLOB="dc000000030000004e1c7d100a8964cb8d7fdfd80b09b336190a2c61518db9d1d725290e50538c47c418a801629b0d853ec835bca37d28efec33ec76b1372509b487c3b58b920b7c1b8e8fb422754383efe2d08cc5cfb755f629631327c46852085f2822181421d0e674e6ea633770f7d70262523b8cc051e828399e52fcf11211565550b6b655a52913cf018df88c590f9528b01bb692007cd24590e3a2eacbb9e77d5f36eeed58000400009b39fe0b5ca64bbf3b4515f30f5f27ea137164c3092b63df2604365c3f0f4fd2e0599ff063fe3102939b6bebec1d18300a37ce791db11d6b7d77d599bdb00ef61000686191e99f0f77f86111435f55994a60c4b3d7aad3a7c3765263c7c887109c335bc4b7aeb1e9737e389d041a699749d63a1f889f17feed5020abde95eb8e6ccb3eac34c0cbd4a812f4"], 0x4000) 00:44:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00z\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2642.512472] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,,errors=continue 00:44:42 executing program 0 (fault-call:2 fault-nth:16): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2642.627301] input: syz1 as /devices/virtual/input/input2841 [ 2642.643991] input: failed to attach handler leds to device input2841, error: -6 [ 2642.664037] input: syz1 as /devices/virtual/input/input2842 00:44:42 executing program 4: socketpair$unix(0x1, 0x1000000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) unshare(0x400) r3 = semget$private(0x0, 0x1, 0x1d9) semctl$GETPID(r3, 0x1, 0xb, &(0x7f0000000040)=""/74) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x6, 0x4, [0x8, 0x4, 0x8, 0xfff]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000180)={r4, 0x1f, 0x20, 0x1}, &(0x7f00000001c0)=0x10) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2642.680056] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2642.696237] FAULT_INJECTION: forcing a failure. [ 2642.696237] name failslab, interval 1, probability 0, space 0, times 0 [ 2642.708057] CPU: 1 PID: 5447 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2642.716211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2642.716218] Call Trace: [ 2642.716246] dump_stack+0x244/0x39d [ 2642.716273] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2642.716304] should_fail.cold.4+0xa/0x17 [ 2642.741088] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2642.741109] ? lock_release+0xa10/0xa10 [ 2642.741125] ? perf_trace_sched_process_exec+0x860/0x860 [ 2642.741150] ? zap_class+0x640/0x640 [ 2642.741177] ? find_held_lock+0x36/0x1c0 [ 2642.741198] ? __lock_is_held+0xb5/0x140 [ 2642.741291] ? xfs_iflush_cluster+0xf78/0x1020 [ 2642.750297] ? perf_trace_sched_process_exec+0x860/0x860 [ 2642.762904] input: failed to attach handler leds to device input2842, error: -6 [ 2642.763477] ? kernfs_activate+0x21a/0x2c0 [ 2642.763504] __should_failslab+0x124/0x180 [ 2642.777565] should_failslab+0x9/0x14 [ 2642.777583] kmem_cache_alloc+0x2be/0x730 [ 2642.777608] ? lock_downgrade+0x900/0x900 [ 2642.777629] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2642.777647] __kernfs_new_node+0x127/0x8d0 [ 2642.801457] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2642.801475] ? zap_class+0x640/0x640 [ 2642.801503] ? __lock_is_held+0xb5/0x140 [ 2642.801520] ? wait_for_completion+0x8a0/0x8a0 [ 2642.801554] ? mutex_unlock+0xd/0x10 [ 2642.810697] ? kernfs_activate+0x21a/0x2c0 [ 2642.810717] ? kernfs_walk_and_get_ns+0x340/0x340 [ 2642.810737] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2642.810752] ? kernfs_link_sibling+0x1d2/0x3b0 [ 2642.810775] kernfs_new_node+0x95/0x120 [ 2642.810801] __kernfs_create_file+0x5a/0x340 [ 2642.819804] sysfs_add_file_mode_ns+0x222/0x530 [ 2642.819843] internal_create_group+0x3df/0xd80 [ 2642.819871] ? remove_files.isra.1+0x190/0x190 [ 2642.819889] ? up_write+0x7b/0x220 [ 2642.835939] ? down_write_nested+0x130/0x130 [ 2642.835956] ? down_read+0x120/0x120 [ 2642.835988] sysfs_create_group+0x1f/0x30 [ 2642.836007] lo_ioctl+0x1307/0x1d60 [ 2642.836030] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2642.845083] blkdev_ioctl+0x98e/0x21b0 [ 2642.845100] ? blkpg_ioctl+0xc10/0xc10 [ 2642.845116] ? lock_downgrade+0x900/0x900 [ 2642.845132] ? check_preemption_disabled+0x48/0x280 [ 2642.845152] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2642.845173] ? kasan_check_read+0x11/0x20 [ 2642.926689] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2642.931980] ? rcu_softirq_qs+0x20/0x20 [ 2642.935978] ? __fget+0x4d1/0x740 [ 2642.939449] ? ksys_dup3+0x680/0x680 [ 2642.943184] block_ioctl+0xee/0x130 [ 2642.946835] ? blkdev_fallocate+0x400/0x400 [ 2642.951168] do_vfs_ioctl+0x1de/0x1790 [ 2642.955071] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2642.960627] ? ioctl_preallocate+0x300/0x300 [ 2642.965045] ? __fget_light+0x2e9/0x430 [ 2642.969030] ? fget_raw+0x20/0x20 [ 2642.972494] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2642.977527] ? kmem_cache_free+0x24f/0x290 [ 2642.981778] ? putname+0xf7/0x130 [ 2642.985240] ? do_syscall_64+0x9a/0x820 [ 2642.989227] ? do_syscall_64+0x9a/0x820 [ 2642.993213] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2642.997810] ? security_file_ioctl+0x94/0xc0 [ 2643.002244] ksys_ioctl+0xa9/0xd0 [ 2643.005710] __x64_sys_ioctl+0x73/0xb0 [ 2643.009616] do_syscall_64+0x1b9/0x820 [ 2643.013515] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2643.018895] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2643.023843] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2643.028701] ? trace_hardirqs_on_caller+0x310/0x310 [ 2643.033735] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2643.038761] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2643.043794] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2643.048663] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2643.053860] RIP: 0033:0x4573d7 [ 2643.057066] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2643.075996] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2643.083709] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 2643.090984] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2643.098282] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2643.105557] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2643.112842] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 00:44:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0xae0d0000], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:43 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000000007f00"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = memfd_create(&(0x7f0000000040)='/dev/kvm\x00', 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x80b) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2643.141480] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,,errors=continue 00:44:43 executing program 0 (fault-call:2 fault-nth:17): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2643.262331] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2643.279157] input: syz1 as /devices/virtual/input/input2843 [ 2643.294794] input: failed to attach handler leds to device input2843, error: -6 [ 2643.321633] input: syz1 as /devices/virtual/input/input2844 [ 2643.351765] FAULT_INJECTION: forcing a failure. [ 2643.351765] name failslab, interval 1, probability 0, space 0, times 0 [ 2643.363110] CPU: 0 PID: 5475 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2643.371261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2643.380617] Call Trace: [ 2643.383220] dump_stack+0x244/0x39d [ 2643.386867] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2643.392067] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2643.397097] ? find_next_bit+0x104/0x130 [ 2643.401173] should_fail.cold.4+0xa/0x17 [ 2643.405249] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2643.410357] ? print_usage_bug+0xc0/0xc0 [ 2643.414426] ? print_usage_bug+0xc0/0xc0 [ 2643.418489] ? __lock_acquire+0x62f/0x4c20 [ 2643.422735] ? __lock_acquire+0x62f/0x4c20 [ 2643.426972] ? print_usage_bug+0xc0/0xc0 [ 2643.431061] ? mark_held_locks+0x130/0x130 [ 2643.435307] ? zap_class+0x640/0x640 [ 2643.439026] ? mark_held_locks+0x130/0x130 [ 2643.443278] ? print_usage_bug+0xc0/0xc0 [ 2643.447369] __should_failslab+0x124/0x180 [ 2643.451615] should_failslab+0x9/0x14 [ 2643.455420] kmem_cache_alloc+0x47/0x730 [ 2643.459496] radix_tree_node_alloc.constprop.19+0x1f7/0x370 [ 2643.465218] idr_get_free+0x7a4/0xf70 [ 2643.469043] ? radix_tree_iter_tag_clear+0x90/0x90 [ 2643.473977] ? __save_stack_trace+0x8d/0xf0 [ 2643.478319] ? save_stack+0xa9/0xd0 [ 2643.481950] ? save_stack+0x43/0xd0 [ 2643.485584] ? kasan_kmalloc+0xc7/0xe0 [ 2643.489472] ? kasan_slab_alloc+0x12/0x20 [ 2643.493627] ? kmem_cache_alloc+0x12e/0x730 [ 2643.497951] ? __kernfs_new_node+0x127/0x8d0 [ 2643.502362] ? __kernfs_create_file+0x5a/0x340 [ 2643.506946] ? sysfs_add_file_mode_ns+0x222/0x530 [ 2643.511811] ? internal_create_group+0x3df/0xd80 [ 2643.516580] ? sysfs_create_group+0x1f/0x30 [ 2643.520906] ? lo_ioctl+0x1307/0x1d60 [ 2643.524707] ? blkdev_ioctl+0x98e/0x21b0 [ 2643.528773] ? block_ioctl+0xee/0x130 [ 2643.532578] ? do_vfs_ioctl+0x1de/0x1790 [ 2643.536639] ? ksys_ioctl+0xa9/0xd0 [ 2643.540271] ? __x64_sys_ioctl+0x73/0xb0 [ 2643.544338] ? do_syscall_64+0x1b9/0x820 [ 2643.548411] ? find_held_lock+0x36/0x1c0 [ 2643.552495] idr_alloc_u32+0x1d4/0x3a0 [ 2643.556481] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 2643.561497] ? lock_acquire+0x1ed/0x520 [ 2643.565477] ? __kernfs_new_node+0x14e/0x8d0 [ 2643.569890] ? __lock_is_held+0xb5/0x140 [ 2643.573959] idr_alloc_cyclic+0x166/0x350 [ 2643.578120] ? idr_alloc+0x1b0/0x1b0 [ 2643.581847] ? __radix_tree_preload+0x1f7/0x280 [ 2643.586528] __kernfs_new_node+0x1ee/0x8d0 [ 2643.590774] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2643.595536] ? kasan_check_write+0x14/0x20 [ 2643.599776] ? wake_up_q+0xb3/0x100 [ 2643.603419] ? __lock_is_held+0xb5/0x140 [ 2643.607484] ? wait_for_completion+0x8a0/0x8a0 [ 2643.612083] ? mutex_unlock+0xd/0x10 [ 2643.615804] ? kernfs_activate+0x21a/0x2c0 [ 2643.620053] ? kernfs_walk_and_get_ns+0x340/0x340 [ 2643.624901] ? kernfs_link_sibling+0x1d2/0x3b0 [ 2643.629494] kernfs_new_node+0x95/0x120 [ 2643.633597] __kernfs_create_file+0x5a/0x340 [ 2643.638019] sysfs_add_file_mode_ns+0x222/0x530 [ 2643.642705] internal_create_group+0x3df/0xd80 [ 2643.647302] ? remove_files.isra.1+0x190/0x190 [ 2643.651887] ? up_write+0x7b/0x220 [ 2643.655432] ? down_write_nested+0x130/0x130 [ 2643.659851] ? down_read+0x120/0x120 [ 2643.663589] sysfs_create_group+0x1f/0x30 [ 2643.667745] lo_ioctl+0x1307/0x1d60 [ 2643.671388] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2643.675279] blkdev_ioctl+0x98e/0x21b0 [ 2643.679172] ? blkpg_ioctl+0xc10/0xc10 [ 2643.683065] ? lock_downgrade+0x900/0x900 [ 2643.687220] ? check_preemption_disabled+0x48/0x280 [ 2643.692245] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2643.697184] ? kasan_check_read+0x11/0x20 [ 2643.701336] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2643.706616] ? rcu_softirq_qs+0x20/0x20 [ 2643.710602] ? __fget+0x4d1/0x740 [ 2643.714067] ? ksys_dup3+0x680/0x680 [ 2643.717804] block_ioctl+0xee/0x130 [ 2643.721443] ? blkdev_fallocate+0x400/0x400 [ 2643.725769] do_vfs_ioctl+0x1de/0x1790 [ 2643.729666] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2643.735216] ? ioctl_preallocate+0x300/0x300 [ 2643.739627] ? __fget_light+0x2e9/0x430 [ 2643.743607] ? fget_raw+0x20/0x20 [ 2643.747071] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2643.752972] ? kmem_cache_free+0x24f/0x290 [ 2643.757216] ? putname+0xf7/0x130 [ 2643.760679] ? do_syscall_64+0x9a/0x820 [ 2643.764663] ? do_syscall_64+0x9a/0x820 [ 2643.768648] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2643.773239] ? security_file_ioctl+0x94/0xc0 [ 2643.777676] ksys_ioctl+0xa9/0xd0 [ 2643.781142] __x64_sys_ioctl+0x73/0xb0 [ 2643.785040] do_syscall_64+0x1b9/0x820 [ 2643.788938] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2643.794309] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2643.799239] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2643.804094] ? trace_hardirqs_on_caller+0x310/0x310 [ 2643.809121] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2643.814144] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2643.819173] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2643.824029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2643.829219] RIP: 0033:0x4573d7 [ 2643.832419] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2643.851323] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2643.859040] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 2643.866309] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 00:44:44 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0xcc, 0x0) 00:44:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = dup(r1) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0xf37, 0x4) r3 = fcntl$dupfd(r1, 0x0, r1) unshare(0x2000d) ioctl$KVM_GET_EMULATED_CPUID(r3, 0x8008ae9d, &(0x7f0000000280)) [ 2643.873578] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2643.880849] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2643.888140] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 2643.924482] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,,errors=continue [ 2643.944646] input: failed to attach handler leds to device input2844, error: -6 00:44:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0xfcfdffff], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000040)={0x6, 0x3, 0x7fffffff, 0x10000, 0x10001, 0x8, 0x6, 0x7fff, 0x2, 0x0, 0x7, 0x6000000000000}) unshare(0x400) ioctl$KVM_GET_EMULATED_CPUID(r2, 0x8008ae9d, &(0x7f0000000280)) [ 2643.985136] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebc900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:44 executing program 4: pwrite64(0xffffffffffffffff, &(0x7f0000000140)="1263c4cea33ca52ae48ce0e288d231d5ac86e7f879140a445efc70e39f21545572945b396b8e97a814a4b1fd9436b27e924dc8e5307a67988b0ce39a90569332dea29637b78ce1d7ae139886e2968525851ca84acb177c3186fd04324139cc85cd3066e940795c279ae9768eb4", 0x6d, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 00:44:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:44 executing program 0 (fault-call:2 fault-nth:18): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2644.098449] input: syz1 as /devices/virtual/input/input2845 [ 2644.113198] input: failed to attach handler leds to device input2845, error: -6 00:44:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0x5000000], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:44 executing program 4: pwrite64(0xffffffffffffffff, &(0x7f0000000140)="1263c4cea33ca52ae48ce0e288d231d5ac86e7f879140a445efc70e39f21545572945b396b8e97a814a4b1fd9436b27e924dc8e5307a67988b0ce39a90569332dea29637b78ce1d7ae139886e2968525851ca84acb177c3186fd04324139cc85cd3066e940795c279ae9768eb4", 0x6d, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 2644.191808] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00\x00\x00\x00z\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2644.307567] FAULT_INJECTION: forcing a failure. [ 2644.307567] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2644.319457] CPU: 1 PID: 5516 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2644.327608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2644.336963] Call Trace: [ 2644.339567] dump_stack+0x244/0x39d [ 2644.343217] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2644.348417] ? up+0xea/0x1c0 [ 2644.351460] should_fail.cold.4+0xa/0x17 [ 2644.355536] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2644.360653] ? mark_held_locks+0xc7/0x130 [ 2644.364806] ? lock_downgrade+0x900/0x900 [ 2644.368985] ? mark_held_locks+0x130/0x130 [ 2644.373226] ? vprintk_emit+0x391/0x990 [ 2644.377209] ? trace_hardirqs_off_caller+0x300/0x300 [ 2644.382329] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2644.387347] ? console_unlock+0x8d3/0x1190 [ 2644.391608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2644.397151] ? should_fail+0x22d/0xd01 [ 2644.401054] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2644.406607] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2644.411919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2644.417465] ? wake_up_klogd+0x11a/0x180 [ 2644.421539] __alloc_pages_nodemask+0x34b/0xdd0 [ 2644.426212] ? __down_trylock_console_sem+0x151/0x1f0 [ 2644.431414] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 2644.436434] ? vprintk_emit+0x293/0x990 [ 2644.440423] ? find_held_lock+0x36/0x1c0 [ 2644.444519] ? trace_hardirqs_off+0xb8/0x310 [ 2644.448941] cache_grow_begin+0xa5/0x8c0 [ 2644.453010] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2644.458556] ? check_preemption_disabled+0x48/0x280 [ 2644.463607] kmem_cache_alloc_trace+0x684/0x750 [ 2644.468297] kobject_uevent_env+0x2f3/0x101e [ 2644.472733] kobject_uevent+0x1f/0x24 [ 2644.476546] lo_ioctl+0x1385/0x1d60 [ 2644.480210] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2644.484106] blkdev_ioctl+0x98e/0x21b0 [ 2644.488001] ? blkpg_ioctl+0xc10/0xc10 [ 2644.491897] ? lock_downgrade+0x900/0x900 [ 2644.496051] ? check_preemption_disabled+0x48/0x280 [ 2644.501079] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2644.506016] ? kasan_check_read+0x11/0x20 [ 2644.510169] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2644.515452] ? rcu_softirq_qs+0x20/0x20 [ 2644.519450] ? __fget+0x4d1/0x740 [ 2644.522930] ? ksys_dup3+0x680/0x680 [ 2644.526666] block_ioctl+0xee/0x130 [ 2644.530301] ? blkdev_fallocate+0x400/0x400 [ 2644.534650] do_vfs_ioctl+0x1de/0x1790 [ 2644.538549] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2644.544633] ? ioctl_preallocate+0x300/0x300 [ 2644.549051] ? __fget_light+0x2e9/0x430 [ 2644.553034] ? fget_raw+0x20/0x20 [ 2644.556500] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2644.561542] ? kmem_cache_free+0x24f/0x290 [ 2644.565784] ? putname+0xf7/0x130 [ 2644.569259] ? do_syscall_64+0x9a/0x820 [ 2644.573240] ? do_syscall_64+0x9a/0x820 [ 2644.577227] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2644.581832] ? security_file_ioctl+0x94/0xc0 [ 2644.586255] ksys_ioctl+0xa9/0xd0 [ 2644.589725] __x64_sys_ioctl+0x73/0xb0 [ 2644.593633] do_syscall_64+0x1b9/0x820 [ 2644.597528] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2644.602902] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2644.607846] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2644.612702] ? trace_hardirqs_on_caller+0x310/0x310 [ 2644.617729] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2644.622755] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2644.627784] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2644.632650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2644.637849] RIP: 0033:0x4573d7 [ 2644.641052] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2644.659955] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2644.667667] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 2644.674939] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2644.682211] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2644.689484] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2644.696760] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 00:44:44 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0xcb03000000000000, 0x0) 00:44:44 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000340)=[{0x18, 0x0, 0x7, "89"}], 0x18}}], 0x1, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) 00:44:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0x4c], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2644.727386] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,,errors=continue [ 2644.746993] input: syz1 as /devices/virtual/input/input2847 [ 2644.758602] input: failed to attach handler leds to device input2847, error: -6 [ 2644.813104] input: syz1 as /devices/virtual/input/input2848 [ 2644.842283] input: failed to attach handler leds to device input2848, error: -6 00:44:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xed26}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x0, 0x104) ioctl$RTC_WIE_OFF(r0, 0x7010) mount(&(0x7f0000000340), &(0x7f000000aff8)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x0, &(0x7f000001c000)) ioctl$KDENABIO(r0, 0x4b36) chdir(&(0x7f0000000180)='./file0\x00') r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) readlinkat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/102, 0x66) write$eventfd(r1, &(0x7f0000000080), 0xfffffe5e) clock_gettime(0x0, &(0x7f0000000280)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) munmap(&(0x7f0000443000/0x400000)=nil, 0x400000) setrlimit(0x0, &(0x7f00000002c0)={0x3ff, 0x7}) 00:44:44 executing program 0 (fault-call:2 fault-nth:19): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2644.858465] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000000000600"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:45 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2644.988310] FAULT_INJECTION: forcing a failure. [ 2644.988310] name failslab, interval 1, probability 0, space 0, times 0 [ 2645.014329] CPU: 1 PID: 5548 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2645.022495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2645.031855] Call Trace: [ 2645.034470] dump_stack+0x244/0x39d [ 2645.038128] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2645.043345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2645.048905] should_fail.cold.4+0xa/0x17 [ 2645.052984] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2645.058098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2645.063644] ? wake_up_klogd+0x11a/0x180 [ 2645.067713] ? console_device+0xc0/0xc0 [ 2645.071700] ? __down_trylock_console_sem+0x151/0x1f0 [ 2645.076908] ? zap_class+0x640/0x640 [ 2645.080660] ? vprintk_emit+0x293/0x990 [ 2645.084662] ? find_held_lock+0x36/0x1c0 [ 2645.088741] ? __lock_is_held+0xb5/0x140 [ 2645.092835] ? perf_trace_sched_process_exec+0x860/0x860 [ 2645.098307] ? vprintk_default+0x28/0x30 [ 2645.102384] __should_failslab+0x124/0x180 [ 2645.106633] should_failslab+0x9/0x14 [ 2645.110448] kmem_cache_alloc_trace+0x2d7/0x750 [ 2645.115144] kobject_uevent_env+0x2f3/0x101e [ 2645.119577] kobject_uevent+0x1f/0x24 [ 2645.123396] lo_ioctl+0x1385/0x1d60 [ 2645.127044] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2645.130948] blkdev_ioctl+0x98e/0x21b0 [ 2645.134862] ? blkpg_ioctl+0xc10/0xc10 [ 2645.138765] ? lock_downgrade+0x900/0x900 [ 2645.142925] ? check_preemption_disabled+0x48/0x280 [ 2645.147957] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2645.152901] ? kasan_check_read+0x11/0x20 [ 2645.157064] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2645.162349] ? rcu_softirq_qs+0x20/0x20 [ 2645.166351] ? __fget+0x4d1/0x740 [ 2645.169835] ? ksys_dup3+0x680/0x680 [ 2645.173573] block_ioctl+0xee/0x130 [ 2645.177220] ? blkdev_fallocate+0x400/0x400 [ 2645.181557] do_vfs_ioctl+0x1de/0x1790 [ 2645.185464] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2645.191025] ? ioctl_preallocate+0x300/0x300 [ 2645.195447] ? __fget_light+0x2e9/0x430 [ 2645.199430] ? fget_raw+0x20/0x20 [ 2645.202900] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2645.207933] ? kmem_cache_free+0x24f/0x290 [ 2645.212179] ? putname+0xf7/0x130 [ 2645.215644] ? do_syscall_64+0x9a/0x820 [ 2645.219633] ? do_syscall_64+0x9a/0x820 [ 2645.223623] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2645.228221] ? security_file_ioctl+0x94/0xc0 [ 2645.232647] ksys_ioctl+0xa9/0xd0 [ 2645.236115] __x64_sys_ioctl+0x73/0xb0 [ 2645.240023] do_syscall_64+0x1b9/0x820 [ 2645.243945] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2645.249325] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2645.254262] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2645.259120] ? trace_hardirqs_on_caller+0x310/0x310 [ 2645.264148] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2645.269179] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2645.274209] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2645.279075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2645.284272] RIP: 0033:0x4573d7 [ 2645.287474] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2645.306384] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2645.314098] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 2645.321370] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2645.328644] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 00:44:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0xfdfdffff00000000], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2645.335921] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2645.343196] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 2645.361068] input: syz1 as /devices/virtual/input/input2850 [ 2645.366840] input: failed to attach handler leds to device input2850, error: -6 00:44:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xed26}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x0, 0x104) ioctl$RTC_WIE_OFF(r0, 0x7010) mount(&(0x7f0000000340), &(0x7f000000aff8)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x0, &(0x7f000001c000)) ioctl$KDENABIO(r0, 0x4b36) chdir(&(0x7f0000000180)='./file0\x00') r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) readlinkat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/102, 0x66) write$eventfd(r1, &(0x7f0000000080), 0xfffffe5e) clock_gettime(0x0, &(0x7f0000000280)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) munmap(&(0x7f0000443000/0x400000)=nil, 0x400000) setrlimit(0x0, &(0x7f00000002c0)={0x3ff, 0x7}) [ 2645.384214] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,,errors=continue [ 2645.398620] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:45 executing program 0 (fault-call:2 fault-nth:20): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000500"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:45 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0xc000000, 0x0) 00:44:45 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2645.553487] input: syz1 as /devices/virtual/input/input2851 [ 2645.561114] FAULT_INJECTION: forcing a failure. [ 2645.561114] name failslab, interval 1, probability 0, space 0, times 0 [ 2645.587479] input: failed to attach handler leds to device input2851, error: -6 [ 2645.591210] CPU: 1 PID: 5579 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2645.603094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2645.612453] Call Trace: [ 2645.615054] dump_stack+0x244/0x39d [ 2645.618698] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2645.618727] should_fail.cold.4+0xa/0x17 [ 2645.618747] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2645.618770] ? __save_stack_trace+0x8d/0xf0 [ 2645.637426] ? zap_class+0x640/0x640 [ 2645.641152] ? save_stack+0xa9/0xd0 [ 2645.644798] ? save_stack+0x43/0xd0 [ 2645.648447] ? find_held_lock+0x36/0x1c0 [ 2645.648469] ? __lock_is_held+0xb5/0x140 [ 2645.648498] ? zap_class+0x640/0x640 [ 2645.648515] ? perf_trace_sched_process_exec+0x860/0x860 [ 2645.648535] ? check_preemption_disabled+0x48/0x280 [ 2645.670814] __should_failslab+0x124/0x180 [ 2645.670846] should_failslab+0x9/0x14 [ 2645.670864] kmem_cache_alloc_node_trace+0x270/0x740 [ 2645.670893] __kmalloc_node_track_caller+0x3c/0x70 [ 2645.670918] __kmalloc_reserve.isra.40+0x41/0xe0 [ 2645.684068] __alloc_skb+0x150/0x770 [ 2645.693754] ? netdev_alloc_frag+0x1f0/0x1f0 [ 2645.693772] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2645.693789] ? kasan_check_read+0x11/0x20 [ 2645.693814] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2645.716292] ? rcu_softirq_qs+0x20/0x20 [ 2645.720298] ? netlink_has_listeners+0x2cb/0x4a0 [ 2645.725068] ? netlink_tap_init_net+0x3d0/0x3d0 [ 2645.729758] alloc_uevent_skb+0x84/0x1da [ 2645.733847] kobject_uevent_env+0xa52/0x101e [ 2645.738278] kobject_uevent+0x1f/0x24 [ 2645.742090] lo_ioctl+0x1385/0x1d60 [ 2645.745741] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2645.749640] blkdev_ioctl+0x98e/0x21b0 00:44:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0x20000000], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xed26}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x0, 0x104) ioctl$RTC_WIE_OFF(r0, 0x7010) mount(&(0x7f0000000340), &(0x7f000000aff8)='./file0\x00', &(0x7f00000003c0)='devtmpfs\x00', 0x0, &(0x7f000001c000)) ioctl$KDENABIO(r0, 0x4b36) chdir(&(0x7f0000000180)='./file0\x00') r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) readlinkat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/102, 0x66) write$eventfd(r1, &(0x7f0000000080), 0xfffffe5e) clock_gettime(0x0, &(0x7f0000000280)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) munmap(&(0x7f0000443000/0x400000)=nil, 0x400000) setrlimit(0x0, &(0x7f00000002c0)={0x3ff, 0x7}) [ 2645.749658] ? blkpg_ioctl+0xc10/0xc10 [ 2645.749675] ? lock_downgrade+0x900/0x900 [ 2645.749691] ? check_preemption_disabled+0x48/0x280 [ 2645.749711] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2645.749728] ? kasan_check_read+0x11/0x20 [ 2645.749743] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2645.749758] ? rcu_softirq_qs+0x20/0x20 [ 2645.749783] ? __fget+0x4d1/0x740 [ 2645.757550] ? ksys_dup3+0x680/0x680 [ 2645.757581] block_ioctl+0xee/0x130 [ 2645.757605] ? blkdev_fallocate+0x400/0x400 [ 2645.757623] do_vfs_ioctl+0x1de/0x1790 [ 2645.757643] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2645.757662] ? ioctl_preallocate+0x300/0x300 [ 2645.771753] ? __fget_light+0x2e9/0x430 [ 2645.771769] ? fget_raw+0x20/0x20 [ 2645.771788] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2645.771805] ? kmem_cache_free+0x24f/0x290 [ 2645.771832] ? putname+0xf7/0x130 [ 2645.781278] ? do_syscall_64+0x9a/0x820 [ 2645.781295] ? do_syscall_64+0x9a/0x820 [ 2645.781314] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2645.781336] ? security_file_ioctl+0x94/0xc0 [ 2645.781355] ksys_ioctl+0xa9/0xd0 [ 2645.781375] __x64_sys_ioctl+0x73/0xb0 [ 2645.781394] do_syscall_64+0x1b9/0x820 [ 2645.781415] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2645.867636] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2645.872568] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2645.877404] ? trace_hardirqs_on_caller+0x310/0x310 [ 2645.882408] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2645.887414] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2645.892439] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2645.897293] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2645.902488] RIP: 0033:0x4573d7 [ 2645.905694] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2645.924626] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2645.932323] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 2645.939586] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2645.946874] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2645.954152] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2645.961420] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 2645.977729] input: syz1 as /devices/virtual/input/input2852 [ 2645.980814] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,,errors=continue [ 2646.001526] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:46 executing program 0 (fault-call:2 fault-nth:21): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0xf6ffffff00000000], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2646.061250] input: failed to attach handler leds to device input2852, error: -6 00:44:46 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100000000000009ebc100"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) poll(&(0x7f0000000080)=[{r0, 0x440}], 0x1, 0x0) 00:44:46 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0xfeffffff, 0x0) [ 2646.251430] input: syz1 as /devices/virtual/input/input2853 [ 2646.264128] FAULT_INJECTION: forcing a failure. [ 2646.264128] name failslab, interval 1, probability 0, space 0, times 0 [ 2646.280916] input: failed to attach handler leds to device input2853, error: -6 [ 2646.292920] CPU: 0 PID: 5610 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2646.301080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2646.310442] Call Trace: [ 2646.313052] dump_stack+0x244/0x39d [ 2646.316711] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2646.321932] should_fail.cold.4+0xa/0x17 [ 2646.326013] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2646.331132] ? __save_stack_trace+0x8d/0xf0 [ 2646.335474] ? zap_class+0x640/0x640 [ 2646.339204] ? save_stack+0xa9/0xd0 [ 2646.342849] ? save_stack+0x43/0xd0 [ 2646.346489] ? find_held_lock+0x36/0x1c0 [ 2646.350571] ? __lock_is_held+0xb5/0x140 [ 2646.354654] ? zap_class+0x640/0x640 [ 2646.358380] ? perf_trace_sched_process_exec+0x860/0x860 [ 2646.363856] ? check_preemption_disabled+0x48/0x280 [ 2646.368889] __should_failslab+0x124/0x180 [ 2646.373138] should_failslab+0x9/0x14 [ 2646.376958] kmem_cache_alloc_node_trace+0x270/0x740 [ 2646.382087] __kmalloc_node_track_caller+0x3c/0x70 [ 2646.387041] __kmalloc_reserve.isra.40+0x41/0xe0 [ 2646.391815] __alloc_skb+0x150/0x770 [ 2646.395561] ? netdev_alloc_frag+0x1f0/0x1f0 [ 2646.399984] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2646.404921] ? kasan_check_read+0x11/0x20 [ 2646.409078] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2646.414586] ? rcu_softirq_qs+0x20/0x20 [ 2646.418612] ? netlink_has_listeners+0x2cb/0x4a0 [ 2646.423414] ? netlink_tap_init_net+0x3d0/0x3d0 [ 2646.428108] alloc_uevent_skb+0x84/0x1da [ 2646.432190] kobject_uevent_env+0xa52/0x101e [ 2646.436619] kobject_uevent+0x1f/0x24 [ 2646.440433] lo_ioctl+0x1385/0x1d60 [ 2646.444081] ? lo_rw_aio+0x1ef0/0x1ef0 [ 2646.447993] blkdev_ioctl+0x98e/0x21b0 [ 2646.451897] ? blkpg_ioctl+0xc10/0xc10 [ 2646.455797] ? lock_downgrade+0x900/0x900 [ 2646.459962] ? check_preemption_disabled+0x48/0x280 [ 2646.464996] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2646.469939] ? kasan_check_read+0x11/0x20 [ 2646.474103] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2646.479397] ? rcu_softirq_qs+0x20/0x20 [ 2646.483395] ? __fget+0x4d1/0x740 [ 2646.486870] ? ksys_dup3+0x680/0x680 [ 2646.490610] block_ioctl+0xee/0x130 [ 2646.494253] ? blkdev_fallocate+0x400/0x400 [ 2646.498587] do_vfs_ioctl+0x1de/0x1790 [ 2646.502490] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2646.508040] ? ioctl_preallocate+0x300/0x300 [ 2646.512460] ? __fget_light+0x2e9/0x430 [ 2646.516447] ? fget_raw+0x20/0x20 [ 2646.519915] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2646.524947] ? kmem_cache_free+0x24f/0x290 [ 2646.529198] ? putname+0xf7/0x130 [ 2646.532664] ? do_syscall_64+0x9a/0x820 [ 2646.536645] ? do_syscall_64+0x9a/0x820 [ 2646.540636] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2646.545632] ? security_file_ioctl+0x94/0xc0 [ 2646.550056] ksys_ioctl+0xa9/0xd0 [ 2646.553531] __x64_sys_ioctl+0x73/0xb0 [ 2646.557431] do_syscall_64+0x1b9/0x820 [ 2646.561336] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2646.566799] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2646.571749] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2646.576608] ? trace_hardirqs_on_caller+0x310/0x310 [ 2646.581640] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2646.586671] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2646.591964] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2646.596839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2646.602045] RIP: 0033:0x4573d7 [ 2646.605250] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2646.624162] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2646.631881] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004573d7 [ 2646.631891] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2646.631901] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2646.631910] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2646.631920] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 2646.650557] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,,errors=continue [ 2646.689866] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" 00:44:46 executing program 0 (fault-call:2 fault-nth:22): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0x2010], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:46 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000340)=[{0x10, 0x0, 0x7, "89"}], 0x10}}], 0x1, 0x0) connect$inet6(r0, &(0x7f00000000c0), 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) [ 2646.759561] input: syz1 as /devices/virtual/input/input2854 [ 2646.803914] input: failed to attach handler leds to device input2854, error: -6 [ 2646.836509] FAULT_INJECTION: forcing a failure. [ 2646.836509] name failslab, interval 1, probability 0, space 0, times 0 [ 2646.859027] CPU: 1 PID: 5628 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2646.867193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2646.876549] Call Trace: [ 2646.876577] dump_stack+0x244/0x39d [ 2646.876613] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2646.876633] ? lo_ioctl+0xe6/0x1d60 [ 2646.876661] should_fail.cold.4+0xa/0x17 [ 2646.876685] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2646.891691] ? blkpg_ioctl+0xc10/0xc10 [ 2646.891710] ? lock_downgrade+0x900/0x900 00:44:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffff7ffffffffffe}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000021ff8)={0xffffffffffffffff}) pipe(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) writev(r4, &(0x7f000000b000)=[{&(0x7f0000c01f96)="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", 0x1001}], 0x1) close(r4) dup2(r2, r3) [ 2646.891726] ? check_preemption_disabled+0x48/0x280 [ 2646.891746] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2646.891763] ? kasan_check_read+0x11/0x20 [ 2646.891779] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2646.891807] ? find_held_lock+0x36/0x1c0 [ 2646.900996] ? perf_trace_sched_process_exec+0x860/0x860 [ 2646.901014] ? block_ioctl+0xee/0x130 [ 2646.901036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2646.901062] __should_failslab+0x124/0x180 [ 2646.901083] should_failslab+0x9/0x14 [ 2646.901098] kmem_cache_alloc+0x2be/0x730 [ 2646.901120] ? fget_raw+0x20/0x20 [ 2646.914161] getname_flags+0xd0/0x590 [ 2646.914184] do_mkdirat+0xc5/0x310 [ 2646.914205] ? __ia32_sys_mknod+0xb0/0xb0 [ 2646.914222] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2646.914244] ? trace_hardirqs_off_caller+0x300/0x300 [ 2646.928571] ? ksys_ioctl+0x81/0xd0 [ 2646.928599] __x64_sys_mkdir+0x5c/0x80 [ 2646.928620] do_syscall_64+0x1b9/0x820 [ 2646.928636] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2646.928656] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2647.006641] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2647.006664] ? trace_hardirqs_on_caller+0x310/0x310 [ 2647.006683] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2647.006702] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2647.006725] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2647.006751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2647.006768] RIP: 0033:0x456987 [ 2647.039848] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:44:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffff7ffffffffffe}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000021ff8)={0xffffffffffffffff}) pipe(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) writev(r4, &(0x7f000000b000)=[{&(0x7f0000c01f96)="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", 0x1001}], 0x1) close(r4) dup2(r2, r3) [ 2647.058768] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2647.066487] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000456987 [ 2647.073792] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 2647.081077] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2647.088352] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2647.095630] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 2647.104316] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2647.114714] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,,errors=continue 00:44:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebb300"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:47 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:47 executing program 0 (fault-call:2 fault-nth:23): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0xdae], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffff7ffffffffffe}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000021ff8)={0xffffffffffffffff}) pipe(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) writev(r4, &(0x7f000000b000)=[{&(0x7f0000c01f96)="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", 0x1001}], 0x1) close(r4) dup2(r2, r3) [ 2647.281844] input: syz1 as /devices/virtual/input/input2855 [ 2647.290042] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2647.305614] FAULT_INJECTION: forcing a failure. [ 2647.305614] name failslab, interval 1, probability 0, space 0, times 0 [ 2647.323301] input: failed to attach handler leds to device input2855, error: -6 [ 2647.330118] CPU: 0 PID: 5658 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2647.338917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2647.338929] Call Trace: [ 2647.350874] dump_stack+0x244/0x39d [ 2647.354521] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2647.359717] ? lo_ioctl+0xe6/0x1d60 [ 2647.363365] should_fail.cold.4+0xa/0x17 [ 2647.367440] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2647.372550] ? blkpg_ioctl+0xc10/0xc10 [ 2647.372568] ? lock_downgrade+0x900/0x900 [ 2647.372584] ? check_preemption_disabled+0x48/0x280 [ 2647.372602] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2647.372618] ? kasan_check_read+0x11/0x20 [ 2647.372633] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2647.372657] ? find_held_lock+0x36/0x1c0 [ 2647.372692] ? perf_trace_sched_process_exec+0x860/0x860 [ 2647.385718] ? block_ioctl+0xee/0x130 [ 2647.385741] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2647.385765] __should_failslab+0x124/0x180 [ 2647.404157] should_failslab+0x9/0x14 [ 2647.404175] kmem_cache_alloc+0x2be/0x730 [ 2647.404192] ? fget_raw+0x20/0x20 [ 2647.413429] getname_flags+0xd0/0x590 [ 2647.413450] do_mkdirat+0xc5/0x310 [ 2647.413470] ? __ia32_sys_mknod+0xb0/0xb0 [ 2647.413487] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2647.413505] ? trace_hardirqs_off_caller+0x300/0x300 [ 2647.413520] ? ksys_ioctl+0x81/0xd0 [ 2647.413538] __x64_sys_mkdir+0x5c/0x80 [ 2647.446167] do_syscall_64+0x1b9/0x820 [ 2647.468001] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2647.473383] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2647.473401] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2647.473421] ? trace_hardirqs_on_caller+0x310/0x310 [ 2647.473438] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2647.473459] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2647.488231] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2647.488258] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2647.488275] RIP: 0033:0x456987 [ 2647.508312] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2647.508322] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2647.508338] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000456987 [ 2647.508347] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 2647.508362] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2647.530456] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2647.530467] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 2647.561132] input: syz1 as /devices/virtual/input/input2856 00:44:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffff7ffffffffffe}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000021ff8)={0xffffffffffffffff}) pipe(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) writev(r4, &(0x7f000000b000)=[{&(0x7f0000c01f96)="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", 0x1001}], 0x1) close(r4) dup2(r2, r3) 00:44:47 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0xd6000000, 0x0) [ 2647.589851] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,,errors=continue 00:44:47 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:47 executing program 0 (fault-call:2 fault-nth:24): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) [ 2647.630955] input: failed to attach handler leds to device input2856, error: -6 00:44:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000009ebb200"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2647.755677] FAULT_INJECTION: forcing a failure. [ 2647.755677] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2647.767521] CPU: 0 PID: 5681 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2647.767533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2647.767538] Call Trace: [ 2647.767566] dump_stack+0x244/0x39d [ 2647.767594] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2647.767635] should_fail.cold.4+0xa/0x17 [ 2647.785130] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2647.785148] ? kobject_uevent_env+0xf76/0x101e [ 2647.785167] ? wait_for_completion+0x8a0/0x8a0 [ 2647.785196] ? mark_held_locks+0x130/0x130 [ 2647.785215] ? kobject_uevent_env+0x100d/0x101e [ 2647.803661] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2647.805762] ? mutex_unlock+0xd/0x10 [ 2647.805781] ? lo_ioctl+0xe6/0x1d60 [ 2647.805808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2647.805838] ? should_fail+0x22d/0xd01 [ 2647.814998] ? blkdev_ioctl+0x1f5/0x21b0 00:44:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0x7400000000000000], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffff7ffffffffffe}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000021ff8)) pipe(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) writev(r2, &(0x7f000000b000)=[{&(0x7f0000c01f96)="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", 0x1001}], 0x1) close(r2) [ 2647.815017] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2647.815030] ? blkpg_ioctl+0xc10/0xc10 [ 2647.815053] ? lock_downgrade+0x900/0x900 [ 2647.823969] __alloc_pages_nodemask+0x34b/0xdd0 [ 2647.823988] ? kasan_check_read+0x11/0x20 [ 2647.824005] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2647.824024] ? __alloc_pages_slowpath+0x2e30/0x2e30 [ 2647.837001] ? find_held_lock+0x36/0x1c0 [ 2647.837045] ? trace_hardirqs_off+0xb8/0x310 [ 2647.837066] cache_grow_begin+0xa5/0x8c0 [ 2647.846209] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2647.846228] ? check_preemption_disabled+0x48/0x280 [ 2647.846250] kmem_cache_alloc+0x66b/0x730 [ 2647.846268] ? fget_raw+0x20/0x20 [ 2647.850652] input: syz1 as /devices/virtual/input/input2857 [ 2647.854201] getname_flags+0xd0/0x590 [ 2647.854221] do_mkdirat+0xc5/0x310 [ 2647.854242] ? __ia32_sys_mknod+0xb0/0xb0 [ 2647.854259] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2647.854278] ? trace_hardirqs_off_caller+0x300/0x300 [ 2647.854294] ? ksys_ioctl+0x81/0xd0 [ 2647.854313] __x64_sys_mkdir+0x5c/0x80 [ 2647.854334] do_syscall_64+0x1b9/0x820 [ 2647.861503] input: failed to attach handler leds to device input2857, error: -6 [ 2647.863314] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2647.863335] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2647.863351] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2647.863371] ? trace_hardirqs_on_caller+0x310/0x310 [ 2647.863388] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2647.863408] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2647.872214] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2647.872239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2647.872252] RIP: 0033:0x456987 [ 2647.872269] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2647.872278] RSP: 002b:00007fe310867a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2647.872294] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000456987 [ 2647.872304] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 2647.872313] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 00:44:48 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfsr', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2647.872321] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2647.872331] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 2648.075318] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000000,,errors=continue 00:44:48 executing program 0 (fault-call:2 fault-nth:25): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100bfeb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:48 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\n', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0xa00000000000000], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:48 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0xd400, 0x0) [ 2648.272135] input: syz1 as /devices/virtual/input/input2858 [ 2648.285554] input: failed to attach handler leds to device input2858, error: -6 [ 2648.294390] FAULT_INJECTION: forcing a failure. [ 2648.294390] name failslab, interval 1, probability 0, space 0, times 0 [ 2648.325919] CPU: 0 PID: 5735 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2648.334110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2648.343467] Call Trace: [ 2648.346071] dump_stack+0x244/0x39d [ 2648.349724] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2648.354932] ? __kernel_text_address+0xd/0x40 [ 2648.359440] ? unwind_get_return_address+0x61/0xa0 [ 2648.364386] should_fail.cold.4+0xa/0x17 [ 2648.368458] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2648.373586] ? save_stack+0x43/0xd0 [ 2648.377227] ? kasan_kmalloc+0xc7/0xe0 [ 2648.381129] ? __kmalloc_track_caller+0x157/0x760 [ 2648.385983] ? memdup_user+0x2c/0xa0 [ 2648.389709] ? do_syscall_64+0x1b9/0x820 [ 2648.393780] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2648.399153] ? zap_class+0x640/0x640 [ 2648.402877] ? zap_class+0x640/0x640 [ 2648.402899] ? find_held_lock+0x36/0x1c0 [ 2648.402933] ? perf_trace_sched_process_exec+0x860/0x860 [ 2648.416373] ? lock_release+0xa10/0xa10 [ 2648.420354] ? perf_trace_sched_process_exec+0x860/0x860 [ 2648.425837] __should_failslab+0x124/0x180 [ 2648.430089] should_failslab+0x9/0x14 [ 2648.433911] __kmalloc_track_caller+0x2d1/0x760 [ 2648.438594] ? strncpy_from_user+0x5a0/0x5a0 [ 2648.443014] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2648.448565] ? strndup_user+0x77/0xd0 [ 2648.452375] memdup_user+0x2c/0xa0 [ 2648.452394] strndup_user+0x77/0xd0 [ 2648.452414] ksys_mount+0x73/0x140 [ 2648.452433] __x64_sys_mount+0xbe/0x150 [ 2648.467112] do_syscall_64+0x1b9/0x820 [ 2648.471012] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2648.476381] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2648.476397] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2648.476419] ? trace_hardirqs_on_caller+0x310/0x310 [ 2648.491192] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2648.496219] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2648.496237] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2648.496258] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2648.511630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2648.516830] RIP: 0033:0x459fda [ 2648.516849] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2648.516863] RSP: 002b:00007fe310867a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2648.546960] RAX: ffffffffffffffda RBX: 00007fe310867b30 RCX: 0000000000459fda [ 2648.554240] RDX: 00007fe310867ad0 RSI: 00000000200001c0 RDI: 00007fe310867af0 [ 2648.561525] RBP: 00000000200001c0 R08: 00007fe310867b30 R09: 00007fe310867ad0 [ 2648.568802] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000000000004 [ 2648.568813] R13: 0000000000000020 R14: 00000000004d8258 R15: 0000000000000003 00:44:48 executing program 0 (fault-call:2 fault-nth:26): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100c1eb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:48 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0x700000000000000], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffff7ffffffffffe}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000021ff8)={0xffffffffffffffff}) pipe(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) writev(r4, &(0x7f000000b000)=[{&(0x7f0000c01f96)="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", 0x1001}], 0x1) dup2(r2, r3) [ 2648.743738] input: syz1 as /devices/virtual/input/input2860 [ 2648.761395] input: failed to attach handler leds to device input2860, error: -6 [ 2648.782001] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2648.793479] input: syz1 as /devices/virtual/input/input2861 00:44:49 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2648.842226] input: failed to attach handler leds to device input2861, error: -6 00:44:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffff7ffffffffffe}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000021ff8)={0xffffffffffffffff}) pipe(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) writev(r4, &(0x7f000000b000)=[{&(0x7f0000c01f96)="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", 0x1001}], 0x1) dup2(r2, r3) 00:44:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a31000000000000000400"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0x6000000], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2648.926164] FAULT_INJECTION: forcing a failure. [ 2648.926164] name failslab, interval 1, probability 0, space 0, times 0 00:44:49 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x3403, 0x0) [ 2649.009987] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2649.020041] CPU: 0 PID: 5776 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2649.028211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2649.028220] Call Trace: [ 2649.028248] dump_stack+0x244/0x39d [ 2649.028275] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2649.040214] ? print_usage_bug+0xc0/0xc0 [ 2649.040241] should_fail.cold.4+0xa/0x17 [ 2649.049050] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2649.049067] ? walk_component+0x3fe/0x2590 [ 2649.049083] ? zap_class+0x640/0x640 [ 2649.049115] ? zap_class+0x640/0x640 [ 2649.057222] ? mark_held_locks+0x130/0x130 [ 2649.057239] ? path_parentat.isra.41+0x20/0x160 [ 2649.057262] ? find_held_lock+0x36/0x1c0 [ 2649.057283] ? __lock_is_held+0xb5/0x140 [ 2649.057313] ? perf_trace_sched_process_exec+0x860/0x860 [ 2649.066635] __should_failslab+0x124/0x180 [ 2649.066656] should_failslab+0x9/0x14 [ 2649.066673] kmem_cache_alloc+0x2be/0x730 [ 2649.066705] __d_alloc+0xc8/0xb90 [ 2649.078351] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 2649.078376] ? d_alloc_parallel+0x1f40/0x1f40 [ 2649.078392] ? d_lookup+0x255/0x300 [ 2649.078408] ? d_lookup+0x255/0x300 [ 2649.078426] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2649.078446] ? lookup_dcache+0x22/0x140 [ 2649.085800] input: syz1 as /devices/virtual/input/input2862 [ 2649.087166] ? trace_hardirqs_off_caller+0x300/0x300 [ 2649.087195] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2649.087216] d_alloc+0x96/0x380 [ 2649.087232] ? __d_lookup+0x9e0/0x9e0 [ 2649.087250] ? __d_alloc+0xb90/0xb90 [ 2649.087277] __lookup_hash+0xd9/0x190 [ 2649.091658] input: failed to attach handler leds to device input2862, error: -6 [ 2649.096764] filename_create+0x1e5/0x5b0 [ 2649.096783] ? kern_path_mountpoint+0x40/0x40 [ 2649.096800] ? fget_raw+0x20/0x20 [ 2649.096832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2649.096847] ? getname_flags+0x26e/0x590 [ 2649.096866] do_mkdirat+0xda/0x310 [ 2649.096885] ? __ia32_sys_mknod+0xb0/0xb0 [ 2649.104902] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2649.104921] ? trace_hardirqs_off_caller+0x300/0x300 [ 2649.104937] ? ksys_ioctl+0x81/0xd0 [ 2649.104957] __x64_sys_mkdir+0x5c/0x80 [ 2649.104977] do_syscall_64+0x1b9/0x820 [ 2649.104993] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2649.105016] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2649.112603] ? trace_hardirqs_on_caller+0x310/0x310 [ 2649.112621] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2649.112657] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 2649.112672] ? __switch_to_asm+0x40/0x70 00:44:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffff7ffffffffffe}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000021ff8)={0xffffffffffffffff}) pipe(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f000000b000)=[{&(0x7f0000c01f96)="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", 0x1001}], 0x1) dup2(r2, r3) [ 2649.112686] ? __switch_to_asm+0x34/0x70 [ 2649.112727] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2649.112749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2649.112762] RIP: 0033:0x456987 [ 2649.112791] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2649.112806] RSP: 002b:00007fe310825a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2649.122327] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000456987 00:44:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffff7ffffffffffe}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000021ff8)={0xffffffffffffffff}) pipe(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f000000b000)=[{&(0x7f0000c01f96)="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", 0x1001}], 0x1) dup2(r2, r3) [ 2649.122337] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 2649.122346] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2649.122355] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2649.122365] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 00:44:49 executing program 0 (fault-call:2 fault-nth:27): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001000, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x20, &(0x7f0000000680)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 00:44:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, "73797a3100bceb0900"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:49 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0x1f000000], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 00:44:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffff7ffffffffffe}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000021ff8)={0xffffffffffffffff}) pipe(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f000000b000)=[{&(0x7f0000c01f96)="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", 0x1001}], 0x1) dup2(r2, r3) [ 2649.460971] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash" [ 2649.487257] FAULT_INJECTION: forcing a failure. [ 2649.487257] name failslab, interval 1, probability 0, space 0, times 0 [ 2649.502334] input: syz1 as /devices/virtual/input/input2864 [ 2649.517162] input: failed to attach handler leds to device input2864, error: -6 [ 2649.529482] CPU: 0 PID: 5807 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2649.537644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2649.537652] Call Trace: [ 2649.537681] dump_stack+0x244/0x39d [ 2649.537707] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2649.537728] ? filename_lookup+0x39a/0x520 [ 2649.553390] ? user_path_at_empty+0x40/0x50 [ 2649.553407] ? do_mount+0x180/0x1ff0 [ 2649.553423] ? ksys_mount+0x12d/0x140 [ 2649.553441] ? do_syscall_64+0x1b9/0x820 [ 2649.553462] should_fail.cold.4+0xa/0x17 [ 2649.562880] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2649.562897] ? mntput+0x74/0xa0 [ 2649.562924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2649.562939] ? check_preemption_disabled+0x48/0x280 [ 2649.562965] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2649.562994] ? find_held_lock+0x36/0x1c0 [ 2649.578894] ? proc_lookup_de+0x78/0x160 [ 2649.578923] ? filename_lookup+0x39f/0x520 [ 2649.578941] ? perf_trace_sched_process_exec+0x860/0x860 [ 2649.578962] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2649.588118] __should_failslab+0x124/0x180 [ 2649.588140] should_failslab+0x9/0x14 [ 2649.588157] kmem_cache_alloc_trace+0x2d7/0x750 [ 2649.588177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2649.607523] vfs_new_fs_context+0x5e/0x77c [ 2649.619866] ? ns_capable_common+0x13f/0x170 [ 2649.643535] do_mount+0xbfc/0x1ff0 [ 2649.643558] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 00:44:49 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673fe", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 2649.643581] ? copy_mount_string+0x40/0x40 [ 2649.643602] ? copy_mount_options+0x5f/0x430 [ 2649.657770] ? kmem_cache_alloc_trace+0x353/0x750 [ 2649.657793] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2649.657812] ? _copy_from_user+0xdf/0x150 [ 2649.657842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2649.657865] ? copy_mount_options+0x315/0x430 [ 2649.666940] ksys_mount+0x12d/0x140 [ 2649.666962] __x64_sys_mount+0xbe/0x150 [ 2649.666985] do_syscall_64+0x1b9/0x820 [ 2649.667002] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2649.667022] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2649.675662] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2649.675683] ? trace_hardirqs_on_caller+0x310/0x310 [ 2649.675701] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2649.675719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2649.675739] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2649.686109] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2649.686136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2649.686149] RIP: 0033:0x459fda [ 2649.686168] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2649.695833] RSP: 002b:00007fe310867a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2649.695849] RAX: ffffffffffffffda RBX: 00007fe310867b30 RCX: 0000000000459fda [ 2649.695858] RDX: 00007fe310867ad0 RSI: 00000000200001c0 RDI: 00007fe310867af0 [ 2649.695868] RBP: 00000000200001c0 R08: 00007fe310867b30 R09: 00007fe310867ad0 [ 2649.695877] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000000000004 00:44:49 executing program 3: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, &(0x7f0000000440)="76626f786e657430252f842c2d6c6f00") mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000003c0)='bdev\x00', 0x100000, &(0x7f0000000380)='em0vmnet1\x00') mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000080)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000580)) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x2000000000000000, 0x0) 00:44:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffff7ffffffffffe}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000021ff8)={0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) writev(0xffffffffffffffff, &(0x7f000000b000)=[{&(0x7f0000c01f96)="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", 0x1001}], 0x1) dup2(r2, 0xffffffffffffffff) [ 2649.695887] R13: 0000000000000020 R14: 00000000004d8258 R15: 0000000000000003 [ 2649.718366] input: syz1 as /devices/virtual/input/input2865 [ 2649.842297] input: failed to attach handler leds to device input2865, error: -6 [ 2649.890965] kasan: CONFIG_KASAN_INLINE enabled [ 2649.895924] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 2649.935390] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 2649.941660] CPU: 1 PID: 5807 Comm: syz-executor0 Not tainted 4.19.0-next-20181030+ #101 [ 2649.949798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2649.959206] RIP: 0010:put_fs_context+0x31/0x5a0 [ 2649.963882] Code: 56 41 55 41 54 53 48 89 fb 4c 8d ab 98 00 00 00 48 83 ec 18 e8 10 25 9f ff 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 03 05 00 00 4c 8b a3 98 00 00 00 4d 85 e4 74 66 [ 2649.982789] RSP: 0018:ffff8801caa7fbd8 EFLAGS: 00010207 [ 2649.988164] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc900021cb000 [ 2649.995438] RDX: 0000000000000011 RSI: ffffffff81e04360 RDI: fffffffffffffff4 [ 2650.002713] RBP: ffff8801caa7fc18 R08: ffff880181f726c0 R09: ffffed003b5e5b67 [ 2650.009986] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: ffff8801bc321a30 [ 2650.017255] R13: 000000000000008c R14: ffff8801c931e4c0 R15: ffff8801679ece40 [ 2650.024549] FS: 00007fe310868700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 2650.032775] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2650.038658] CR2: 0000000000400200 CR3: 000000016a27d000 CR4: 00000000001406e0 [ 2650.045939] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2650.053211] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2650.060498] Call Trace: [ 2650.063095] ? ns_capable_common+0x13f/0x170 [ 2650.067538] do_mount+0xda4/0x1ff0 [ 2650.071086] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2650.076633] ? copy_mount_string+0x40/0x40 [ 2650.080875] ? copy_mount_options+0x5f/0x430 [ 2650.085293] ? kmem_cache_alloc_trace+0x353/0x750 [ 2650.090151] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2650.095698] ? _copy_from_user+0xdf/0x150 [ 2650.099865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2650.105406] ? copy_mount_options+0x315/0x430 [ 2650.109912] ksys_mount+0x12d/0x140 [ 2650.113546] __x64_sys_mount+0xbe/0x150 [ 2650.117561] do_syscall_64+0x1b9/0x820 [ 2650.121459] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2650.126840] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2650.131779] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2650.136637] ? trace_hardirqs_on_caller+0x310/0x310 [ 2650.141657] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2650.146681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2650.152245] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2650.157273] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2650.162132] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2650.167322] RIP: 0033:0x459fda [ 2650.170521] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2650.189422] RSP: 002b:00007fe310867a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2650.197135] RAX: ffffffffffffffda RBX: 00007fe310867b30 RCX: 0000000000459fda [ 2650.204408] RDX: 00007fe310867ad0 RSI: 00000000200001c0 RDI: 00007fe310867af0 [ 2650.211678] RBP: 00000000200001c0 R08: 00007fe310867b30 R09: 00007fe310867ad0 [ 2650.218946] R10: 0000000000000020 R11: 0000000000000206 R12: 0000000000000004 [ 2650.226233] R13: 0000000000000020 R14: 00000000004d8258 R15: 0000000000000003 [ 2650.233511] Modules linked in: 00:44:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xd) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00H\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:44:50 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$reiserfs(&(0x7f0000000100)="7265697365726673dd", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002680), 0x0, &(0x7f0000002780)={[{@jdev={'jdev', 0x3d, './file0'}}, {@noquota='noquota'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}], [{@hash='hash'}, {@pcr={'pcr', 0x3d, 0x5}}, {@dont_measure='dont_measure'}]}) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 00:44:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000680)=[{&(0x7f0000000100)="8a", 0x1, 0x7fff}], 0x0, &(0x7f0000000840)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@cruft='cruft'}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@map_off='map=off'}, {@check_strict='check=strict'}, {@session={'session', 0x3d, 0x16}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x31, 0x30, 0x36, 0x39, 0x0, 0x77, 0x4], 0x2d, [0x0, 0x496b14e896abe364], 0x2d, [0x0, 0x0, 0x37], 0x2d, [0x63, 0x67], 0x2d, [0x33, 0x33, 0x7f, 0x38, 0x0, 0x0, 0x77, 0x3f]}}}, {@subj_type={'subj_type', 0x3d, '$securityself'}}, {@euid_eq={'euid'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 2650.238965] kobject: 'loop2' (00000000d9360955): kobject_uevent_env [ 2650.254868] kobject: 'input2866' (000000006a8026d0): kobject_add_internal: parent: 'input', set: 'devices' [ 2650.269921] kobject: 'loop2' (00000000d9360955): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2650.278551] kobject: 'input2866' (000000006a8026d0): kobject_uevent_env 00:44:50 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffff7ffffffffffe}, 0x0, 0x8) pipe(&(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) writev(r3, &(0x7f000000b000)=[{&(0x7f0000c01f96)="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", 0x1001}], 0x1) dup2(0xffffffffffffffff, r2) [ 2650.286907] kobject: 'input2866' (000000006a8026d0): fill_kobj_path: path = '/devices/virtual/input/input2866' [ 2650.292352] kobject: 'loop1' (00000000735ff5a3): kobject_uevent_env [ 2650.298958] kobject: 'input2866' (000000006a8026d0): fill_kobj_path: path = '/devices/virtual/input/input2866' [ 2650.305081] kobject: 'loop1' (00000000735ff5a3): kobject_uevent_env [ 2650.315093] input: syz1 as /devices/virtual/input/input2866 [ 2650.324188] kobject: 'loop1' (00000000735ff5a3): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2650.327978] kobject: 'loop5' (00000000d2bcb905): kobject_uevent_env [ 2650.340306] kobject: 'loop1' (00000000735ff5a3): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2650.342255] input: failed to attach handler leds to device input2866, error: -6 [ 2650.355162] kobject: 'loop5' (00000000d2bcb905): kobject_uevent_env [ 2650.359459] kobject: 'loop5' (00000000d2bcb905): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2650.372929] kobject: 'loop5' (00000000d2bcb905): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2650.377044] kobject: 'event4' (000000005e068805): kobject_add_internal: parent: 'input2866', set: 'devices' [ 2650.391965] kobject: 'loop4' (000000003a66bd5c): kobject_uevent_env [ 2650.397148] kobject: 'event4' (000000005e068805): kobject_uevent_env [ 2650.400914] kobject: 'loop4' (000000003a66bd5c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2650.407773] kobject: 'event4' (000000005e068805): fill_kobj_path: path = '/devices/virtual/input/input2866/event4' [ 2650.440531] kobject: 'event4' (000000005e068805): kobject_uevent_env [ 2650.441120] kobject: 'loop1' (00000000735ff5a3): kobject_uevent_env [ 2650.448670] ---[ end trace a6bdeed94bf866a5 ]--- [ 2650.455048] kobject: 'loop0' (0000000077f44868): kobject_uevent_env [ 2650.458440] uinput: write device info first [ 2650.469708] RIP: 0010:put_fs_context+0x31/0x5a0 [ 2650.469732] kobject: 'loop1' (00000000735ff5a3): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2650.474876] kobject: 'loop5' (00000000d2bcb905): kobject_uevent_env [ 2650.484252] kobject: 'loop0' (0000000077f44868): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2650.490532] kobject: 'event4' (000000005e068805): fill_kobj_path: path = '/devices/virtual/input/input2866/event4' [ 2650.500939] kobject: 'loop1' (00000000735ff5a3): kobject_uevent_env [ 2650.517012] Code: 56 41 55 41 54 53 48 89 fb 4c 8d ab 98 00 00 00 48 83 ec 18 e8 10 25 9f ff 4c 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 03 05 00 00 4c 8b a3 98 00 00 00 4d 85 e4 74 66 [ 2650.532134] kobject: 'loop1' (00000000735ff5a3): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2650.536319] kobject: 'loop5' (00000000d2bcb905): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2650.550994] kobject: 'loop1' (00000000735ff5a3): kobject_uevent_env [ 2650.556914] kobject: '(null)' (000000002e474719): kobject_cleanup, parent 000000005e068805 [ 2650.570384] RSP: 0018:ffff8801caa7fbd8 EFLAGS: 00010207 [ 2650.571856] kobject: 'loop1' (00000000735ff5a3): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2650.576243] kobject: '(null)' (000000002e474719): calling ktype release [ 2650.590912] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc900021cb000 [ 2650.599358] RDX: 0000000000000011 RSI: ffffffff81e04360 RDI: fffffffffffffff4 [ 2650.601869] kobject: 'loop5' (00000000d2bcb905): kobject_uevent_env [ 2650.613420] kobject: 'loop5' (00000000d2bcb905): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2650.622056] RBP: ffff8801caa7fc18 R08: ffff880181f726c0 R09: ffffed003b5e5b67 [ 2650.630352] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: ffff8801bc321a30 [ 2650.630862] kobject: 'event4' (000000005e068805): kobject_cleanup, parent (null) [ 2650.637892] R13: 000000000000008c R14: ffff8801c931e4c0 R15: ffff8801679ece40 [ 2650.650902] kobject: 'loop5' (00000000d2bcb905): kobject_uevent_env [ 2650.653570] kobject: 'event4' (000000005e068805): calling ktype release [ 2650.659899] kobject: 'loop5' (00000000d2bcb905): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2650.676369] FS: 00007fe310868700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 2650.684980] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2650.685702] kobject: 'event4': free name [ 2650.691416] CR2: 00007ffc11610bc8 CR3: 000000016a27d000 CR4: 00000000001406e0 [ 2650.702761] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2650.703201] kobject: 'loop5' (00000000d2bcb905): kobject_uevent_env [ 2650.710103] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2650.716914] kobject: 'input2866' (000000006a8026d0): kobject_uevent_env [ 2650.724182] Kernel panic - not syncing: Fatal exception [ 2650.730846] kobject: 'loop5' (00000000d2bcb905): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2650.737048] Kernel Offset: disabled [ 2650.750087] Rebooting in 86400 seconds..