0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1826.611038][T15439] device bridge785 entered promiscuous mode [ 1826.717898][T15439] debugfs: Directory 'hsr550' with parent 'hsr' already present! [ 1826.725813][T15439] Cannot create hsr debugfs directory [ 1826.746699][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr550: link becomes ready [ 1826.758557][T15443] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1826.771856][T15434] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:33:46 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x48, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1828.054717][T15490] device veth2323 entered promiscuous mode [ 1828.211253][T15490] device bridge1016 entered promiscuous mode [ 1828.404264][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr645: link becomes ready [ 1828.694637][T15496] device veth2325 entered promiscuous mode [ 1828.751214][T15496] device veth2325 left promiscuous mode [ 1829.094867][T15538] __nla_validate_parse: 5 callbacks suppressed [ 1829.094888][T15538] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1829.906143][T15550] device veth439 entered promiscuous mode [ 1830.085574][T15550] device bridge209 entered promiscuous mode [ 1830.385752][T15550] debugfs: Directory 'hsr72' with parent 'hsr' already present! [ 1830.393588][T15550] Cannot create hsr debugfs directory [ 1830.402519][T15550] hsr72: Slave A (veth439) is not up; please bring it up to get a fully working HSR network [ 1830.432299][T32260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr72: link becomes ready 18:33:50 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:33:50 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x88a8ffff, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:33:50 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xff0f0000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:33:50 executing program 1: r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) setpriority(0x2, r0, 0x9) 18:33:50 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:33:50 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x4a, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1831.310995][T15571] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1831.492405][T15577] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1831.553178][T15573] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1831.953245][T15572] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 18:33:51 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x3, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1832.326703][T15578] device veth2327 entered promiscuous mode 18:33:51 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffdf9, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1832.393856][T15578] device bridge1017 entered promiscuous mode [ 1832.484974][T15582] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1832.647392][T15627] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:33:52 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x4c, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1832.767502][T15587] device veth1347 entered promiscuous mode [ 1832.884591][T15627] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1832.935323][T15587] device bridge786 entered promiscuous mode [ 1833.004747][T15587] debugfs: Directory 'hsr551' with parent 'hsr' already present! [ 1833.023811][T15587] Cannot create hsr debugfs directory [ 1833.061083][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr646: link becomes ready 18:33:52 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1833.171624][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr551: link becomes ready [ 1833.192138][T15598] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1833.205740][T15605] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1833.445117][T15649] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1833.564929][T15651] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1833.652593][T15673] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1833.761638][T15655] device veth2329 entered promiscuous mode [ 1833.793870][T15655] device bridge1018 entered promiscuous mode 18:33:53 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff7f, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1833.890728][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr647: link becomes ready [ 1833.911549][T15651] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1833.988329][T15673] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:33:53 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x89800000, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1834.267066][T15711] __nla_validate_parse: 1 callbacks suppressed [ 1834.267087][T15711] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1834.389102][T15715] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1834.644500][T15727] device veth1349 entered promiscuous mode [ 1834.730860][T15727] device bridge787 entered promiscuous mode [ 1834.754532][T15727] debugfs: Directory 'hsr552' with parent 'hsr' already present! [ 1834.762526][T15727] Cannot create hsr debugfs directory [ 1834.814128][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr552: link becomes ready [ 1834.905908][T15711] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1834.922241][T15715] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1835.617921][T15749] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1835.673530][T15750] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1836.301697][T15759] device veth441 entered promiscuous mode [ 1836.416706][T15759] device bridge210 entered promiscuous mode [ 1836.455705][T15759] debugfs: Directory 'hsr73' with parent 'hsr' already present! [ 1836.463616][T15759] Cannot create hsr debugfs directory [ 1836.497078][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr73: link becomes ready 18:33:56 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:33:56 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x60, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:33:56 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x5, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:33:56 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff8c, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:33:56 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x898f0400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:33:56 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) fcntl$lock(r0, 0x5, &(0x7f0000000040)={0x2, 0x3, 0x3, 0x7, r1}) [ 1836.821673][T15781] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1836.969885][T15784] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1837.049461][T15782] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1837.211249][T15785] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:33:57 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1837.424451][T15790] device veth1351 entered promiscuous mode [ 1837.493813][T15790] device bridge788 entered promiscuous mode [ 1837.508133][T15790] debugfs: Directory 'hsr553' with parent 'hsr' already present! [ 1837.516391][T15790] Cannot create hsr debugfs directory [ 1837.554600][T15788] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:33:57 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x8a8f0400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1837.850657][T15835] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:33:57 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffff6, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1838.004519][T15795] device veth2331 entered promiscuous mode [ 1838.085653][T15795] device bridge1019 entered promiscuous mode 18:33:57 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x7, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1838.167883][T32260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr553: link becomes ready [ 1838.254165][T32260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr648: link becomes ready 18:33:58 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x68, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1838.476089][T15853] device veth1353 entered promiscuous mode [ 1838.506072][T15853] device bridge789 entered promiscuous mode [ 1838.569026][T15879] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1838.583244][T15853] debugfs: Directory 'hsr554' with parent 'hsr' already present! [ 1838.591760][T15853] Cannot create hsr debugfs directory [ 1838.632659][T32260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr554: link becomes ready 18:33:58 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x8b8f0400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1838.793755][T15879] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1839.389456][T15899] device veth2333 entered promiscuous mode [ 1839.459685][T15899] device bridge1020 entered promiscuous mode [ 1839.511027][T32260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr649: link becomes ready [ 1839.532644][T15913] __nla_validate_parse: 4 callbacks suppressed [ 1839.532681][T15913] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1839.653100][T15916] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1839.772270][T15923] device veth1355 entered promiscuous mode [ 1839.835589][T15923] device bridge790 entered promiscuous mode [ 1839.866022][T15923] debugfs: Directory 'hsr555' with parent 'hsr' already present! [ 1839.873833][T15923] Cannot create hsr debugfs directory [ 1839.900537][T15921] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1839.997663][T32260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr555: link becomes ready [ 1840.018164][T15934] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1840.233808][T15955] device veth443 entered promiscuous mode [ 1840.535787][T15955] device bridge211 entered promiscuous mode [ 1840.553887][T15955] debugfs: Directory 'hsr74' with parent 'hsr' already present! [ 1840.562311][T15955] Cannot create hsr debugfs directory [ 1840.585064][T15913] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1840.594616][T15933] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1840.726304][T32260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr74: link becomes ready 18:34:00 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:34:00 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x8, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:00 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffe, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:00 executing program 1: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={@loopback, @multicast1}, &(0x7f0000000140)=0xc) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000180)={0x0, @private=0xa010101, 0x4e20, 0x3, 'dh\x00', 0x20, 0x0, 0x60}, 0x2c) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setpriority(0x2, 0x0, 0xfffffffffffffffd) 18:34:00 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x6c, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:00 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x8c8f0400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1841.037255][T16002] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1841.091062][T16004] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1841.117382][T16001] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1841.237485][T16002] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1841.297207][T16011] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1841.496434][T16004] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:34:01 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x74, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:01 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x8d8f0400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:34:01 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x9, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1842.150378][T16066] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:34:01 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1842.840225][T16067] device veth1359 entered promiscuous mode [ 1842.944207][T16066] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1842.988804][T16067] device bridge792 entered promiscuous mode [ 1843.030365][T16067] debugfs: Directory 'hsr556' with parent 'hsr' already present! [ 1843.038466][T16067] Cannot create hsr debugfs directory 18:34:02 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xa, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:03 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xedc000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1844.069612][T32260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr556: link becomes ready [ 1844.159267][T16090] device veth2337 entered promiscuous mode [ 1844.190613][T16163] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1844.230823][T16090] device bridge1022 entered promiscuous mode [ 1844.255361][T16090] hsr650: Slave A (veth2337) is not up; please bring it up to get a fully working HSR network [ 1844.388377][T16163] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1844.721574][T16144] device veth2339 entered promiscuous mode [ 1844.756423][T16144] device veth2339 left promiscuous mode [ 1844.824024][T32260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr650: link becomes ready 18:34:04 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:04 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:04 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x8e8f0400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1845.524500][T16220] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1845.556972][T16225] __nla_validate_parse: 11 callbacks suppressed [ 1845.557066][T16225] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 18:34:05 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x1f, &(0x7f0000000180)={0x800000, 0x5, 0xfffffffa}) r2 = gettid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) r4 = clone3(&(0x7f00000003c0)={0x20020400, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), {0x14}, &(0x7f0000000200)=""/101, 0x65, &(0x7f0000000280)=""/212, &(0x7f0000000380)=[r0, r0], 0x2}, 0x58) sched_setattr(r4, &(0x7f0000000440)={0x38, 0x0, 0x65, 0x1, 0x80, 0x3, 0x800, 0xffffffff9b13fca9, 0xe, 0x1ff}, 0x0) prlimit64(r2, 0xe, &(0x7f00000000c0)={0x2000080}, &(0x7f0000000080)) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000000)={0x0, 0x4, 0x3, 0x1, r0}) 18:34:05 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x7a, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:05 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1845.632645][T16228] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1845.783182][T16220] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1845.988758][T16235] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:34:05 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x10, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1846.242032][T16245] device veth1361 entered promiscuous mode [ 1846.293583][T16245] device bridge793 entered promiscuous mode [ 1846.326518][T16245] debugfs: Directory 'hsr557' with parent 'hsr' already present! [ 1846.334545][T16245] Cannot create hsr debugfs directory [ 1846.355254][T16255] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1846.473454][T16281] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:34:06 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x8f8f0400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1846.772689][T16256] device veth2341 entered promiscuous mode 18:34:06 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x31, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:06 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x40000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1846.920084][T16256] device bridge1023 entered promiscuous mode [ 1847.058141][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr557: link becomes ready [ 1847.143402][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr651: link becomes ready [ 1847.170446][T16298] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1847.226583][T16306] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:34:06 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:06 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x48, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1847.553779][T16316] device veth1363 entered promiscuous mode [ 1847.663896][T16316] device bridge794 entered promiscuous mode [ 1847.736469][T16316] debugfs: Directory 'hsr558' with parent 'hsr' already present! [ 1847.744398][T16316] Cannot create hsr debugfs directory [ 1847.752526][T16316] hsr558: Slave A (veth1363) is not up; please bring it up to get a fully working HSR network [ 1847.786738][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr558: link becomes ready [ 1847.812798][T16337] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1847.944015][T16339] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1847.945290][T16340] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1848.121755][T16344] device veth2343 entered promiscuous mode [ 1848.170014][T16339] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1848.172128][T16344] device bridge1024 entered promiscuous mode [ 1848.261435][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr652: link becomes ready [ 1848.405766][T16352] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1848.603140][T16367] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1849.132195][T16385] device veth445 entered promiscuous mode [ 1849.157282][T16385] device bridge213 entered promiscuous mode [ 1849.197554][T16385] debugfs: Directory 'hsr75' with parent 'hsr' already present! [ 1849.206323][T16385] Cannot create hsr debugfs directory [ 1849.230635][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr75: link becomes ready 18:34:08 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:08 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x908f0400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:34:08 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4c, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:08 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x100000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:08 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x2, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:08 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) [ 1849.509303][T16416] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1849.827973][T16416] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1849.911728][T16430] device veth1365 entered promiscuous mode [ 1850.014261][T16430] device bridge795 entered promiscuous mode [ 1850.040976][T16430] debugfs: Directory 'hsr559' with parent 'hsr' already present! [ 1850.049231][T16430] Cannot create hsr debugfs directory 18:34:09 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x60, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1850.071140][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr559: link becomes ready [ 1850.208050][T16436] device veth2345 entered promiscuous mode [ 1850.361265][T16436] device bridge1025 entered promiscuous mode 18:34:10 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x918f0400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1850.494486][T16436] hsr653: Slave A (veth2345) is not up; please bring it up to get a fully working HSR network [ 1850.550208][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr653: link becomes ready 18:34:10 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x100000200000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:10 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x68, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1850.875141][T16479] device veth2347 entered promiscuous mode [ 1850.996144][T16479] device veth2347 left promiscuous mode [ 1851.167979][T16510] __nla_validate_parse: 6 callbacks suppressed [ 1851.168040][T16510] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1851.298352][T16518] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:34:11 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6c, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1851.541682][T16521] device veth1367 entered promiscuous mode 18:34:11 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x74, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1851.804686][T16521] device bridge796 entered promiscuous mode [ 1851.883188][T16521] debugfs: Directory 'hsr560' with parent 'hsr' already present! [ 1851.900459][T16521] Cannot create hsr debugfs directory [ 1851.925599][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr560: link becomes ready [ 1851.937087][T16518] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1851.946890][T16522] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1852.491161][T16541] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1852.551773][T16570] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1852.685131][T16590] device veth447 entered promiscuous mode [ 1852.701571][ T1229] ieee802154 phy0 wpan0: encryption failed: -22 [ 1852.707919][ T1229] ieee802154 phy1 wpan1: encryption failed: -22 [ 1853.131416][T16590] device bridge214 entered promiscuous mode [ 1853.147830][T16590] debugfs: Directory 'hsr76' with parent 'hsr' already present! [ 1853.155981][T16590] Cannot create hsr debugfs directory [ 1853.189705][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr76: link becomes ready 18:34:13 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:13 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x3, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:13 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x92030000, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:34:13 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x200000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:13 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x7a, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:13 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) getpid() [ 1853.602666][T16630] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1853.708315][T16631] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1853.848076][T16636] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:34:13 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb1, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1854.108082][T16637] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1854.394105][T16630] device veth1369 entered promiscuous mode [ 1854.437442][T16630] device bridge797 entered promiscuous mode [ 1854.468460][T16630] debugfs: Directory 'hsr561' with parent 'hsr' already present! [ 1854.477178][T16630] Cannot create hsr debugfs directory [ 1854.524730][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr561: link becomes ready 18:34:14 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x300000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:14 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb2, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:14 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x4, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:14 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9796a24f, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:34:15 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb3, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1855.909501][T16773] device veth1371 entered promiscuous mode [ 1855.947916][T16773] device bridge798 entered promiscuous mode [ 1855.976209][T16773] debugfs: Directory 'hsr562' with parent 'hsr' already present! [ 1855.984144][T16773] Cannot create hsr debugfs directory [ 1856.218936][T16751] __nla_validate_parse: 8 callbacks suppressed [ 1856.218955][T16751] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1856.247005][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr562: link becomes ready [ 1856.365635][T16760] device veth2353 entered promiscuous mode [ 1856.576533][T16760] device bridge1027 entered promiscuous mode [ 1856.587792][T16760] hsr654: Slave A (veth2353) is not up; please bring it up to get a fully working HSR network [ 1856.611175][T16762] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1856.621596][T16773] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1856.737761][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr654: link becomes ready [ 1857.064707][T16828] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1857.257941][T16833] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:34:17 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:17 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x300, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:17 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9effffff, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:34:17 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:17 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x5, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:17 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) syz_open_procfs(r0, &(0x7f0000000000)='net/raw\x00') [ 1857.790735][T16860] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1857.888153][T16864] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1857.988478][T16865] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1858.081696][T16866] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:34:17 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x500, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1858.444718][T16870] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1858.753678][T16871] device veth1373 entered promiscuous mode [ 1858.768030][T16908] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1858.811770][T16871] device bridge799 entered promiscuous mode [ 1858.896045][T16871] debugfs: Directory 'hsr563' with parent 'hsr' already present! [ 1858.904103][T16871] Cannot create hsr debugfs directory [ 1859.044196][T16908] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1859.057845][T16876] device veth2355 entered promiscuous mode 18:34:18 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x500000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1859.170552][T16876] device bridge1028 entered promiscuous mode [ 1859.243189][T16864] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:34:18 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xc3ffffff, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:34:19 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x600, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1859.629078][T16877] device veth2357 entered promiscuous mode [ 1859.747923][T16877] device veth2357 left promiscuous mode [ 1859.865658][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr563: link becomes ready [ 1859.877235][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr655: link becomes ready [ 1859.914877][T16955] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1860.177612][T16955] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:34:20 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x700, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:20 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x504000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1860.715040][T17000] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1860.792970][T16956] device veth1375 entered promiscuous mode [ 1860.843915][T16956] device bridge800 entered promiscuous mode [ 1860.885809][T17000] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1860.899267][T16956] debugfs: Directory 'hsr564' with parent 'hsr' already present! [ 1860.907715][T16956] Cannot create hsr debugfs directory [ 1860.964811][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr564: link becomes ready [ 1863.073570][T17037] __nla_validate_parse: 5 callbacks suppressed [ 1863.073591][T17037] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1863.398076][T17037] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1864.250990][T17038] device veth451 entered promiscuous mode [ 1864.463325][T17038] device bridge216 entered promiscuous mode [ 1864.481905][T17038] debugfs: Directory 'hsr77' with parent 'hsr' already present! [ 1864.489913][T17038] Cannot create hsr debugfs directory [ 1864.512099][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr77: link becomes ready 18:34:24 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x900, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:24 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x6, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:24 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xd6050000, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:34:24 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x600000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:24 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) ptrace$poke(0x5, 0x0, &(0x7f0000000000), 0x6) 18:34:24 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1864.959180][T17063] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1865.105289][T17064] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1865.159425][T17061] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1865.350406][T17069] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1865.505738][T17070] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1865.550661][T17061] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:34:25 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xa00, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1866.041750][T17073] device veth1377 entered promiscuous mode 18:34:25 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x700000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1866.181940][T17073] device bridge802 entered promiscuous mode [ 1866.213150][T17073] debugfs: Directory 'hsr565' with parent 'hsr' already present! [ 1866.221015][T17073] Cannot create hsr debugfs directory [ 1866.276540][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr565: link becomes ready [ 1866.305060][T17063] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1866.316806][T17129] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1866.373427][T17075] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:34:26 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x7, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1866.566123][T17129] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:34:26 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xe4ffffff, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:34:26 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb00, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1866.812805][T17152] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1866.922304][T17155] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1867.138258][T17165] device veth2361 entered promiscuous mode [ 1867.196262][T17165] device bridge1030 entered promiscuous mode [ 1867.299138][T17185] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1867.305527][ T136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr656: link becomes ready [ 1867.795116][T17191] device veth1379 entered promiscuous mode 18:34:27 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x8, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:27 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x1020, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1867.953036][T17191] device bridge804 entered promiscuous mode 18:34:27 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x800000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1868.105482][T17191] debugfs: Directory 'hsr566' with parent 'hsr' already present! [ 1868.113801][T17191] Cannot create hsr debugfs directory [ 1868.166410][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr566: link becomes ready [ 1868.193088][T17190] __nla_validate_parse: 2 callbacks suppressed [ 1868.193108][T17190] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1868.472627][T17213] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1868.543153][T17218] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:34:28 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x1f00, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1869.093808][T17222] device veth2363 entered promiscuous mode 18:34:28 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1869.206481][T17222] device bridge1031 entered promiscuous mode [ 1869.341364][ T136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr657: link becomes ready [ 1869.364936][T17226] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:34:29 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffb) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = gettid() r2 = getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) sched_setscheduler(r3, 0x4, &(0x7f0000000440)=0xf6) rt_tgsigqueueinfo(r2, r1, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)=0x0) tkill(r4, 0x2b) clone3(&(0x7f0000000280)={0x140100, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0x38}, &(0x7f0000000180)=""/67, 0x43, &(0x7f0000000200)=""/57, &(0x7f0000000240)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0xa}, 0x58) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000300)={{0x3, 0xffffffffffffffff, 0xee00, 0xee00, r0, 0x40, 0x5}, 0x80, 0x3a5a, 0x8, 0x200, r1, r4, 0x1}) [ 1870.010247][T17287] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1870.176003][T17290] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1870.400747][T17299] device veth453 entered promiscuous mode [ 1870.498001][T17299] device bridge217 entered promiscuous mode [ 1870.533096][T17310] syz-executor.1: vmalloc error: size 4096, page order 0, failed to allocate pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 1870.549632][T17310] CPU: 1 PID: 17310 Comm: syz-executor.1 Not tainted 5.15.0-syzkaller #0 [ 1870.558073][T17310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1870.568144][T17310] Call Trace: [ 1870.571432][T17310] [ 1870.574373][T17310] dump_stack_lvl+0xcd/0x134 [ 1870.578989][T17310] warn_alloc.cold+0x87/0x17a [ 1870.583686][T17310] ? zone_watermark_ok_safe+0x290/0x290 [ 1870.589264][T17310] ? io_schedule_timeout+0x180/0x180 [ 1870.594576][T17310] ? __vmalloc_node_range+0x574/0xab0 [ 1870.599967][T17310] __vmalloc_node_range+0x883/0xab0 [ 1870.605195][T17310] ? vfree_atomic+0xe0/0xe0 [ 1870.609719][T17310] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1870.615281][T17310] ? kmem_cache_alloc_node+0x3ce/0x590 [ 1870.620752][T17310] ? kernel_clone+0xe7/0xab0 [ 1870.625363][T17310] copy_process+0x926/0x75a0 [ 1870.629982][T17310] ? kernel_clone+0xe7/0xab0 [ 1870.634593][T17310] ? find_held_lock+0x2d/0x110 [ 1870.639377][T17310] ? __cleanup_sighand+0xb0/0xb0 [ 1870.644337][T17310] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1870.650604][T17310] ? _copy_from_user+0x5d/0x180 [ 1870.655472][T17310] ? kernel_clone+0x314/0xab0 [ 1870.660176][T17310] kernel_clone+0xe7/0xab0 [ 1870.664620][T17310] ? create_io_thread+0xf0/0xf0 [ 1870.669506][T17310] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 1870.675508][T17310] __do_sys_clone3+0x1ca/0x2e0 [ 1870.680301][T17310] ? __do_sys_clone+0x110/0x110 [ 1870.685206][T17310] ? lock_downgrade+0x6e0/0x6e0 [ 1870.690076][T17310] ? lock_downgrade+0x6e0/0x6e0 [ 1870.694952][T17310] ? syscall_enter_from_user_mode+0x21/0x70 [ 1870.700868][T17310] ? lockdep_hardirqs_on+0x79/0x100 [ 1870.706092][T17310] do_syscall_64+0x35/0xb0 [ 1870.710528][T17310] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1870.716444][T17310] RIP: 0033:0x7fca19532ae9 [ 1870.720875][T17310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1870.740590][T17310] RSP: 002b:00007fca16aa8188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 1870.749025][T17310] RAX: ffffffffffffffda RBX: 00007fca19645f60 RCX: 00007fca19532ae9 [ 1870.757017][T17310] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 0000000020000280 [ 1870.765008][T17310] RBP: 00007fca1958cf6d R08: 0000000000000000 R09: 0000000000000000 [ 1870.772996][T17310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1870.780977][T17310] R13: 00007ffd7daa52df R14: 00007fca16aa8300 R15: 0000000000022000 [ 1870.788992][T17310] [ 1870.802013][T17310] Mem-Info: [ 1870.805486][T17310] active_anon:298 inactive_anon:296077 isolated_anon:0 [ 1870.805486][T17310] active_file:8036 inactive_file:95999 isolated_file:0 [ 1870.805486][T17310] unevictable:768 dirty:113 writeback:0 [ 1870.805486][T17310] slab_reclaimable:28445 slab_unreclaimable:346752 [ 1870.805486][T17310] mapped:61909 shmem:8368 pagetables:55755 bounce:0 [ 1870.805486][T17310] kernel_misc_reclaimable:0 [ 1870.805486][T17310] free:688558 free_pcp:23591 free_cma:0 [ 1870.847592][T17310] Node 0 active_anon:1092kB inactive_anon:1001908kB active_file:28344kB inactive_file:379984kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:211952kB dirty:380kB writeback:0kB shmem:22716kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 669696kB writeback_tmp:0kB kernel_stack:17360kB pagetables:35664kB all_unreclaimable? no [ 1870.879671][T17310] Node 1 active_anon:100kB inactive_anon:182400kB active_file:3800kB inactive_file:4012kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:35684kB dirty:72kB writeback:0kB shmem:10756kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:52944kB pagetables:187356kB all_unreclaimable? no [ 1870.910680][T17310] Node 0 DMA free:10696kB boost:0kB min:200kB low:248kB high:296kB reserved_highatomic:0KB active_anon:0kB inactive_anon:2212kB active_file:8kB inactive_file:4kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:96kB local_pcp:96kB free_cma:0kB [ 1870.938222][T17310] lowmem_reserve[]: 0 2647 2648 2648 2648 [ 1870.944029][T17310] Node 0 DMA32 free:76076kB boost:55296kB min:90984kB low:99904kB high:108824kB reserved_highatomic:30720KB active_anon:1092kB inactive_anon:999696kB active_file:28336kB inactive_file:379980kB unevictable:1536kB writepending:380kB present:3129332kB managed:2718892kB mlocked:0kB bounce:0kB free_pcp:29912kB local_pcp:17716kB free_cma:0kB [ 1870.975785][T17310] lowmem_reserve[]: 0 0 0 0 0 [ 1870.980526][T17310] Node 0 Normal free:0kB boost:0kB min:8kB low:8kB high:8kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:656kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1871.007053][T17310] lowmem_reserve[]: 0 0 0 0 0 [ 1871.011790][T17310] Node 1 Normal free:2667460kB boost:0kB min:54208kB low:67760kB high:81312kB reserved_highatomic:0KB active_anon:100kB inactive_anon:182400kB active_file:3800kB inactive_file:4012kB unevictable:1536kB writepending:72kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:64528kB local_pcp:32088kB free_cma:0kB [ 1871.042376][T17310] lowmem_reserve[]: 0 0 0 0 0 [ 1871.047118][T17310] Node 0 DMA: 8*4kB (M) 7*8kB (UM) 5*16kB (UME) 1*32kB (M) 2*64kB (ME) 3*128kB (UME) 1*256kB (E) 3*512kB (UME) 2*1024kB (ME) 3*2048kB (UME) 0*4096kB = 10696kB [ 1871.063323][T17310] Node 0 DMA32: 2991*4kB (MH) 1070*8kB (UMH) 226*16kB (UMH) 255*32kB (UMH) 96*64kB (UMEH) 10*128kB (MEH) 4*256kB (UEH) 3*512kB (UH) 1*1024kB (E) 16*2048kB (M) 0*4096kB = 76076kB [ 1871.081188][T17310] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 1871.092787][T17310] Node 1 Normal: 257*4kB (UME) 210*8kB (UM) 11*16kB (UM) 4*32kB (UME) 4*64kB (UME) 2*128kB (ME) 0*256kB 1*512kB (E) 1*1024kB (E) 2*2048kB (UE) 649*4096kB (M) = 2667460kB [ 1871.109963][T17310] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1871.119592][T17310] Node 0 hugepages_total=2 hugepages_free=1 hugepages_surp=0 hugepages_size=2048kB [ 1871.128976][T17310] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1871.138596][T17310] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 1871.147975][T17310] 57871 total pagecache pages [ 1871.152717][T17310] 0 pages in swap cache [ 1871.156878][T17310] Swap cache stats: add 0, delete 0, find 0/0 [ 1871.163011][T17310] Free swap = 0kB [ 1871.166735][T17310] Total swap = 0kB [ 1871.170460][T17310] 2097051 pages RAM [ 1871.174335][T17310] 0 pages HighMem/MovableOnly [ 1871.179015][T17310] 383919 pages reserved [ 1871.183228][T17310] 0 pages cma reserved [ 1871.195324][T17299] debugfs: Directory 'hsr78' with parent 'hsr' already present! [ 1871.203040][T17299] Cannot create hsr debugfs directory [ 1871.214821][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr78: link becomes ready 18:34:30 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:30 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xe5c86641, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:34:30 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x9, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:30 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x900000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:30 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2010, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1871.430958][T17324] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 18:34:31 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x3100, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1871.655523][T17323] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1871.826966][T17335] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1872.126256][T17334] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:34:31 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x3f00, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:31 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xa00000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1872.496057][T17339] device veth1381 entered promiscuous mode [ 1872.547982][T17339] device bridge805 entered promiscuous mode [ 1872.642973][T17339] debugfs: Directory 'hsr567' with parent 'hsr' already present! [ 1872.650992][T17339] Cannot create hsr debugfs directory [ 1872.730056][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr567: link becomes ready 18:34:32 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:32 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0xa, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:32 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xf0ffffff, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1873.100395][T17410] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1873.218322][T17416] __nla_validate_parse: 3 callbacks suppressed [ 1873.218361][T17416] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1873.560736][T17410] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue [ 1873.629714][T17419] device veth2369 entered promiscuous mode [ 1873.663422][T17419] device bridge1033 entered promiscuous mode [ 1873.780281][T17421] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1873.964111][T17438] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1874.170962][T17444] device veth1383 entered promiscuous mode [ 1874.225421][T17444] device bridge806 entered promiscuous mode [ 1874.336369][T17444] debugfs: Directory 'hsr568' with parent 'hsr' already present! [ 1874.344281][T17444] Cannot create hsr debugfs directory [ 1874.362093][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr658: link becomes ready [ 1874.436488][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr568: link becomes ready [ 1874.638171][T17469] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 18:34:34 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xb00000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1874.856398][T17476] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:34:35 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:35 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4800, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:35 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xfeff0000, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:34:35 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0xc, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:35 executing program 1: r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r2, 0xffffffffffff6a2d, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9, 0x7, 0x24, 0x80, 0x0, 0x0, 0x4, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x2, @perf_bp={&(0x7f0000000040)}, 0x2048, 0x3, 0x6, 0x0, 0x8, 0x6063, 0x6, 0x0, 0x2, 0x0, 0x8}, 0x0, 0x2, r2, 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) setpriority(0x3, r3, 0x1000000000000005) 18:34:35 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1876.352911][T17496] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1876.430234][T17495] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1876.562967][T17498] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1876.593593][T17496] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1876.604965][T17501] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1876.839469][T17498] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1876.878338][T17508] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:34:36 executing program 1: setpriority(0x2, 0x0, 0xb9) [ 1877.102601][T17509] device veth2371 entered promiscuous mode [ 1877.205635][T17509] device bridge1034 entered promiscuous mode [ 1877.316855][T17524] device veth1385 entered promiscuous mode 18:34:36 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4c00, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1877.441179][T17524] device bridge807 entered promiscuous mode 18:34:37 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1f00000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:37 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0xe, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1877.611076][T17524] debugfs: Directory 'hsr569' with parent 'hsr' already present! [ 1877.619046][T17524] Cannot create hsr debugfs directory [ 1877.642091][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr659: link becomes ready [ 1877.654333][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr569: link becomes ready [ 1877.761063][T17559] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:34:37 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xfeffffff, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1878.131112][T17559] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1878.510583][T17570] device veth2373 entered promiscuous mode 18:34:38 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1878.608912][T17570] device bridge1035 entered promiscuous mode [ 1878.681677][T17587] __nla_validate_parse: 2 callbacks suppressed [ 1878.687987][T17587] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1878.886235][T17594] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1879.166916][T17562] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1879.641341][T17595] device veth1387 entered promiscuous mode [ 1879.679099][T17595] device bridge808 entered promiscuous mode [ 1879.699080][T17595] debugfs: Directory 'hsr570' with parent 'hsr' already present! [ 1879.707243][T17595] Cannot create hsr debugfs directory [ 1879.770518][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr660: link becomes ready [ 1879.852073][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr570: link becomes ready [ 1879.879260][T17581] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1879.889470][T17569] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1880.311736][T17570] device veth2375 entered promiscuous mode [ 1880.621863][T17570] device veth2375 left promiscuous mode [ 1880.807047][T17601] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1880.818036][T17626] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:34:41 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6800, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:41 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:41 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x10, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:41 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xff0f0000, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:34:41 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:41 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000003e40), 0x30000, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', &(0x7f00000042c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) r4 = gettid() r5 = getpid() rt_tgsigqueueinfo(r5, r4, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r7, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005b00)=[{{&(0x7f0000004340)=@abs, 0x6e, &(0x7f00000044c0)=[{&(0x7f00000043c0)=""/160, 0xa0}, {&(0x7f0000004480)=""/34, 0x22}], 0x2}}, {{&(0x7f0000004500), 0x6e, &(0x7f0000005800)=[{&(0x7f0000004580)=""/95, 0x5f}, {&(0x7f0000004600)=""/106, 0x6a}, {&(0x7f0000004680)=""/254, 0xfe}, {&(0x7f0000004780)=""/111, 0x6f}, {&(0x7f0000004800)=""/4096, 0x1000}], 0x5, &(0x7f0000005880)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0xb8}}, {{&(0x7f0000005940)=@abs, 0x6e, &(0x7f0000005a40)=[{&(0x7f00000059c0)=""/103, 0x67}], 0x1, &(0x7f0000005a80)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x68}}], 0x3, 0x2020, 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r10) r11 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r12, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005c40)=[{{&(0x7f0000000000)=@file={0x4499dd796646723, './file0\x00'}, 0x6e, &(0x7f00000012c0)=[{&(0x7f0000000080)="2dd4d349f430aeb5bbe2af0f90f940846263e3acdcc5e77f2a4b474e7988941732f63e279c43a2950dcf1786543c9b2f572438284af270e7b692743502e807f06de46ea494d5935283864e639f091c786585f80473b89c1b9e527571805373b2a12e47e64e42b681d62a21770e4f096972cc29d0262d2e6971c66851f4d6eda00ff208ecd5821d031c14ca241b9bd6af1fa0ff4dfea62691b142dc665824a6a75452e8a16c872fe0aec62d95368b7335d2e0c491e65a4409b08d13447f967773f214ebc43d37e0b28a794d75eff937ddb42744ead4cc76598b6202db488cb764b3be876326d6c8943cec869d3785cd4cdb054f7010c6fc16ec60741f9d37f8186bf54ad05cf30b6e5c41e6a1069b0f3f770ce581a663b45813d7016b510aeba44990196fba85739879a7793bacd6662434499d0c2c0fb7000f6c00223ad367e71dba1ac9838c0a52677c36e3b9043abb061386096e40cbb94b9cfc480586aa23b52371641e3f21c653991fc05cdd392dfbfbd45c8d847c3623ad0d0632a69e5dee4a55c006cead2decfdd244327eaac8bb65b25647f41035e41546cea7416135e90af0787e0a650b499f9b59329fb6df80edcdb832331a31f719bd2b50c246899464101c156cad53bc964b4c22da01c8c3837c626efe2dde8b413dc3bf15853aa3c192547067d31c07d462119c5cbb28ba34d6a4960953a753e5f4753e6bc807f302b4c62e25fbaa3979955f2975a37341c0db38b3f5286a37006663bb3285b928a60e15dd56f1ab5899619c4b1d93cf2d454e7fb0c9a8c13a1cfdf40658561998df0fae9d65a841ac21eaa9a1c43fcd33de8d04adbf640c14f06bef3668d76890d95c7a3a1cf5879cfbab8c42460b0c8699cf4d2a06bf4b129be79949f1f56b243a2370a0301989053a346143cdd6f68127729fb277b563bf6033d42d396f18ad2a0a462cda4793bb3379e6d7c4bac7bae10e64311b25035dbf101baca652580dc7d31bfbe9b5f05c1890cc7b5a2cb955bd35374a44d61e1925e74022107a11bbcc7051e58c0149f35565585e95c4a5dba30e90fb97f8855ee43aba364203107ba3d5422bc5e9026e807b2a01b2a09be7b7939a20732eab384dbd15f6a0e895882d85197093a8b3e38476555cf20f3ae06c90e2e253b07c0d5a75a9290382478db5a97555785de4adc1ba3479d3a5321fe84f1f74997b94a2204088e199dcabc27dafe9f7b92dc04dfb91728a45a84f74755b03deee75095e9d66fd972eea549da00989d39d9f38f38cd6946faf1529b5c2475080573029f5065d6f35aab5f4b09cf0f62cbdc91ddff643ecd867f5752b33347887f794932fb87b7f6d82e76fea2b452da452e2799d7d806cf9e5d34d53e224619f771fd99e691fc3731ab81b03aa7e3b05f772c21bec6a19becdd836776d22b746f5c1e65e3a230d9abfcaaeafcc1b8d9b61a34224fa3d6d5aed2184fd485c087645f7e11b2caccced473b35fff8d4a907cec6eb428399e0eff869ac190590f3179d7233f42147356be22db3fb73c1014ab66fb7506f6c1106e52c3d7b63593f7ea920b1c9a236f99f41da9834d3ae7e457043b50e378069fe850d1e6c9eb662df1f2365c1b45f4ca510ffd0f5828b3859d099cda3c03ab21a2bfd189aeb1fb9527b5ed955f080ddecc5c9ae09c570e4b52999dd4ae0afff337578e9d33ea09eb590c9de0d4be67a55b0cf854f87ae6e957d7f318edb44bec5798f6e09ba796f33639ef4148416c95dee51f8887653c491b9012414d3cb629049103a42764a31b3bb5b32234ec097532de5856181b44e928d887d19d821fbd15486858fbe314da8c06401023515ea13ac452f4bd16357f12c3554f9acf82726190090f2342f1eeedeede01029c3bcf06a0924798957757f19e666895a79a5cb308708560a03bd99423bce9c8b2aa35409f5a7e051a6840568ab8e3145cd38ab40dcc250c86dcff1731b7b02cc4c770ae61a964cf1b827f688d307e9380abc3fb54ae03d86656e8c0a4ca728186a64b59d728bcd44617531b05f0c9a0f24f9b092f7e89658e4e57d31be3bfe8b68919910203b6782289857e35017da9fbd70bffd0044fbab8b8d5c0a86ddcef5d8dcecb0ce2c0e12444c0dd39c9180eb198579731807bacfc6d31cc2e2f62a7242010d453ec1d7326c76ee7cd83b28673b99fe49a310b995fa3c462720b83595578e7db8c471b1d5ecd5a08b3a017f82a20ecfe7fa9911703203cf1005d4be186f6b41df35043b7170351560a109cc7a438289c9a180929b409d6b410045a0ad67146595de37d572979e1e3d8560c9daf98490768df3ef3c5a1dc9fd49c6badd11ba7fe675dcba2471759db75f5dff9cac3c6f7493339bdce5d0c569bcc728306d759e6c684553ff88af24fbc29d17952a704ae1daeeef2683e01f516129aed108c43a8a2b2cbb44d72956c0e7cc727ef56616a72f8cd91de508b87a4812cc39eb6380bfcef5c787e4e55df6d7299e09a7f308eac869182ecb97c76bacf18101c8054b422121cc2bb47cfdb59f2dd6da717676852e11ff78d02206b75ae6860ee19149cecff398680490b9c658af947a541c080d27cd2c2a4420393e7f4f86964c00fd21df82106435c4bcd0351aa78a7bffb55219777a86a223f07192c5588c1297b06f4e020247ead22af4be191ec1a83869ec1b6df606bf405f823e8795dec40c31d5a5d9c453944b49ff514373b30538d480776810ea435f548b986f87c3599ca678990cbcf25165eaacd04621a2d638a52675bf4f57bc21f260ca5e2842387e7a3f89bb4095ab8948cae0936e7b09b304174d7bf42913c89d713cea99bff6004d313d7b7e9245dc908b81324ad6f52b18caa00c7c2cf570efaa9d0042086d5c907a7596ad79a4fd4827784701a6fa7997422ab77ab11131aebbf09db83f6c0b8796c095932710270557cf3585447fa18f4912ca9e24f6609a40a326a46c5740cdd63935e0717752f3d6cf003a9f1cc67315299a52d63851869fc7608cea8b8845f313f1aae6fc90a0c9acba2d942610e053800898fc8331f94bacf4ae755026f12d5dcc42e2dc5fcb9984be0a38ed94f42b6eb749f757645c4ed4105ce21f47170984b2d9811f58bff59464eaca45e36547f92ba8fd8fbca7eaf271f388b63cce835d4b32e7f6da5e77c1933822c7c8f5073379f89ab3748692919b708036899a7af308a0669fb180fccf3b8645fc6575e165d85764620b464d52a962b84c94978010f30b04dc1a6cb147b5956d78b73e6b6964bd3159c34ea95027190a6a3504c26fe6fc52db67f29588631caea683b2b6239ab3792fc9a24e6a9b6e71a700615e3fd95182095357726a42304b5f5f2b96405164ac093fbe9fc8510203a567089537f6c50653350625cc9e3afe60010e740412697a080348fbaf33c90e256fdeaf4619719c8c3df751fa406e0292593318fb8af68702169e4be90b545638eab5d3ae7e1b7ebb143591697b9ad7e2d4993180fe387ba410ca52baecf1fc61f552b44afb7393d0bab0660310339cc11f28e9f15351f127565d9dfe5772fc2ef89e9ae1f7cd8ce5fc74d8d6054e76b80a0911e204f2e4c6f33c196c56fedfe2a2de0eed22cba9ca4cb71693744c39f0f2ba0d405f4bc726ce7a361070f7cdecf2f7c726a9fa69baa28e2f3cbfa223be6f4d513e630f0f1a79d92e7f212312aef4b4ef31a22cf955c0542480b471649cc0ca016abc0647f3f8fef572ac4a9da8f0d9a02cedcb08a9516636e7c9f7fc7d3daa334db2a7d63801f1f7c285dea609e898ce0a983a79a20e5a1730357849b0b5b9f07ae53d67fd277d9b789fadc5435f306d4ddbfb6edaf6ec6e4c24aa701cab00df6d005553d041b3fcf1f565256027c7ad222be4350c44d9760de880170d4249d3bde3f8f6c4c9055d5ab28683c2b24d85b634362e51f2f0e15c088f609022230d512bee24f0424b48e832e76dbdd0148dc4bb85123c86e8d17d572144c248ead73a961f5a667137aa8787fd0275bf751758724741a285463cca4892be96e1fa2a411e44addd413520caad3fd9ac58e94059dfc9aec19b76a86a06671f7723d519c889078f049b0da7cee36cbef83440dbf575c0e2615faa45aa081ac355e75b4305ea1e24ccf8fbb75d00d46232810019194904833e2a977a5ade338429bb9ebc69bd116a42455dc4b29ea620491113f9cacc6846bb549ae7dda9eb0d256ef670beb28704ad9896b5bf4e2750d8254137d53307a989d6667f9a2cf3c6266e9bccbf8ba6ed38544089aad6f6a687ebf18fec2e7f8533bc1b009ec8b519ddf6ca4810acbc3944f03ed9ecb15fc74a46f6d18c6daaa93825d3b4c4830aca425702958bfd372a2207d8a3bd6f54833915fd35d3ad29ef1517d73ababa23be229da9676baa646e97ff2345933c45c1b6347cdc210eab2aa952190b251924f8e4b66acc454cc390a2fdb4e3ff68e549c25632c33b9333d1dcbcb2a11c1a1d5db0b342803b403de6b1dc96bab6a1d606b64caf82ecff53d9c75a273876002492d17fd33f7d29591ffc1759169c7ef0e279deabd05e96b7672a9769de79240343e014137db5d0135b3fb9490d94284693fdfe0f235d8aba315613ce7d7fb74ba58d82588eea7d0a3fab7bce290479d3fcafbf3da564fa0548fc926b70be231fa75c41dc6c752a967cacb157949f4b8ef8790d6318230b1b962f315e8afd97217c734b2664d2e2c17aeaec22c5a92aa86af1090425c07032436ffc7ee58c3e8761c583e8ba18cba3eeb91a7531ed413ee6706f235f9ba1d9b56187e17f4d229cd6e4da42cd0710339c6cf49a023e0c86e2c8f8432f88ca5e00168bcf323a21aca891ad2d6c595bee994313663a28191d931d26ca9af28282df6bf718610249606ce7b077f0a030ac311bfd7af2e6b5dad0ebbbc02c1e46d81aba73c0c31c039d68064ef8735a6626bc03383f37c2e5e2fb7721ef08f375b375bbe9fff315aeeb9c7b5942140d7caf862951ca2c7e531a7e268d9b72d7ee01486a42f5290738fdfdb84e7ba7637664488e59571e0f654369b9703ba738dd7051d14799353d8b59b3676f7d22caab10c82ec5e61ed924e8f9a2b483fc97da8b4b51516bbdf19cf1cfd98dd5c4b1665e6b98af8528bc82e50f4db712d5e99850d7aad51b13faa25a1bdc3ab7330c57da1ea69f61ce30ade9e71ddaacce3bb1b96bc23fa95f8548d7c839ca8ecf2cbff48107ee2f8da28fa4e6bd8fe3001a834b03b11a4e21f54cd73f30c68d364556f01adf8e3cab9d480a17a1638c99ff4c5b558434089f0b0aadbe8656870579e2d77a186f56c02c024c60be391234078d370278b5da5b51df4392aeb9a22a49305c645152a3b695ebb5a1e92adb2f13615676e15189412da2e6ebfdf9cc189c300dfe5fc35991a7f81b76db631ed93d1bdd8fe0f738d04312a8247dccedf0774b39b00b1a542d5d841f56b27792dbac85dd67dcfd4266d525ca757cfa436d79a21937c61f7a7036c499a08e17333abfb6af5afe041f444bdc2a42512a2388ff8015fd880169bb5f899bd4294052db3f27ee094f042a5e66522a5c33433f7fb0fc2ba457e40552892eb3c9d23eef4f3f5f03637d85d3bbcc29f16a69a649fcccbe71041e264c3c62333247ae542629d71e0c52a2c00e8acd3a1eeef1e33194a932e8c74a1f3747ac92ec76b7ca850fd0d8e3ed05e7a291e1d8abde0deca56c8ff6277a16dfef02746f7360b9795495accb10c85c6ab3a6fff6589c52601b7c5fc09371745b4370f60773d2a7be26eb5f74", 0x1000}, {&(0x7f0000001080)="1f877695446122c5d4d7793f63d7e0c71f2ffab6250e20456cd5e1662ac1f4990b0e69dc48209aaff48ba0575b0b07b8a729c1b9efa3f003186d1b5b7bea8479bc4882a934c251ee09be97b023ff3db455222ea98f45e3b28cd15b6570d2e6442137a746b83c0243a6631d8750ef1cce36", 0x71}, {&(0x7f0000001100)="4e4ccc11b63fd7593c477df5c3a2f6ef7afd8c56a803a0b59eca9b1303ae8f3eb1393e217c7b33941c951bd93a3a46debd4f0f8166883281b23cb2f2038f3e38b7223cc99eb16c45639dab06f37ebd8f835b26404599b1cfc559eadb3574442086bf696df0edc0efdaf9d8956500e54f4baea32646b09aeb9de6ef56981650ef0a0dfa", 0x83}, {&(0x7f00000011c0)="1ac8bb1517a67dfa4e7aa4c5fa282fc4a0cd36ef6337c7dfb379e2a5205bd808df0777665096a17b81daf9b8bddae8971e11c28f12463dc1a45591ea09c48a239f02aed2ec5842e856649fdba0ead030094c68794a47d34def7ac4ab9db50de3fbb38db3df35ec26654151b3c2b0a07c49a79e20dd01984f942c650fef79d68110a264b7cc19119cf8294dc4c8c75423b97973730e9c6f34d8bb891a8ba48ae2c25765f9c89f3247fa6b68f48a6945047bb4aa1a1e1d43f599d079917950d442c85a6fbc8cb71c61f59062145580081d62697107f58f0b4607eb434c2d643095d911d229d770aff0406e11f0280fb7ecb97e61df18ffe1a163", 0xf9}], 0x4, 0x0, 0x0, 0x41000}}, {{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000001300)="73a34cb1826036dec4a7e0671a7dc4ad3e9578b024f54ad959c18c24c0b20c004497d52ef27c2f86a4eff04d5971362e7d", 0x31}, {&(0x7f0000001340)="8beb7df9e4c09aae2e3d6ae007835f961f46489bb2de5ed772835f11bb907e9730ea", 0x22}, {&(0x7f0000001380)="e334dce671718c86235f8a6e7aff65e7dc8b4f72f92f8681e3746892bae810022cdd4cffbfe40576d96cae6b707343d356e7cc3dc7e034707f3564f7edcae5f1dd0d7ddb0995622292", 0x49}, {&(0x7f0000001400)="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", 0x1000}, {&(0x7f0000002400)="ef38a9e944b8ab6ef6dd592ae2a9b739476a9b950b0383002545f7c6d30b2fa862be92102093129b4c70fbd2a7176116894663d2da8351e37cc8454c0db8203fbd54e0f9bd2a6b83dd1213a830c1088c9df27662ea2b916e247462dd0f234a8779bb3b0d2f8b7e1ba9f4ba404f51acc241d12cc085346e436bcbb72c3f255ef32716ada46cdd270f03bac5884ec5dae22cef9f9aff378fcfd6ff3486d53e5a4154d34dad8bf9d3e4b4f306a51fa4b8b8acaf99966756a779", 0xb8}, {&(0x7f00000024c0)="f0a080ea01adbf6c68ace2e3f903a218bca5b8f4024870870f27bc94279d6d77f856113ecf2765a99ae8647cb8db750d95d70d4312cd2f3bcfe3778838954c8414324a6aa9c60663de3399585f63542b14cceb3bce623fdeed7ca175ba3aaf78914777cbe38fafb085d2911a262398adc4596ecc728c8beb8bea7f5b9b070f4a507a2311cf0f85eb7de7", 0x8a}], 0x6, &(0x7f0000002600)=ANY=[@ANYBLOB="9f55195000e1ff00", @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32], 0x30, 0x20008000}}, {{&(0x7f0000002640)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000002740)=[{&(0x7f00000026c0)="95df7e6bd6195168cbdd7899e86f8d99aba3212ba6882ce6f0d66914ab13f55a29fe5514f9d1bdbe988703f622fa4c51ea5d9cfa1536caffffc3c1d949dbc32ff73331bf63ec30a5d0b1f0501a417438b5b28564bb4827cb67f94d5f40ec665b966c", 0x62}], 0x1, 0x0, 0x0, 0x4000000}}, {{&(0x7f0000002780)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003d40)=[{&(0x7f0000002800)="92b65638189c2ff3bb3528fb309dd404ec21b03d9b869f1fa4e8d422e0e52f132f2b003927c174eabde3a41329c2726df57f3a5bf5c2e3959a581e03bbc4ba64bbe620fd2166ca3c2a6bd4f514659011919546a2524d21f9ce04ba9268d9e7b4e4de7242b750a6858b58d97242c89413f369dac6855ac8364213736228da2584a4a496c0e772616e080a60550ae7f1328e7ee3639a738a2c2eae05da5013ee7b68f212", 0xa3}, {&(0x7f00000028c0)="6cc0711573e86e385ea86ca445b763d1d67f79373c11fd44bbda4a5b8bfd65e14d8bba765fc0790938815278bbfecf09d559dfd9ebee710eb498f2e7a1deb0d64fafb7a48069b2a3e1a61bf27ea7f1cc1d13755e5032193bff7b823b0fca94a3098df6df0a34492b69c2e5e789a4e6a39602d8", 0x73}, {&(0x7f0000002940)="a150428dbd98d149d403dd4798bd7a5f1381661915dceb6ca2d4a357e3c186bdcfcf7b666f3eefc16b1d7e78bc38", 0x2e}, {&(0x7f0000002980)="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", 0xfb}, {&(0x7f0000002a80)="73f7716e8a869a37939369448883bcfb1bc163b568af8a1b6567c6fd867c1d02127e5ef15ff6d49c60081156699206863024d6ae537d5ee50d9795d5a7e38902d6c7f97ca84f1cb19e7b979696960f7f7e", 0x51}, {&(0x7f0000002b00)="0dd7883176ad10f52ee86920b873aa75e753ebbd5c1b107ec1ea82c72629127f1bddbdb92f4e65b70ab06b3cf321c1cc6641264fc5b69023e80688e45f0eb34e53bc9d2e9464bebff13d076dc45997af7dd388869d818015cae5f499a76ab306c8107611a9ae33e0d5ffce4334e46ee33d6bdca8c06429843bb07985b1a9e7c54319a007a3e63a1aaad2d714f50e820148e17ca7786cc21a469fe5fa12f7462673d0fe4d39f8b3c42eba7cb5f682fc02c424ffb61b17caa2af5e3e826baef7ecf1c69565cc379df73b678ef145472a259b4f392e", 0xd4}, {&(0x7f0000002c00)="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", 0xfd}, {&(0x7f0000002d00)="f96f8ee3933ac53d93e743f89d1cc370c2c4e2968edd30e3a9491d80ea8285dbfb553a6beb81f5", 0x27}, {&(0x7f0000002d40)="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", 0x1000}], 0x9, &(0x7f0000003e80)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}], 0x38, 0x4044001}}, {{&(0x7f0000003ec0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000004200)=[{&(0x7f0000003f40)="2222c23c14117c", 0x7}, {&(0x7f0000003f80)="449a508efeff52476dbb6aa2e8d195592f4c3b64787adcfe30b4b8a2b7e3a3c1d7399687a199", 0x26}, {&(0x7f0000003fc0)="4deeef466e3da93afe12b57d5a0674ee025f9e035f53f64c5469a5ddc7c0", 0x1e}, {&(0x7f0000004000)="826c4cf22c540c600cf920b429e66b66bbc47785ab7a98de8798a5ae5cec7f4678a0be80eb4f6a12b581d39246554a3478e70d093641a04cc812b256554391ac14496b44d274f3ea4190b6e1d670c658f63bc5f3f7cccfb61f21d93f35a1823ab10831cf2ad05e5b15739dfdc37b2843a3cd152420c1845660081c54f253289d3964ccd2e0b05371971202904707cfd6e0ca735dc99f227b6c150c0b67f73ecc5932ec27010a35d357e85b1e8d3d4b09894294af63a011c5cc41e8d7af59ad0aa9cce614443fa1da8bda23f4e686319cbb9840f4fe52a48a3bf5dbf3e40558", 0xdf}, {&(0x7f0000004100)="a29816ed69fcfafa534506741e82bb16b9b5197bee109bb02808374d58b61a2ca651aeb6e51466d8ac73e2cf2d307adcfb537e359c5676c73b9d942d41f191a03c5326dff1cb2c6e6f5bf82bbe5e13ea163fa53e53b644f77b4e3e081c586b75be297c91bc16eff952bdb496e42c16b9397d3e9488db803da3d049e7c962ecb3a25fb6e2797c5607fd4409ed994504c4d229a3165a10975ea8f8ffd5dbf63008310761b755dae8a4a0497e901bda7cb0c05e1ffd4c498563197468ce2a96fcf7d4c8db", 0xc3}], 0x5, &(0x7f0000005bc0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, r2}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, r10, r12}}}], 0x80, 0x24028810}}], 0x5, 0x8040) [ 1882.343993][T17681] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1882.400715][T17683] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1882.519780][T17689] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:34:42 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6c00, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1883.037463][T17708] device veth2377 entered promiscuous mode 18:34:42 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x7400, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:42 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2010000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1883.203492][T17708] device bridge1036 entered promiscuous mode [ 1883.267115][T17708] hsr661: Slave A (veth2377) is not up; please bring it up to get a fully working HSR network [ 1883.309558][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr661: link becomes ready 18:34:43 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x12, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:43 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xff7f0000, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:34:43 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x7a00, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1883.934271][T17763] __nla_validate_parse: 2 callbacks suppressed [ 1883.934292][T17763] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1884.187525][T17764] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1884.308416][T17765] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:34:44 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3f00000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1884.610695][T17771] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1884.793032][T17770] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:34:44 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb100, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1884.965624][T17767] device veth1391 entered promiscuous mode [ 1885.045085][T17767] device bridge810 entered promiscuous mode [ 1885.114432][T17767] debugfs: Directory 'hsr571' with parent 'hsr' already present! [ 1885.122649][T17767] Cannot create hsr debugfs directory [ 1885.146278][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr571: link becomes ready [ 1885.199631][T17792] device veth2379 entered promiscuous mode [ 1885.275554][T17792] device bridge1037 entered promiscuous mode [ 1885.318021][T17792] hsr662: Slave A (veth2379) is not up; please bring it up to get a fully working HSR network [ 1885.351960][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr662: link becomes ready [ 1885.365951][T17764] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 18:34:45 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb200, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:45 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xffff0300, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1885.869273][T17851] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1886.005007][T17858] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1886.309651][T17869] device veth1393 entered promiscuous mode [ 1886.403437][T17869] device bridge812 entered promiscuous mode [ 1886.423943][T17869] debugfs: Directory 'hsr572' with parent 'hsr' already present! [ 1886.432089][T17869] Cannot create hsr debugfs directory [ 1886.450006][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr572: link becomes ready [ 1887.605527][T17884] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 18:34:47 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:47 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x1c, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:47 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb300, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:47 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x4400000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:47 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xffffa888, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:34:47 executing program 1: openat$audio1(0xffffffffffffff9c, &(0x7f0000000040), 0x40100, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, &(0x7f0000000000)={0x8, 'macvlan0\x00', {'veth1\x00'}, 0x7fff}) [ 1888.081623][T17894] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:34:48 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xedc0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1888.601813][T17919] device veth2381 entered promiscuous mode [ 1888.638357][T17919] device bridge1038 entered promiscuous mode [ 1888.669095][T17919] hsr663: Slave A (veth2381) is not up; please bring it up to get a fully working HSR network [ 1888.724209][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr663: link becomes ready [ 1889.093213][T17902] device veth1395 entered promiscuous mode 18:34:48 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x4800000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:48 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xff00, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:48 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x2e, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1889.292497][T17902] device bridge813 entered promiscuous mode [ 1889.445202][T17902] debugfs: Directory 'hsr573' with parent 'hsr' already present! [ 1889.453362][T17902] Cannot create hsr debugfs directory [ 1889.474896][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr573: link becomes ready [ 1889.503646][T17897] __nla_validate_parse: 3 callbacks suppressed [ 1889.503730][T17897] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1889.520909][T17901] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1889.790197][T17985] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:34:49 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xffffe000, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:34:49 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xff0f, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1890.007705][T17990] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1890.443826][T17991] device veth2383 entered promiscuous mode [ 1890.632754][T17991] device bridge1039 entered promiscuous mode [ 1890.717101][T18008] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1890.831036][T18009] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1891.047995][T18016] device veth1397 entered promiscuous mode [ 1891.084560][T18016] device bridge814 entered promiscuous mode [ 1891.134214][T18016] debugfs: Directory 'hsr574' with parent 'hsr' already present! [ 1891.142207][T18016] Cannot create hsr debugfs directory [ 1891.177847][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr664: link becomes ready [ 1891.220184][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr574: link becomes ready [ 1891.643141][T18039] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 18:34:52 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:52 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x400000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:52 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x4c00000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:52 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xfffff000, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:34:52 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x48, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:52 executing program 1: setpriority(0x2, 0x0, 0x1) [ 1892.668877][T18052] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1892.731268][T18053] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1892.812974][T18054] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1892.876118][T18063] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1893.242562][T18075] device veth1399 entered promiscuous mode [ 1893.297128][T18054] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1893.442514][T18075] device bridge815 entered promiscuous mode [ 1893.475528][T18075] debugfs: Directory 'hsr575' with parent 'hsr' already present! [ 1893.483782][T18075] Cannot create hsr debugfs directory [ 1893.490188][T18075] hsr575: Slave A (veth1399) is not up; please bring it up to get a fully working HSR network [ 1893.515696][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr575: link becomes ready 18:34:53 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x6000000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:53 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x1000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1893.816873][T18062] device veth2385 entered promiscuous mode [ 1893.965671][T18062] device bridge1040 entered promiscuous mode [ 1894.120855][T18117] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1894.121652][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr665: link becomes ready 18:34:54 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x4a, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:54 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:54 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xffffff7f, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1894.798142][T18135] __nla_validate_parse: 4 callbacks suppressed [ 1894.798163][T18135] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1894.886026][T18136] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1895.035373][T18140] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:34:54 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x6800000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1895.189610][T18136] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1895.550243][T18145] device veth2387 entered promiscuous mode [ 1895.645120][T18145] device bridge1041 entered promiscuous mode [ 1895.693321][T18147] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1895.805890][T18166] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1896.062087][T18170] device veth1401 entered promiscuous mode [ 1896.120798][T18170] device bridge817 entered promiscuous mode [ 1896.217129][T18170] debugfs: Directory 'hsr576' with parent 'hsr' already present! [ 1896.225177][T18170] Cannot create hsr debugfs directory [ 1896.337756][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr666: link becomes ready [ 1896.390166][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr576: link becomes ready [ 1896.411187][T18172] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1896.421039][T18192] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1896.695408][T18202] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1896.811275][T18209] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:34:56 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:56 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x3000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:56 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x6c00000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:34:56 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x4c, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:56 executing program 1: r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket(0x1d, 0x2, 0x6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) r3 = socket(0x1d, 0x2, 0x6) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x4) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f0000000100)={0x22c, r0, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0x4}}, {{0x8, 0x1, r4}, {0x1b8, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}]}, 0x22c}, 0x1, 0x0, 0x0, 0x24004080}, 0x8094) setpriority(0x2, 0x0, 0xfffffffffffffffd) 18:34:56 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xffffff9e, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1897.390104][T18238] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1897.455574][T18239] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1897.580227][T18241] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1897.903618][T18241] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1897.928619][T18265] device veth2389 entered promiscuous mode [ 1897.993708][T18265] device bridge1042 entered promiscuous mode 18:34:57 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1898.083679][T18266] device veth1403 entered promiscuous mode [ 1898.240761][T18266] device bridge818 entered promiscuous mode 18:34:57 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x60, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:34:57 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x7400000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1898.361588][T18266] debugfs: Directory 'hsr577' with parent 'hsr' already present! [ 1898.369672][T18266] Cannot create hsr debugfs directory [ 1898.432841][T18303] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1898.462299][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr667: link becomes ready [ 1898.485427][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr577: link becomes ready [ 1898.656895][T18303] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:34:59 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xffffffc3, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:34:59 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x5000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1899.647520][T18332] device veth2391 entered promiscuous mode [ 1899.681330][T18332] device bridge1043 entered promiscuous mode 18:34:59 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x7a00000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1899.810026][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr668: link becomes ready [ 1899.831808][T18374] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1899.842647][T18334] __nla_validate_parse: 6 callbacks suppressed [ 1899.842714][T18334] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1899.860891][T18339] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1900.006007][T18374] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1900.043799][T18359] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1900.231097][T18368] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1900.436121][T18372] device veth1405 entered promiscuous mode [ 1900.662015][T18372] device bridge819 entered promiscuous mode [ 1900.686678][T18372] debugfs: Directory 'hsr578' with parent 'hsr' already present! [ 1900.695313][T18372] Cannot create hsr debugfs directory [ 1900.750552][T18337] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1901.092702][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr578: link becomes ready [ 1901.114014][T18338] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:35:01 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:01 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x68, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:01 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:01 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x8000000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:01 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xffffffe4, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:35:01 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) ptrace$getenv(0x4201, 0x0, 0x800, &(0x7f0000000000)) r0 = gettid() r1 = getpgrp(r0) syz_open_procfs$userns(r1, &(0x7f0000000200)) sched_setattr(r0, &(0x7f0000000100)={0x38, 0x0, 0xa, 0x1815, 0x7, 0x76fdfea2, 0x8, 0x0, 0x7fff, 0x1}, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) move_pages(r2, 0x4, &(0x7f0000000040)=[&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil], &(0x7f0000000080)=[0x80000001], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x4) [ 1901.766061][T18453] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1902.034990][T18457] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1902.116022][T18461] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1903.533066][T18456] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 18:35:03 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x7000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:03 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x8001000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1903.687196][T18453] device veth2393 entered promiscuous mode [ 1903.838593][T18453] device bridge1044 entered promiscuous mode [ 1903.983423][T18482] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1904.009228][T18519] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1904.244855][T18519] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1904.315186][T18485] device veth2395 entered promiscuous mode [ 1904.378220][T18485] device veth2395 left promiscuous mode 18:35:04 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x8000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1904.588363][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr669: link becomes ready 18:35:04 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xfffffff0, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:35:04 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x6c, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1904.949267][T18569] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:35:04 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x8cffffff00000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1905.047723][T18574] __nla_validate_parse: 4 callbacks suppressed [ 1905.047761][T18574] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1905.339491][T18579] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1905.463023][T18569] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue [ 1905.544104][T18592] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1905.899183][T18599] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1906.116217][T18600] device veth2397 entered promiscuous mode [ 1906.201563][T18600] device bridge1045 entered promiscuous mode [ 1906.270981][T32260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr670: link becomes ready 18:35:06 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:06 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xfffffffe, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:35:06 executing program 1: ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0x8, 0x6, 0x1, 0x800, 0x4}}) setpriority(0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') 18:35:06 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x9000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:06 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xca00000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:06 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x74, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1906.684265][T18629] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1906.863997][T18630] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1906.987396][T18634] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1907.085057][T18635] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1907.302144][T18638] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1907.443724][T18635] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1907.484215][T18646] device veth2399 entered promiscuous mode [ 1907.619166][T18646] device bridge1046 entered promiscuous mode [ 1907.753815][T18643] device veth1409 entered promiscuous mode 18:35:07 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xda03000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:07 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xa000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1907.820055][T18643] device bridge822 entered promiscuous mode [ 1907.891792][T18643] debugfs: Directory 'hsr579' with parent 'hsr' already present! [ 1907.899607][T18643] Cannot create hsr debugfs directory [ 1907.916015][T18629] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1907.944496][T18649] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1908.152999][T18708] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:35:07 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x7a, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1908.428982][T18708] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1908.476729][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr671: link becomes ready [ 1908.490310][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr579: link becomes ready 18:35:08 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:08 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xffffffff, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1909.035798][T18747] device veth2403 entered promiscuous mode [ 1909.057385][T18752] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1909.091252][T18747] device bridge1048 entered promiscuous mode 18:35:08 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xf6ffffff00000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1909.134245][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr672: link becomes ready [ 1909.412473][T18752] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1909.522634][T18764] device veth1411 entered promiscuous mode [ 1909.614622][T18764] device bridge823 entered promiscuous mode [ 1909.738435][T18764] debugfs: Directory 'hsr580' with parent 'hsr' already present! [ 1909.746602][T18764] Cannot create hsr debugfs directory [ 1909.786178][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr580: link becomes ready [ 1910.579835][T18799] __nla_validate_parse: 6 callbacks suppressed [ 1910.579872][T18799] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1910.760426][T18804] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:35:10 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:10 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x10000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:10 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:10 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r1, 0x8907, 0x0) fcntl$addseals(r1, 0x409, 0x6) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r2, 0xffffffffffff6a2d, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x2182, 0x1) setpriority(0x2, 0x0, 0xfffffffffffffffd) r3 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x3f, 0x100) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="4c00000008060001000000400000000003000002050001000700000009ec020073797a31000000000900020073797a31130000000500010007000000050001000700000005000100e1790000000000001764b64e27e6d4f29163730991bb5e2b9cb0b111bfab96d947de6bd8821522258349db948792b7928e8fd8216173fadc"], 0x4c}, 0x1, 0x0, 0x0, 0xc040}, 0x20000005) r4 = socket$inet_smc(0x2b, 0x1, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r5, 0x8907, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000300)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240)="1cd64fac023eae0e1f128556aea15ac4301a6c20cc6148d4debf4535eeb92d0d1611a4be3f20759663f2298ed9d741c059defb4ff4240fde0857276b39922f2dadd6bfaf0227bb5f1cd6eb6756d72515a146fa95bd702e3a70097a229b4cad5a0c6dc88a66d6e9480bee520f320cd9f986e197f8e4318c11bf88d23ea0a2a1db68ac3c4cf8410465c6c176e8cb", 0x8d, r5}, 0x68) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x20010, r4, 0x473ac000) 18:35:10 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:35:10 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xf9fdffff00000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1911.023154][T18823] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1911.087741][T18822] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1911.227239][T18826] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1911.293857][T18830] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1911.365682][T18822] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1911.463715][T18827] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:35:11 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x1f000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1911.787566][T18832] device veth1413 entered promiscuous mode [ 1911.857003][T18832] device bridge824 entered promiscuous mode [ 1912.023542][T18883] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1912.049010][T18832] debugfs: Directory 'hsr581' with parent 'hsr' already present! [ 1912.057610][T18832] Cannot create hsr debugfs directory [ 1912.089246][T18834] device veth2405 entered promiscuous mode 18:35:11 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfeffffff00000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1912.153822][T18834] device bridge1049 entered promiscuous mode [ 1912.287382][T18883] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1912.313829][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr581: link becomes ready [ 1912.325759][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr673: link becomes ready [ 1912.338282][T18826] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1912.367885][T18830] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:35:12 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1912.724003][T18914] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 18:35:12 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x2, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:12 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x20000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1913.004222][T18915] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1913.156055][T18916] device veth1415 entered promiscuous mode [ 1913.309067][T18916] device bridge825 entered promiscuous mode [ 1913.362702][T18943] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1913.384602][T18916] debugfs: Directory 'hsr582' with parent 'hsr' already present! [ 1913.392795][T18916] Cannot create hsr debugfs directory 18:35:13 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xff00000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1913.888290][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr582: link becomes ready [ 1914.003439][T18943] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1914.099000][T18942] device veth2409 entered promiscuous mode [ 1914.124710][ T1229] ieee802154 phy0 wpan0: encryption failed: -22 [ 1914.135544][ T1229] ieee802154 phy1 wpan1: encryption failed: -22 [ 1914.217750][T18942] device bridge1051 entered promiscuous mode [ 1914.259432][T18942] hsr674: Slave A (veth2409) is not up; please bring it up to get a fully working HSR network [ 1914.286996][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr674: link becomes ready 18:35:15 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:15 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:35:15 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x3, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:15 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x20100000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:15 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xff0f000000000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:15 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') r1 = getpid() socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcb%H\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') flock(r2, 0xb) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f00000000c0)=0x0, &(0x7f0000000100)=0x4) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001600040027bd7000fbdbdf250a2010ff", @ANYRES32=r3, @ANYBLOB="1400d9509cf6050300f706000200000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x408c4}, 0x4008004) ptrace$getenv(0x4201, r1, 0x80df, &(0x7f0000000000)) [ 1916.094771][T19007] __nla_validate_parse: 4 callbacks suppressed [ 1916.094822][T19007] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1916.231130][T19019] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:35:15 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x31000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1916.543780][T19008] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1916.670161][T19029] device veth2411 entered promiscuous mode [ 1916.728156][T19038] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1916.762859][T19029] device bridge1052 entered promiscuous mode [ 1916.808777][T19017] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1916.952900][T19038] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:35:16 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x4, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1917.135424][T19034] device veth1417 entered promiscuous mode [ 1917.172548][T19034] device bridge826 entered promiscuous mode 18:35:16 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff7f00000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1917.221591][T19034] debugfs: Directory 'hsr583' with parent 'hsr' already present! [ 1917.229697][T19034] Cannot create hsr debugfs directory 18:35:16 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x3f000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1917.282248][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr675: link becomes ready [ 1917.395703][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr583: link becomes ready [ 1917.413301][T19036] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1917.424985][T19073] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1917.771030][T19084] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1917.775929][T19102] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1917.916535][T19085] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:35:17 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x4, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1918.061417][T19102] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1918.291617][T19124] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1918.301879][T19084] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:35:17 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x48000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1918.625203][T19125] device veth2413 entered promiscuous mode [ 1918.733249][T19125] device bridge1053 entered promiscuous mode [ 1918.813069][T19161] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1918.856334][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr676: link becomes ready [ 1919.104473][T19161] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1919.213115][T19150] device veth1419 entered promiscuous mode [ 1919.279243][T19150] device bridge827 entered promiscuous mode [ 1919.315100][T19150] debugfs: Directory 'hsr584' with parent 'hsr' already present! [ 1919.323330][T19150] Cannot create hsr debugfs directory [ 1920.130463][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr584: link becomes ready 18:35:19 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:19 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffff00000000, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:19 executing program 1: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)) io_uring_enter(r0, 0x3d, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f00000000c0)={0xffffff00, 0x0, &(0x7f0000000080)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x2) r1 = syz_open_dev$dri(&(0x7f00000001c0), 0xffffffffffffffff, 0x109000) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000100)={0x1f, 0x5, 0x6}) ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(r1, 0xc00464be, &(0x7f0000000040)) setpriority(0x2, 0xffffffffffffffff, 0xfffffffffffffffd) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r2, 0x8907, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000000)) 18:35:19 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x5, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:19 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4c000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:19 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x5, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1920.535686][T19218] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:35:20 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x60000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1921.023032][T19240] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:35:20 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1921.373147][T19224] device veth1421 entered promiscuous mode [ 1921.429446][T19240] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1921.467202][T19224] device bridge828 entered promiscuous mode 18:35:21 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x6, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1921.571471][T19224] debugfs: Directory 'hsr585' with parent 'hsr' already present! [ 1921.571501][T19224] Cannot create hsr debugfs directory [ 1921.595963][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr585: link becomes ready [ 1921.607724][T19217] __nla_validate_parse: 8 callbacks suppressed [ 1921.607743][T19217] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1921.641395][T19259] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:35:21 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x68000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1921.889636][T19285] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1921.933924][T19294] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1921.944716][T19293] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1922.277037][T19301] device veth2417 entered promiscuous mode [ 1922.344048][T19294] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1922.428319][T19301] device bridge1054 entered promiscuous mode 18:35:22 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6c000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1922.527498][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr677: link becomes ready 18:35:22 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1922.633070][T19293] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1922.892810][T19330] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1922.940718][T19336] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1923.102033][T19339] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1923.138748][T19330] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1923.368983][T19352] device veth1423 entered promiscuous mode [ 1923.443515][T19352] device bridge830 entered promiscuous mode [ 1923.481626][T19352] debugfs: Directory 'hsr586' with parent 'hsr' already present! [ 1923.489980][T19352] Cannot create hsr debugfs directory [ 1923.520745][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr586: link becomes ready [ 1923.556229][T19368] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1924.149128][T19368] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:35:24 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:24 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x7, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:24 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:24 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x74000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:24 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:35:24 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r4 = gettid() r5 = getpid() rt_tgsigqueueinfo(r5, r4, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000080)={{0x1, r2, 0xffffffffffffffff, 0xee00, r3, 0xbf, 0x7}, 0x6, 0x5, 0x4, 0x7, 0xffffffffffffffff, r5}) [ 1924.825171][T19395] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1924.922260][T19398] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1925.049869][T19397] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1925.260476][T19395] device veth1425 entered promiscuous mode [ 1925.310067][T19397] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1925.333864][T19398] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1925.371628][T19395] device bridge831 entered promiscuous mode [ 1925.397114][T19395] debugfs: Directory 'hsr587' with parent 'hsr' already present! [ 1925.405940][T19395] Cannot create hsr debugfs directory 18:35:25 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x7a000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:25 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x3, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1925.729101][T19412] device veth2419 entered promiscuous mode [ 1925.861549][T19412] device bridge1055 entered promiscuous mode [ 1926.619319][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr587: link becomes ready 18:35:26 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x8, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1926.743342][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr678: link becomes ready [ 1926.755692][T19404] __nla_validate_parse: 3 callbacks suppressed [ 1926.755715][T19404] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1926.773543][T19411] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1926.824550][T19469] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1926.924825][T19473] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1927.046393][T19490] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:35:26 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:26 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x8, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1927.153014][T19473] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1927.321956][T19493] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:35:27 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x8cffffff, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1927.391893][T19506] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1927.486552][T19501] device veth2421 entered promiscuous mode [ 1927.569059][T19501] device bridge1056 entered promiscuous mode [ 1927.668133][T19506] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1927.691577][T19512] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1927.786506][T19520] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1928.309817][T19531] device veth1427 entered promiscuous mode [ 1928.348650][T19531] device bridge832 entered promiscuous mode [ 1928.378155][T19531] debugfs: Directory 'hsr588' with parent 'hsr' already present! [ 1928.386968][T19531] Cannot create hsr debugfs directory [ 1928.425515][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr679: link becomes ready [ 1928.489402][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr588: link becomes ready [ 1928.506127][T19534] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1928.542570][T19557] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1928.729888][T19560] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1928.809655][T19570] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:35:28 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:28 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x9, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:28 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x5, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:28 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb1000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:28 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) getgroups(0x7, &(0x7f0000000040)=[0xee01, 0xee01, 0xee01, 0xee00, 0xee00, 0x0, 0xee01]) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r2, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000080)={{0x3, 0xee01, r0, 0x0, r2, 0x0, 0x2}, 0x1, 0x6, 0x4719, 0x3, 0xffffffffffffffff, 0xffffffffffffffff, 0x9}) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') 18:35:28 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1929.299103][T19620] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:35:29 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb2000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1929.770688][T19620] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1929.821680][T19632] device veth1429 entered promiscuous mode [ 1929.864022][T19632] device bridge834 entered promiscuous mode [ 1929.877086][T19632] debugfs: Directory 'hsr589' with parent 'hsr' already present! [ 1929.899000][T19632] Cannot create hsr debugfs directory 18:35:29 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:29 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1930.221861][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr589: link becomes ready 18:35:30 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb3000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1930.404549][T19649] device veth2423 entered promiscuous mode [ 1930.431125][T19701] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1930.486707][T19649] device bridge1057 entered promiscuous mode [ 1930.550541][T19649] hsr680: Slave A (veth2423) is not up; please bring it up to get a fully working HSR network [ 1930.765414][T19678] device veth2425 entered promiscuous mode [ 1930.816966][T19701] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:35:30 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xc0ed0000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1930.903239][T19678] device veth2425 left promiscuous mode 18:35:30 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x7, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1931.138596][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr680: link becomes ready [ 1931.343202][T19765] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1931.411516][T19711] device veth1431 entered promiscuous mode [ 1931.435105][T19777] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1931.483875][T19711] device bridge835 entered promiscuous mode [ 1931.517846][T19765] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1931.555086][T19711] debugfs: Directory 'hsr590' with parent 'hsr' already present! [ 1931.563913][T19711] Cannot create hsr debugfs directory [ 1931.643418][T19777] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1931.773862][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr590: link becomes ready [ 1932.206611][T19810] __nla_validate_parse: 10 callbacks suppressed [ 1932.206668][T19810] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 18:35:32 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:32 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xf6ffffff, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:32 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xa, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:32 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x8, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:32 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0xc, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:35:32 executing program 1: ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) setpriority(0x2, 0x0, 0xfffffffffffffffd) getpid() r0 = gettid() r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r1, 0xffffffffffff6a2d, 0x0) r2 = gettid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000200)={{0x1, 0x1, 0x269, 0x1}, 0x5, 0x4, 0x0, r2, 0x1, 0x8, 'syz0\x00', &(0x7f0000000040)=['/dev/sg#\x00'], 0x9, '\x00', [0x7, 0x49, 0x3, 0x2]}) r4 = getpid() rt_tgsigqueueinfo(r4, r0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) r5 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) ioctl$SG_SET_DEBUG(r5, 0x227e, &(0x7f0000000000)=0x1) ptrace$setopts(0x4206, r4, 0x310d, 0x30) [ 1932.594855][T19822] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1933.008153][T19826] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1933.034447][T19830] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:35:32 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xf9fdffff, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1933.215306][T19823] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1933.289860][T19831] device veth2427 entered promiscuous mode [ 1933.323357][T19830] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1933.380153][T19831] device bridge1058 entered promiscuous mode [ 1933.562992][T19827] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:35:33 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x9, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:33 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xc, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1933.787663][T19838] device veth1433 entered promiscuous mode [ 1933.829297][T19838] device bridge836 entered promiscuous mode [ 1933.843925][T19838] debugfs: Directory 'hsr591' with parent 'hsr' already present! [ 1933.852142][T19838] Cannot create hsr debugfs directory [ 1933.924125][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr681: link becomes ready [ 1934.008682][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr591: link becomes ready [ 1934.021518][T19823] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1934.048262][T19874] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:35:33 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xfeffffff, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1934.115295][T19906] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1934.355695][T19920] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1934.357353][T19906] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1934.506075][T19927] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:35:34 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xa, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:34 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xff000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1935.117189][T19973] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1935.152394][T19934] device veth2429 entered promiscuous mode [ 1935.209423][T19934] device bridge1059 entered promiscuous mode [ 1935.269237][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr682: link becomes ready [ 1935.397916][T19973] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1935.566440][T19999] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 18:35:35 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:35 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xff0f0000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:35 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xe, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:35 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0xe, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:35:35 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:35 executing program 1: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcb%H\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') bind$netrom(r0, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @default, @default, @null, @bcast]}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) setpriority(0x2, 0x0, 0xfffffffffffffffd) [ 1936.403358][T20025] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1936.495456][T20034] device veth2431 entered promiscuous mode 18:35:36 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xfffffdf9, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1936.595870][T20025] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1936.695726][T20034] device bridge1060 entered promiscuous mode [ 1936.755680][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr683: link becomes ready [ 1937.256213][T20050] __nla_validate_parse: 3 callbacks suppressed [ 1937.256265][T20050] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:35:37 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x10, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:37 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x10, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1937.636159][T20055] device veth1435 entered promiscuous mode 18:35:37 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xffffff7f, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1937.720897][T20055] device bridge838 entered promiscuous mode [ 1937.779213][T20055] debugfs: Directory 'hsr592' with parent 'hsr' already present! [ 1937.787347][T20055] Cannot create hsr debugfs directory [ 1937.832796][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr592: link becomes ready [ 1937.844636][T20059] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1937.855517][T20079] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1937.996899][T20116] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:35:37 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xffffff8c, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1938.214023][T20114] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1938.267137][T20128] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:35:37 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x44, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1938.610301][T20176] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1938.671490][T20134] device veth2433 entered promiscuous mode [ 1938.791281][T20176] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1938.850621][T20134] device bridge1061 entered promiscuous mode [ 1938.923816][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr684: link becomes ready [ 1939.112463][T20193] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1939.622452][T20193] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:35:39 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:39 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x48, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:39 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xfffffff6, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:39 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x10, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:35:39 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) r1 = getpid() fcntl$lock(r0, 0x24, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x800, r1}) 18:35:39 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x12, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1940.548819][T20221] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1940.664450][T20223] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1940.804787][T20231] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:35:40 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xfffffffe, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1940.945524][T20225] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1941.158492][T20225] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1941.267477][T20238] device veth2435 entered promiscuous mode 18:35:41 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1941.386941][T20238] device bridge1062 entered promiscuous mode 18:35:41 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4c, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1941.588801][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr685: link becomes ready 18:35:41 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x1c, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:41 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xedc000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1941.878396][T20310] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:35:41 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x60, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1943.355114][T20328] __nla_validate_parse: 5 callbacks suppressed [ 1943.355136][T20328] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1943.421539][T20348] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1943.770046][T20351] device veth2437 entered promiscuous mode [ 1943.806474][T20351] device bridge1063 entered promiscuous mode [ 1943.885576][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr686: link becomes ready [ 1943.907835][T20365] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1943.923441][T20385] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:35:44 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:44 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x1000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:44 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x12, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:35:44 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x68, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1945.515157][T20421] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1945.643190][T20421] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1945.786482][T20421] device veth1441 entered promiscuous mode [ 1945.988554][T20421] device bridge840 entered promiscuous mode [ 1946.008091][T20421] debugfs: Directory 'hsr593' with parent 'hsr' already present! [ 1946.016083][T20421] Cannot create hsr debugfs directory [ 1946.026584][T20421] hsr593: Slave A (veth1441) is not up; please bring it up to get a fully working HSR network [ 1946.100632][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr593: link becomes ready 18:35:45 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) syz_open_procfs(r0, &(0x7f0000002100)='net/tcp\x00') read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x6, 0x1f, 0x1b, 0x0, 0x200000004000009, 0x10040, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x714d9b62, 0x4, @perf_config_ext={0x0, 0x6}, 0x1800, 0x0, 0x8, 0x4, 0x1, 0x80, 0x2, 0x0, 0x7ff, 0x0, 0xfffffffffffffc5c}, r1, 0x0, 0xffffffffffffffff, 0x5) 18:35:45 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x40000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:45 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6c, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:45 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x2e, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:45 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x25, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1946.322236][T20460] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1946.470172][T20473] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1946.522649][T20476] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:35:46 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x100000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:46 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x74, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1946.907112][T20480] device veth2441 entered promiscuous mode [ 1946.975499][T20480] device bridge1064 entered promiscuous mode [ 1947.021369][T20481] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1947.252288][T20502] device veth1443 entered promiscuous mode 18:35:47 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x7a, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1947.448171][T20502] device bridge841 entered promiscuous mode [ 1947.496126][T20502] debugfs: Directory 'hsr594' with parent 'hsr' already present! [ 1947.507148][T20502] Cannot create hsr debugfs directory [ 1947.547257][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr687: link becomes ready [ 1947.625956][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr594: link becomes ready 18:35:47 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:47 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x200000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:47 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x48, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:35:47 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x48, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:47 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xca, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1948.361572][T20577] __nla_validate_parse: 2 callbacks suppressed [ 1948.361626][T20577] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1948.494951][T20586] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1948.599702][T20579] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1948.773734][T20585] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1949.006569][T20577] device veth1445 entered promiscuous mode [ 1949.079154][T20577] device bridge842 entered promiscuous mode [ 1949.103671][T20577] debugfs: Directory 'hsr595' with parent 'hsr' already present! [ 1949.112296][T20577] Cannot create hsr debugfs directory [ 1949.178501][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr595: link becomes ready [ 1949.210204][T20576] device veth2443 entered promiscuous mode [ 1949.262567][T20576] device bridge1065 entered promiscuous mode [ 1949.332114][T20576] hsr688: Slave A (veth2443) is not up; please bring it up to get a fully working HSR network [ 1949.375404][T20586] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1949.385906][T20605] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:35:49 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x300000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:49 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x180, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:49 executing program 1: ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(0xffffffffffffffff, 0x40184150, &(0x7f0000004a80)={0x0, &(0x7f00000049c0)="612e9bb7f6b3d263a910804fae15d9000bb4201cb913b18fbce4322024811314a7ffd4e17e30140febb41ba9eec96a8328b6e8a0f9a88bb2b6628743fc95f49429c9de38a43c998054f34ebb48161b1b3cd236c2622efe6e349f35a75085eb512693d6adf83c795b9a8f947265f7436c45a6a3ac9bfa9bc3dc1f5bd2f21dc04d959536a68dfa0f5d0e34c4f7053db8594c0cd274db3e", 0x96}) setpriority(0x2, 0x0, 0xfffffffffffffffd) r0 = gettid() r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r2 = gettid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000004980)={&(0x7f0000004880)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000004940)={&(0x7f00000048c0)={0x48, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x37}, @val={0x8}, @void}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1000, 0x3b}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x75}, @NL80211_ATTR_PID={0x8, 0x52, r3}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000010}, 0x891) r4 = getpid() rt_tgsigqueueinfo(r4, r0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) r5 = getuid() recvmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000000000)=""/56, 0x38}], 0x2, &(0x7f0000001200)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}, 0x10042) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004680)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001280)=""/38, 0x26}, {&(0x7f00000012c0)=""/67, 0x43}, {&(0x7f0000001340)=""/39, 0x27}, {&(0x7f0000001380)=""/130, 0x82}], 0x4, &(0x7f0000001480)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa8}}, {{&(0x7f0000001540)=@abs, 0x6e, &(0x7f0000002840)=[{&(0x7f00000015c0)=""/154, 0x9a}, {&(0x7f0000001680)=""/96, 0x60}, {&(0x7f0000001700)=""/4096, 0x1000}, {&(0x7f0000002700)=""/238, 0xee}, {&(0x7f0000002800)=""/19, 0x13}], 0x5, &(0x7f00000028c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000002940), 0x6e, &(0x7f0000003c80)=[{&(0x7f00000029c0)=""/78, 0x4e}, {&(0x7f0000002a40)=""/143, 0x8f}, {&(0x7f0000002b00)=""/166, 0xa6}, {&(0x7f0000002bc0)=""/4096, 0x1000}, {&(0x7f0000003bc0)=""/168, 0xa8}], 0x5, &(0x7f0000004ac0)=ANY=[@ANYBLOB="280000000000000001000000010000004b28b5832070f99fd8ac933c958fa4005b1c6979ce10b956aae02d30162db74b7d0a33b9755dfdf9669224d6a56e139238201f3f8f637276", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32], 0x40}}, {{&(0x7f0000003d40), 0x6e, &(0x7f0000003e40)=[{&(0x7f0000003dc0)=""/122, 0x7a}], 0x1, &(0x7f0000003e80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0}}, {{&(0x7f0000003f40), 0x6e, &(0x7f0000004340)=[{&(0x7f0000003fc0)=""/211, 0xd3}, {&(0x7f00000040c0)=""/233, 0xe9}, {&(0x7f00000041c0)=""/215, 0xd7}, {&(0x7f00000042c0)=""/67, 0x43}], 0x4, &(0x7f0000004380)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x30}}, {{&(0x7f00000043c0), 0x6e, &(0x7f0000004580)=[{&(0x7f0000004440)=""/230, 0xe6}, {&(0x7f0000004540)=""/39, 0x27}], 0x2, &(0x7f00000045c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}}], 0x6, 0x12140, 0x0) r8 = gettid() r9 = getpid() rt_tgsigqueueinfo(r9, r8, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000004800)={{0x3, r5, r6, 0x0, r7, 0x102, 0x3}, 0x7, 0x2, 0x1, 0x9, r9, r0, 0x4}) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000040)) [ 1949.610549][T20585] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1949.632021][T20633] device veth2445 entered promiscuous mode 18:35:49 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x400000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1949.868482][T20663] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1949.914779][T20633] device veth2445 left promiscuous mode 18:35:49 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x300, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1950.082869][T20634] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1950.273377][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr688: link becomes ready 18:35:50 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x4a, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:50 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x4a, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1950.480178][T20695] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1950.696504][T20695] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1950.781620][T20708] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1950.856964][T20716] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1951.165697][T20711] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1951.396494][T20717] device veth2447 entered promiscuous mode [ 1951.445066][T20717] device bridge1066 entered promiscuous mode [ 1951.469434][T20717] hsr689: Slave A (veth2447) is not up; please bring it up to get a fully working HSR network [ 1951.511309][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr689: link becomes ready [ 1951.552882][T20724] device veth1447 entered promiscuous mode [ 1951.613227][T20724] device bridge843 entered promiscuous mode [ 1951.640133][T20724] debugfs: Directory 'hsr596' with parent 'hsr' already present! [ 1951.660325][T20724] Cannot create hsr debugfs directory [ 1951.666814][T20724] hsr596: Slave A (veth1447) is not up; please bring it up to get a fully working HSR network [ 1951.704564][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr596: link becomes ready [ 1951.716471][T20739] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1952.017350][T20762] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1952.295559][T20773] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 18:35:52 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:52 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x500000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:52 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x4c, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:52 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x3da, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:52 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x4c, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1952.386708][T20767] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1952.734321][T20808] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1952.958953][T20808] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:35:52 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x600000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1953.063884][T20835] device veth1449 entered promiscuous mode [ 1953.100812][T20835] device bridge844 entered promiscuous mode [ 1953.163522][T20835] debugfs: Directory 'hsr597' with parent 'hsr' already present! [ 1953.172510][T20835] Cannot create hsr debugfs directory [ 1953.193379][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr597: link becomes ready 18:35:53 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x405, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1954.114547][T20832] device veth2451 entered promiscuous mode [ 1954.221385][T20832] device bridge1067 entered promiscuous mode [ 1954.337786][T20892] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1954.386293][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr690: link becomes ready [ 1954.524639][T20892] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:35:54 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_COALESCE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {{}, {@void, @void, @val={0xc, 0x99, {0x1, 0xb}}}}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x24004000) r1 = gettid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) setpriority(0x0, r1, 0x3fb) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r3, 0x8907, 0x0) kcmp(r2, r2, 0x2, r3, r0) 18:35:54 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x700000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:54 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x60, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:35:54 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x60, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:54 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x500, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1954.894035][T20910] __nla_validate_parse: 10 callbacks suppressed [ 1954.894101][T20910] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1954.978187][T20914] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1955.041998][T20919] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1955.175932][T20914] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1955.247351][T20915] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1955.348464][T20918] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1955.469586][T20962] device veth1451 entered promiscuous mode [ 1955.565572][T20962] device bridge845 entered promiscuous mode [ 1955.613137][T20962] debugfs: Directory 'hsr598' with parent 'hsr' already present! [ 1955.621118][T20962] Cannot create hsr debugfs directory [ 1955.627632][T20962] hsr598: Slave A (veth1451) is not up; please bring it up to get a fully working HSR network [ 1955.646174][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr598: link becomes ready [ 1955.688250][T20915] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1955.708642][T20918] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1955.799221][T20963] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 18:35:56 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:56 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x504, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:56 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x800000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:56 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x68, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:35:56 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x68, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:35:56 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x48, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1957.480358][T21017] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1957.554799][T21019] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1957.555790][T21029] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1957.734022][T21020] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:35:57 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x900000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:57 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x600, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1958.224748][T21046] device veth1453 entered promiscuous mode 18:35:58 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xa00000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1958.395812][T21046] device bridge846 entered promiscuous mode [ 1958.459756][T21046] debugfs: Directory 'hsr599' with parent 'hsr' already present! [ 1958.467615][T21046] Cannot create hsr debugfs directory [ 1958.473995][T21046] hsr599: Slave A (veth1453) is not up; please bring it up to get a fully working HSR network [ 1958.503413][T21097] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1958.525814][T21052] device veth2455 entered promiscuous mode [ 1958.605445][T21052] device bridge1069 entered promiscuous mode [ 1958.696400][T21097] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1958.731378][T21052] hsr691: Slave A (veth2455) is not up; please bring it up to get a fully working HSR network [ 1958.763256][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr599: link becomes ready [ 1958.784838][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr691: link becomes ready 18:35:58 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x700, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:35:58 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb00000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1959.297828][T21148] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:35:58 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x6c, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1959.479545][T21148] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1960.110762][T21184] device veth2457 entered promiscuous mode [ 1960.174239][T21184] device bridge1070 entered promiscuous mode [ 1960.215129][T24415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr692: link becomes ready [ 1960.261205][T21176] __nla_validate_parse: 8 callbacks suppressed [ 1960.261240][T21176] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1961.333868][T21179] device veth73 entered promiscuous mode [ 1961.743374][T21179] device bridge37 entered promiscuous mode [ 1961.761292][T21179] debugfs: Directory 'hsr28' with parent 'hsr' already present! [ 1961.769506][T21179] Cannot create hsr debugfs directory [ 1961.793089][T21185] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1962.174496][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr28: link becomes ready 18:36:02 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:02 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x6c, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:36:02 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x1000000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:02 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x900, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:02 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x74, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:02 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x48, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1962.993372][T21249] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1963.102095][T21250] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1963.226373][T21257] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:36:02 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x1f00000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1963.316620][T21256] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1963.450758][T21258] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1963.510877][T21256] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1963.544530][T21279] device veth1455 entered promiscuous mode [ 1963.648914][T21279] device bridge847 entered promiscuous mode 18:36:03 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2000000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1963.763194][T21279] debugfs: Directory 'hsr600' with parent 'hsr' already present! [ 1963.771417][T21279] Cannot create hsr debugfs directory [ 1963.777890][T21279] hsr600: Slave A (veth1455) is not up; please bring it up to get a fully working HSR network [ 1963.806882][T21249] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:36:03 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xa00, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1964.202117][T21282] device veth2459 entered promiscuous mode [ 1964.269212][T21324] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:36:03 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2010000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1964.383240][T21282] device bridge1071 entered promiscuous mode [ 1964.425057][T24415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr600: link becomes ready [ 1964.492131][T24415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr693: link becomes ready [ 1964.507886][T21250] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1964.528586][T21257] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1964.561468][T21324] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:36:04 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x7a, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:04 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb00, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1965.093288][T21364] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1965.325371][T21370] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1965.547746][T21372] __nla_validate_parse: 1 callbacks suppressed [ 1965.547765][T21372] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1965.735167][T21376] device veth2461 entered promiscuous mode [ 1965.806875][T21376] device bridge1072 entered promiscuous mode [ 1965.858060][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr694: link becomes ready [ 1965.871692][T21358] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1966.330378][T21399] device veth75 entered promiscuous mode [ 1966.554354][T21399] device bridge38 entered promiscuous mode [ 1966.570044][T21399] debugfs: Directory 'hsr29' with parent 'hsr' already present! [ 1966.577898][T21399] Cannot create hsr debugfs directory [ 1966.608511][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr29: link becomes ready [ 1966.730510][T21398] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:36:07 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:07 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x74, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:36:07 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x1020, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:07 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x3100000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:07 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xf0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1967.969418][T21437] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1968.280288][T21443] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1968.510520][T21447] device veth2463 entered promiscuous mode [ 1968.580682][T21447] device bridge1073 entered promiscuous mode 18:36:08 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x48, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:08 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x3f00000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:08 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x1f00, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1968.640531][T21444] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1968.831088][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr695: link becomes ready [ 1968.880524][T21451] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1968.893782][T21466] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:36:08 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x300, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:08 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4800000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1969.228423][T21492] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1969.389854][T21508] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:36:09 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x7a, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:36:09 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1969.780929][T21520] device veth2465 entered promiscuous mode [ 1969.852804][T21520] device bridge1074 entered promiscuous mode [ 1970.139798][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr696: link becomes ready [ 1970.281695][T21538] device veth1459 entered promiscuous mode [ 1970.353790][T21538] device bridge849 entered promiscuous mode [ 1970.385013][T21538] debugfs: Directory 'hsr601' with parent 'hsr' already present! [ 1970.393041][T21538] Cannot create hsr debugfs directory [ 1970.421171][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr601: link becomes ready [ 1970.626484][T21562] __nla_validate_parse: 3 callbacks suppressed [ 1970.626504][T21562] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1971.067154][T21579] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1971.297236][T21586] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 18:36:11 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:11 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4c00000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:11 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2010, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:11 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x388, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:11 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1971.826084][T21589] device veth77 entered promiscuous mode [ 1972.087638][T21589] device bridge39 entered promiscuous mode [ 1972.103430][T21589] debugfs: Directory 'hsr30' with parent 'hsr' already present! [ 1972.111525][T21589] Cannot create hsr debugfs directory [ 1972.149896][T21604] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1972.266514][T21610] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1972.521919][T21607] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1972.639826][T21619] device veth2467 entered promiscuous mode [ 1972.671448][T21619] device bridge1075 entered promiscuous mode [ 1972.725003][T21611] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1972.940369][T21627] device veth1461 entered promiscuous mode [ 1973.094476][T21627] device bridge850 entered promiscuous mode [ 1973.149598][T21627] debugfs: Directory 'hsr602' with parent 'hsr' already present! [ 1973.159285][T21627] Cannot create hsr debugfs directory [ 1973.210546][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr30: link becomes ready [ 1973.238260][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr697: link becomes ready [ 1973.276025][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr602: link becomes ready [ 1973.306389][T21604] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1973.505771][T21640] device veth2469 entered promiscuous mode [ 1973.622033][T21640] device veth2469 left promiscuous mode [ 1973.688973][T21623] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1973.726855][T21633] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 18:36:13 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x74, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:13 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x3f00, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:13 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6000000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:13 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x3d2, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:13 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x2, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:36:14 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6800000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:14 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1975.268874][T21774] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1975.443916][T21774] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1975.470011][T21734] device veth2471 entered promiscuous mode [ 1975.559173][ T1229] ieee802154 phy0 wpan0: encryption failed: -22 [ 1975.632988][ T1229] ieee802154 phy1 wpan1: encryption failed: -22 [ 1975.703058][T21734] device bridge1076 entered promiscuous mode [ 1975.772323][T21733] device veth1463 entered promiscuous mode [ 1975.828820][T21733] device bridge851 entered promiscuous mode [ 1975.868082][T21733] debugfs: Directory 'hsr603' with parent 'hsr' already present! [ 1975.876619][T21733] Cannot create hsr debugfs directory [ 1975.902414][T21741] __nla_validate_parse: 6 callbacks suppressed [ 1975.902432][T21741] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1975.944819][T21749] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 18:36:15 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:15 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6c00000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:15 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4400, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:15 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x3, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1976.216760][T21825] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1976.341365][T21825] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1976.361307][T21753] device veth79 entered promiscuous mode 18:36:16 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x7400000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1976.670907][T21753] device bridge40 entered promiscuous mode [ 1976.918504][T21753] debugfs: Directory 'hsr31' with parent 'hsr' already present! [ 1976.926505][T21753] Cannot create hsr debugfs directory [ 1976.988478][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr698: link becomes ready [ 1977.017538][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr603: link becomes ready [ 1977.202188][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr31: link becomes ready [ 1977.216377][T21827] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1977.267235][T21840] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:36:16 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x74, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:16 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4800, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:16 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x7a00000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:16 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x500, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1977.424077][T21847] device veth1465 entered promiscuous mode [ 1977.504415][T21896] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1977.539171][T21847] device bridge852 entered promiscuous mode [ 1977.572514][T21847] debugfs: Directory 'hsr604' with parent 'hsr' already present! [ 1977.580612][T21847] Cannot create hsr debugfs directory [ 1977.601463][T21908] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:36:17 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x8cffffff00000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1977.755583][T21896] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1977.818093][T21853] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1977.827779][T21871] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1978.009455][T21898] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1978.144716][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr604: link becomes ready 18:36:17 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4c00, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:17 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb100000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1978.233529][T21912] device veth2473 entered promiscuous mode [ 1978.304344][T21912] device bridge1077 entered promiscuous mode [ 1978.416246][T21912] hsr699: Slave A (veth2473) is not up; please bring it up to get a fully working HSR network [ 1978.439390][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr699: link becomes ready [ 1978.454479][T21940] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1978.492533][T21971] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1978.573257][T21948] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1978.724983][T21971] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1979.923611][T21960] device veth2475 entered promiscuous mode [ 1979.979758][T21960] device veth2475 left promiscuous mode 18:36:20 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:20 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb200000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:20 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:20 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x4, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:36:20 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x5d6, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1981.189443][T22050] __nla_validate_parse: 4 callbacks suppressed [ 1981.189529][T22050] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1981.294867][T22057] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1981.516224][T22066] device veth1467 entered promiscuous mode [ 1981.636423][T22066] device bridge853 entered promiscuous mode [ 1981.650435][T22066] debugfs: Directory 'hsr605' with parent 'hsr' already present! [ 1981.658670][T22066] Cannot create hsr debugfs directory [ 1981.696461][T22070] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1981.815610][T22085] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:36:21 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x7a000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:21 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb300000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:21 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6800, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:21 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x5, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1982.246344][T22086] device veth2477 entered promiscuous mode 18:36:21 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xf6ffffff00000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:22 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6c00, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1982.440951][T22086] device bridge1078 entered promiscuous mode [ 1982.550336][T21759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr605: link becomes ready [ 1982.590572][T21759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr700: link becomes ready [ 1982.632407][T22070] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1982.642777][T22090] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:36:22 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xf9fdffff00000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1982.970621][T22092] device veth2479 entered promiscuous mode [ 1983.158287][T22092] device veth2479 left promiscuous mode [ 1983.268737][T22114] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1983.297220][T22133] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1983.499423][T22141] device veth1469 entered promiscuous mode [ 1983.522514][T22141] device bridge854 entered promiscuous mode [ 1983.600041][T22141] debugfs: Directory 'hsr606' with parent 'hsr' already present! [ 1983.608093][T22141] Cannot create hsr debugfs directory [ 1983.639762][T22143] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1983.651738][T22175] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1983.795968][T24415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr606: link becomes ready 18:36:25 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xfeffffff00000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:25 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x7400, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:25 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x600, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:25 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x6, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:36:25 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:25 executing program 1: setpriority(0x2, 0x0, 0xb9) 18:36:25 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xff00000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1986.249105][T22252] __nla_validate_parse: 4 callbacks suppressed [ 1986.249128][T22252] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1986.334553][T22272] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:36:26 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x7, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:36:26 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x7a00, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1986.804281][T22278] device veth2481 entered promiscuous mode [ 1986.933648][T22278] device bridge1079 entered promiscuous mode 18:36:26 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xff0f000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1987.109565][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr701: link becomes ready [ 1987.123745][T22321] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1987.233364][T22322] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:36:26 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xca00, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1987.522746][T22323] device veth1473 entered promiscuous mode 18:36:27 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x700, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:27 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xffffff7f00000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1987.685273][T22323] device bridge856 entered promiscuous mode [ 1987.788188][T22355] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1987.850327][T22323] debugfs: Directory 'hsr607' with parent 'hsr' already present! [ 1987.858261][T22323] Cannot create hsr debugfs directory [ 1987.885744][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr607: link becomes ready [ 1987.898098][T22322] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1987.925127][T22361] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1988.123143][T22355] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1988.158473][T22381] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:36:27 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xffffffff00000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1988.290975][T22397] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1988.511290][T22402] device veth2483 entered promiscuous mode 18:36:28 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xda03, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1988.553460][T22402] device bridge1080 entered promiscuous mode 18:36:28 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x8, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1988.630499][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr702: link becomes ready [ 1988.709662][T22397] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1988.723187][T22402] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1989.069959][T22397] device veth2485 entered promiscuous mode [ 1989.161077][T22397] device veth2485 left promiscuous mode [ 1989.531411][T22460] device veth1475 entered promiscuous mode [ 1989.568595][T22460] device bridge858 entered promiscuous mode [ 1989.589386][T22460] debugfs: Directory 'hsr608' with parent 'hsr' already present! [ 1989.597474][T22460] Cannot create hsr debugfs directory [ 1989.664179][ T136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr608: link becomes ready 18:36:29 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:29 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xffffffffffffffff, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:29 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xedc0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:29 executing program 1: setpriority(0x2, 0x0, 0xb9) 18:36:29 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x900, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:29 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x9, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:36:30 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0, 0x7}]}) 18:36:30 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xff00, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1990.992419][T22566] REISERFS warning (device loop4): super-6514 reiserfs_parse_options: unknown quota format specified. [ 1991.064919][T22511] device veth2487 entered promiscuous mode 18:36:30 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xff0f, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1991.276222][T22511] device bridge1081 entered promiscuous mode 18:36:31 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0, 0x22}]}) [ 1991.534999][T22527] device veth1477 entered promiscuous mode [ 1991.627740][T22527] device bridge859 entered promiscuous mode [ 1991.736023][T22595] REISERFS warning (device loop4): super-6514 reiserfs_parse_options: unknown quota format specified. [ 1991.758161][T22527] debugfs: Directory 'hsr609' with parent 'hsr' already present! [ 1991.766318][T22527] Cannot create hsr debugfs directory [ 1991.813847][T22520] __nla_validate_parse: 8 callbacks suppressed [ 1991.813867][T22520] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:36:31 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0, 0x3c}]}) 18:36:31 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x400000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1992.180441][T21759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr703: link becomes ready [ 1992.204801][T21759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr609: link becomes ready [ 1992.225278][T22519] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1992.242599][T22549] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1992.464111][T22629] REISERFS warning (device loop4): super-6514 reiserfs_parse_options: unknown quota format specified. [ 1992.648328][T22578] device veth2489 entered promiscuous mode [ 1992.668995][T22633] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1992.742636][T22578] device veth2489 left promiscuous mode [ 1992.821529][T22633] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1993.298296][T22655] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1993.504756][T22659] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:36:33 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:33 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0, 0x6c}]}) 18:36:33 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xa00, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:33 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0xa, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:36:33 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x1000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:33 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0xc, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1994.316904][T22690] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1994.443521][T22689] REISERFS warning (device loop4): super-6514 reiserfs_parse_options: unknown quota format specified. [ 1994.464515][T22696] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1994.623934][T22698] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1994.666771][T22699] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1994.695447][T22688] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1994.945584][T22698] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1995.165844][T22689] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue [ 1995.202671][T22707] device veth1479 entered promiscuous mode 18:36:34 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x1000002, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1995.334047][T22707] device bridge860 entered promiscuous mode [ 1995.389595][T22707] debugfs: Directory 'hsr610' with parent 'hsr' already present! [ 1995.408867][T22707] Cannot create hsr debugfs directory 18:36:35 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1995.440796][T22714] device veth2491 entered promiscuous mode [ 1995.542994][T22714] device bridge1082 entered promiscuous mode [ 1995.719037][T22726] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 18:36:35 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x2}) [ 1995.849322][T22765] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1996.214240][T22798] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1996.246927][T22765] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue [ 1996.272755][T22747] device veth2493 entered promiscuous mode [ 1996.301578][T22747] device veth2493 left promiscuous mode [ 1996.339939][T22798] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:36:36 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1996.542092][T21759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr610: link becomes ready [ 1996.564494][T21759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr704: link becomes ready 18:36:36 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x3}) [ 1996.906463][T22834] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1997.003645][T22742] device veth81 entered promiscuous mode [ 1997.063430][T22742] device bridge41 entered promiscuous mode [ 1997.345640][T22742] debugfs: Directory 'hsr32' with parent 'hsr' already present! [ 1997.353710][T22742] Cannot create hsr debugfs directory [ 1997.377727][T22834] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue [ 1997.393712][T22776] __nla_validate_parse: 5 callbacks suppressed [ 1997.393732][T22776] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1997.446296][T22807] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1997.529087][T22850] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:36:37 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0xc, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1998.028571][T21759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr32: link becomes ready [ 1998.094982][T22869] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1998.099358][T22878] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1998.145007][T22872] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1998.335962][T22873] device veth1481 entered promiscuous mode 18:36:37 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:38 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2000001, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:38 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xc00, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:38 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0xc, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:38 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x4}) [ 1998.398807][T22873] device bridge861 entered promiscuous mode [ 1998.418753][T22873] debugfs: Directory 'hsr611' with parent 'hsr' already present! [ 1998.426848][T22873] Cannot create hsr debugfs directory [ 1998.474419][T21759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr611: link becomes ready [ 1998.758692][T22909] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 1998.808689][T22914] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:36:38 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0xe, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 1998.967559][T22922] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1998.984151][T22915] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1999.188158][T22915] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1999.217325][T22927] device veth2495 entered promiscuous mode 18:36:38 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x3000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 1999.341151][T22927] device bridge1083 entered promiscuous mode [ 1999.414045][T21759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr705: link becomes ready [ 1999.436424][T22950] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1999.540432][T22953] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:36:39 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x5}) [ 1999.760981][T22970] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:36:39 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xe00, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1999.901093][T22955] device veth1483 entered promiscuous mode [ 1999.945817][T22970] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2000.007193][T22955] device bridge862 entered promiscuous mode [ 2000.200444][T22955] debugfs: Directory 'hsr612' with parent 'hsr' already present! [ 2000.208403][T22955] Cannot create hsr debugfs directory [ 2000.215024][T22955] hsr612: Slave A (veth1483) is not up; please bring it up to get a fully working HSR network [ 2000.241941][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr612: link becomes ready [ 2000.254450][T22993] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2000.261485][T22999] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:36:40 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2000.581696][T22999] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2000.698401][T22996] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:36:40 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x10, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2001.079083][T23037] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:36:40 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x6}) [ 2001.371887][T23008] device veth2499 entered promiscuous mode [ 2001.417987][T23037] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2001.445737][T23064] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2001.535216][T23008] device bridge1084 entered promiscuous mode [ 2001.595373][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr706: link becomes ready [ 2002.077173][T23081] device veth1485 entered promiscuous mode [ 2002.178369][T23081] device bridge863 entered promiscuous mode [ 2002.215973][T23081] debugfs: Directory 'hsr613' with parent 'hsr' already present! [ 2002.224109][T23081] Cannot create hsr debugfs directory [ 2002.252782][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr613: link becomes ready 18:36:42 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:42 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x5000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:42 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x1200, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:42 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x7}) 18:36:42 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0xc, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:42 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x12, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2002.599122][T23119] __nla_validate_parse: 4 callbacks suppressed [ 2002.599160][T23119] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2002.720294][T23120] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2002.726965][T23122] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2002.786292][T23121] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2002.845149][T23129] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2002.912149][T23120] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2003.012365][T23122] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2003.161384][T23133] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:36:42 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x8}) 18:36:42 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x5040000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2003.484944][T23139] device veth2501 entered promiscuous mode [ 2003.576893][T23139] device bridge1085 entered promiscuous mode [ 2003.670586][T23211] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2003.730068][T23145] device veth1487 entered promiscuous mode 18:36:43 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2003.830163][T23145] device bridge864 entered promiscuous mode [ 2003.896264][T23145] debugfs: Directory 'hsr614' with parent 'hsr' already present! [ 2003.904552][T23145] Cannot create hsr debugfs directory [ 2003.951722][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr707: link becomes ready [ 2003.976222][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr614: link becomes ready [ 2003.989989][T23119] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2004.019127][T23129] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2004.101127][T23211] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2004.151563][T23225] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:36:43 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x25, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:36:44 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x9}) 18:36:44 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x7000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2004.575115][T23272] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2004.674168][T23273] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2004.820942][T23300] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2004.952757][T23297] device veth1489 entered promiscuous mode [ 2005.027735][T23307] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option " " [ 2005.037810][T23297] device bridge865 entered promiscuous mode [ 2005.071840][T23297] debugfs: Directory 'hsr615' with parent 'hsr' already present! [ 2005.079718][T23297] Cannot create hsr debugfs directory [ 2005.108177][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr615: link becomes ready [ 2005.254681][T23307] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option " " [ 2005.288093][T23321] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2005.500857][T23323] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2006.140244][T23321] device veth83 entered promiscuous mode [ 2006.387827][T23321] device bridge42 entered promiscuous mode [ 2006.430556][T23321] debugfs: Directory 'hsr33' with parent 'hsr' already present! [ 2006.439003][T23321] Cannot create hsr debugfs directory [ 2006.484560][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr33: link becomes ready 18:36:46 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:46 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x8000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:46 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x12d7, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:46 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x48, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2007.321963][T23370] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:36:46 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) getpid() 18:36:46 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0xa}) [ 2007.511120][T23395] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option " [ 2007.511120][T23395] " [ 2007.658742][T23395] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option " [ 2007.658742][T23395] " [ 2007.671649][T23370] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2007.993628][T23369] device veth2505 entered promiscuous mode 18:36:47 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0xb}) [ 2008.121083][T23369] device bridge1087 entered promiscuous mode 18:36:47 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x9000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2008.329400][T23387] __nla_validate_parse: 5 callbacks suppressed [ 2008.329424][T23387] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2008.482745][T23434] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option " " [ 2008.508084][T23435] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2008.643359][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr708: link becomes ready [ 2008.666900][T23434] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option " " [ 2008.776594][T23435] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2008.825427][T23394] device veth1491 entered promiscuous mode 18:36:48 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x10}) [ 2008.938419][T23394] device bridge866 entered promiscuous mode [ 2009.011865][T23394] debugfs: Directory 'hsr616' with parent 'hsr' already present! [ 2009.019852][T23394] Cannot create hsr debugfs directory [ 2009.026400][T23394] hsr616: Slave A (veth1491) is not up; please bring it up to get a fully working HSR network [ 2009.054152][T23375] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2009.063889][T23396] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:36:48 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xa000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2009.208433][T23479] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2009.317693][T23423] device veth2507 entered promiscuous mode [ 2009.334383][T23479] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2009.412503][T23423] device veth2507 left promiscuous mode 18:36:49 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x31}) [ 2009.479271][T23402] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2009.542883][T23427] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2009.644740][T23504] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2009.772814][T23524] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "1" 18:36:49 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2009.983179][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr616: link becomes ready [ 2010.022320][T23467] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2010.305908][T23538] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2010.394878][T23515] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:36:50 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:50 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x48}) 18:36:50 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x1c00, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:50 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x10000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:50 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) getpid() 18:36:50 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x4a, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2011.231602][T23559] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2011.348342][T23568] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2011.469324][T23560] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "H" [ 2011.472429][T23562] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2011.561571][T23561] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2011.746636][T23562] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue [ 2011.757635][T23560] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "H" [ 2011.910770][T23584] device veth1493 entered promiscuous mode [ 2012.012514][T23584] device bridge868 entered promiscuous mode 18:36:51 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x4c}) 18:36:51 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x1f000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2012.176204][T23584] debugfs: Directory 'hsr617' with parent 'hsr' already present! [ 2012.184413][T23584] Cannot create hsr debugfs directory [ 2012.233004][T23575] device veth2509 entered promiscuous mode [ 2012.309548][T23575] device bridge1088 entered promiscuous mode [ 2012.413104][T23628] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2012.471910][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr617: link becomes ready [ 2012.491762][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr709: link becomes ready 18:36:52 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x4c, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2012.757399][T23652] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "L" 18:36:52 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x1f00, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2013.018745][T23628] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2013.196476][T23652] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "L" 18:36:52 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x20000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2013.511354][T23686] __nla_validate_parse: 6 callbacks suppressed [ 2013.511488][T23686] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2013.573240][T23691] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:36:53 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x60}) [ 2013.738337][T23697] device veth2513 entered promiscuous mode [ 2013.937268][T23697] device bridge1089 entered promiscuous mode [ 2014.047244][T23717] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2014.074502][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr710: link becomes ready [ 2014.091706][T23687] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2014.449415][T23717] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2014.649496][T23686] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2014.660582][T23691] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2014.689482][T23725] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "`" 18:36:55 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:55 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x20100000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:36:55 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x96830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:55 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x60, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:36:55 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x2000, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:36:55 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x68}) [ 2015.567624][T23767] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2015.664752][T23768] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "h" 18:36:55 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x3f000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2015.802508][T23770] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2015.910962][T23777] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:36:55 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x6c}) [ 2016.200701][T23804] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2016.244433][T23776] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2016.428365][T23804] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2016.510090][T23778] device veth2515 entered promiscuous mode [ 2016.634800][T23832] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "l" 18:36:56 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x44000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2016.782719][T23778] device bridge1090 entered promiscuous mode 18:36:56 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x74}) [ 2016.910059][T23783] device veth1497 entered promiscuous mode [ 2016.990879][T23783] device bridge870 entered promiscuous mode [ 2017.016277][T23848] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2017.107377][T23854] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "t" [ 2017.132826][T23783] debugfs: Directory 'hsr618' with parent 'hsr' already present! [ 2017.140676][T23783] Cannot create hsr debugfs directory [ 2017.177290][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr711: link becomes ready [ 2017.190006][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr618: link becomes ready [ 2017.202181][T23767] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2017.270103][T23854] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "t" [ 2017.325791][T23848] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:36:57 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x68, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2017.452442][T23782] device veth2517 entered promiscuous mode 18:36:57 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x48000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2017.638982][T23782] device veth2517 left promiscuous mode [ 2017.917721][T23897] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2018.159864][T23897] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2018.793639][T23920] __nla_validate_parse: 5 callbacks suppressed [ 2018.793660][T23920] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2019.373234][T23940] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:37:00 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xe000000, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:37:00 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:00 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x2e00, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:00 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x7a}) 18:37:00 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x6c, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:37:00 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4c000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2021.264514][T23969] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2021.383311][T23971] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2021.465778][T23970] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2021.521404][T23978] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "z" [ 2021.602593][T23972] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:37:01 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x60000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2022.016280][T23969] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2022.249724][T23978] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue [ 2022.332213][T24009] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2022.392769][T23976] device veth1501 entered promiscuous mode 18:37:02 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0xb1}) [ 2022.482281][T23976] device bridge872 entered promiscuous mode [ 2022.541441][T24009] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2022.595238][T23976] debugfs: Directory 'hsr619' with parent 'hsr' already present! [ 2022.633712][T23976] Cannot create hsr debugfs directory [ 2022.686118][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr619: link becomes ready [ 2022.709485][T23988] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2022.719474][T24028] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:37:02 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x3f00, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:02 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x68000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2022.953705][T24058] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2023.011489][T24052] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "±" [ 2023.110878][T24065] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:37:02 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x74, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2023.429228][T24084] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2023.594716][T24052] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "±" 18:37:03 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6c000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2023.798960][T24083] device veth2519 entered promiscuous mode [ 2023.936391][T24083] device bridge1092 entered promiscuous mode [ 2024.094502][T24097] __nla_validate_parse: 1 callbacks suppressed [ 2024.094584][T24097] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2024.222565][T24114] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2024.265416][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr712: link becomes ready [ 2024.280752][T24098] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2024.627564][T24105] device veth1503 entered promiscuous mode [ 2024.729497][T24105] device bridge873 entered promiscuous mode [ 2024.867903][T24105] debugfs: Directory 'hsr620' with parent 'hsr' already present! [ 2024.875851][T24105] Cannot create hsr debugfs directory [ 2024.896639][T24065] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2024.906980][T24071] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2025.358205][T24089] device veth2521 entered promiscuous mode [ 2025.500428][T24089] device veth2521 left promiscuous mode [ 2025.621324][T24107] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:37:05 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0xe000000, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2025.952570][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr620: link becomes ready [ 2025.986285][T24106] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:37:06 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:06 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0xb2}) 18:37:06 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x74000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:06 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x4000, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:06 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x7a, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2026.698372][T24190] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2026.738219][T24191] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2026.907361][T24194] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 18:37:06 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x7a000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2027.004251][T24203] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "²" [ 2027.100044][T24201] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:37:06 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0xb3}) [ 2027.340887][T24209] device veth1505 entered promiscuous mode [ 2027.458097][T24209] device bridge874 entered promiscuous mode [ 2027.528900][T24235] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "³" [ 2027.594878][T24209] debugfs: Directory 'hsr621' with parent 'hsr' already present! [ 2027.602864][T24209] Cannot create hsr debugfs directory [ 2027.623963][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr621: link becomes ready [ 2027.638094][T24191] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2027.690764][T24239] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2027.769940][T24235] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "³" [ 2027.910801][T24239] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:37:07 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0xff}) 18:37:07 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:37:07 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x4800, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:07 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x80010000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2028.554447][T24277] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "ÿ" [ 2028.822444][T24277] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "ÿ" [ 2029.049863][T24290] device veth1507 entered promiscuous mode [ 2029.124080][T24290] device bridge875 entered promiscuous mode [ 2029.157361][T24290] debugfs: Directory 'hsr622' with parent 'hsr' already present! [ 2029.165526][T24290] Cannot create hsr debugfs directory [ 2029.192611][T24295] device veth2525 entered promiscuous mode [ 2029.332854][T24295] device bridge1095 entered promiscuous mode [ 2029.420696][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr622: link becomes ready [ 2029.432496][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr713: link becomes ready [ 2029.446598][T24284] __nla_validate_parse: 5 callbacks suppressed [ 2029.446617][T24284] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2029.499157][T24292] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2029.606102][T24337] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2029.856567][T24340] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2029.953628][T24371] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2030.140132][T24374] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:37:09 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0xff}) 18:37:10 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:10 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x8cffffff, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:10 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x140008, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) rmdir(&(0x7f0000000440)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) syz_mount_image$qnx4(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0xe9e, 0x3, &(0x7f0000000700)=[{&(0x7f0000000500)="846aacdc65f651ce57318c006ab9c785a79f1acd3ce771caa10bf96117b16d2e96cc8cf8b07c350867adc2d2ef4e95ed94a8c9db32f44e5e845019dda66b1b0069aec9c92ee94e2d3dbf0c0f086a2063b640495fac23d6f7926dc9b1e1b8801ea3851126c4b262794524f49297b903864996fe4595c1f04ff6c72fc5949e413d24ff268e93f1df3f23fe1f7b5529c12dc3ec51082034aed7995e78e1e94460413b535dd6e0a959025646dc598d3ae9bddf3cd14f4a2c0f295f99e1c0f3bbc2979e", 0xc1, 0x6}, {&(0x7f0000000600)="83abf2a8373f030bc7166352e4c5970130c537aded09494d", 0x18, 0xff}, {&(0x7f0000000640)="4e38b51bf1161e4ed5bea0bdf2fa67aede46873c00b2e8a317b79e320445cbb5016b1e29f91d552d20fd1426e128fd7b145323da877c9f78a404905489f9dbc44d67297e15b2978593e53c02527a171b1c594a2623e18f4c2752739a7af32b77c20d85bf897cc5dd98efceab6caca6f40753bc71e52000d3a2a1c8fd367f655f706fe0f826ba8687125bfa9736c2e5", 0x8f, 0x3}], 0x3241010, &(0x7f0000000780)={[{'#)\''}, {'&'}, {}, {'*\'**:-&}\'(^$)\xff*^!,)'}, {'pcr'}, {}, {')@\'.#{'}, {'*'}, {'pcr'}], [{@euid_gt={'euid>', r1}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, ')@\'.#{'}}]}) r2 = syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f0000000100)="ee5767e1", 0x4, 0xffffffffffffffff}, {&(0x7f0000000140)="9f8485fd4b571597a64fc9dd669dfed58d27e90987b67f9bc1ad8d02bff2716ed7f98dc386136affbf4d3313c2d0b77ba27f289003d54523a64c840ac05a4ff51a8a8ac90595ad467f4e0b5e6c167f68ac7a34b90834e9f89660320fedd9c4542e807ff9051400c241089ca79d3c78401cd6f8ab4407e402a8007b6c4bb8275f65bca967cf017105ccc2da984017d3e3f908f4d6b9d43c637c81bd4a247c20f51d6182fd1b090ccfbcdef42a1edf", 0xae, 0xbaf90000000000}, {&(0x7f0000000200)="3f1349421c48829678", 0x9, 0xfffffffffffffffc}], 0x80080, &(0x7f00000002c0)={[{')@\'.#{'}, {'jqfmt=vfsv0'}], [{@obj_user={'obj_user', 0x3d, 'reiserfs\x00'}}, {@pcr={'pcr', 0x3d, 0x22}}]}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r3, 0xffffffffffff6a2d, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x90, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368653d6d6d61702c7063723d30303030303030303030303030303030413034312c646f6e745f686173682c6673757569643d66363538323665632d333237482d633963322d633532382d636e3537336139312c66736e616d653d24e7405e5b2d2a6e745f61707072616973652c00000000"]) 18:37:10 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x2, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:37:10 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x4a00, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2030.572456][T24414] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2030.750313][T24422] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2030.895485][T24413] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:37:10 executing program 4: statx(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x400, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$reiserfs(&(0x7f0000000100), &(0x7f0000000040)='.\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000300)="df30f4ab2d3095bcef71262ae6b64e9d479678fe3648741bd098b16e883042faa0c6093ae042a360ff1f175dc4456755ada3ed5d9cddd0abf8af896b65431f595f3aa64f2d9c0e90361cd625a456f07ad19790afb8671cb1", 0x58, 0x8}], 0x2200022, &(0x7f0000000280)={[{@jqfmt_vfsv0}, {@balloc_test4}], [{@uid_eq={'uid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, '-\\#$!],!\''}}]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r1, 0xffffffffffff6a2d, 0x0) openat(r1, &(0x7f0000000000)='./file1\x00', 0x14042, 0x82) 18:37:10 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xc0ed0000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2031.119360][T24423] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2031.271083][T24470] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:37:11 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)) [ 2031.941361][T24519] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 18:37:11 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x3, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:37:11 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x4c00, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:11 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xca000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2032.153771][T24519] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2032.723599][T24548] device veth2533 entered promiscuous mode 18:37:12 executing program 1: fork() r0 = gettid() r1 = getpid() r2 = getpgid(r0) r3 = gettid() r4 = getpid() rt_tgsigqueueinfo(r4, r3, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x10001, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x8, 0x7, 0x9, 0x8, 0x0, 0x80, 0xa027, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x800, 0x7}, 0x24d2, 0x2, 0x6dc5, 0x1, 0x7, 0x6, 0x2, 0x0, 0xd59, 0x0, 0x4}, r3, 0x5, r5, 0x1) sched_setscheduler(r2, 0x0, &(0x7f0000000000)=0x7) rt_tgsigqueueinfo(r1, r0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) r6 = syz_open_dev$dri(&(0x7f0000000180), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r6, 0xc02064b2, &(0x7f00000000c0)) r7 = gettid() r8 = getpid() rt_tgsigqueueinfo(r8, r7, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0286405, &(0x7f0000000100)={0x9, 0x966, {r7}, {0xee01}, 0xfffffffffffffffb, 0x7fff}) setpriority(0x1, r1, 0xfffffffffffffffd) [ 2032.883400][T24548] device bridge1099 entered promiscuous mode [ 2032.980557][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr714: link becomes ready 18:37:13 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:13 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x4, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:37:13 executing program 4: r0 = syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0xaaaaaaaaaaaabd7, &(0x7f0000000280), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7573726a71756fec6201cb45f5d02c00"]) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000009ac0), 0x2, 0x0) r2 = gettid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r4) r5 = accept(0xffffffffffffffff, &(0x7f0000009b00)=@l2tp={0x2, 0x0, @loopback}, &(0x7f0000009b80)=0x80) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r6, 0x8907, 0x0) r7 = eventfd(0x200) r8 = socket$inet6_icmp(0xa, 0x2, 0x3a) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r9, 0x8907, 0x0) r10 = getpgrp(0xffffffffffffffff) r11 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r12, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000009cc0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="3ac9bcbca4cf475acb1a56844e7fe36cea0c1f61b2152641cdce9805639314c41a5ee358f96de06f9c0106a11b3f3723705cb0a2a18273476a2750853272ff75e655a2a195aba3b19db60beba1996ddddbbf9b8cf911f3b71a8f30371bdac3628665b026fc6279a61bc50b54c8b4eeab589f1e3868fcdf5910119605f789a9d634a2e28d0d23d8516dafbbc7479eaed2376db5c22942e7ef1bbf1a6249e2bc4d75068b1d1e2862c0bbf22f28de8160ba330d2d618c2cbf9fa67029058e87f3bd568bc3cb91cd4b60a26d3d2532364fee4242607a298b28758eb601", 0xdb}, {&(0x7f0000000200)="081795106ec186a8eb844d3caa4997f3b75a2231cecadcb13defb2ec3b8e66d99a1a0a20e3c4bc86080619e6306279413f7a30aeebca82e5582831b75aa5fcc3a563", 0x42}], 0x2, &(0x7f0000000300)=[@rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x804}}, {{&(0x7f0000000400)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000b80)=[{&(0x7f0000000480)="d2973e73aee28c0c5d4504890a4f56b0e1e9d27ef79559c666a7a495863e0caafcf934f7dd9e7f7bcc6d410cacd566f1fcdb3a90933b24fff362add521e348ea6ea1a6fd1dbb38d51b098fa2debc4d7482742a549a62c98224725a452faddc7b3ca8e5f4d6c3eb643491436eab95adfa5c9aee405cd6938e120b2ad1b61b4e3e236884a0a1e90b469c8d6e0c34e9b6b36fc04bb87e7e9baeb318e432261f88d3a11d", 0xa2}, {&(0x7f0000000540)="263d397d81896bf74882b4e3651d8de6a55c3b3a8111971f94b8863c9f5f49943346054c279ed84589e4db9c8f61f920e334dbb2cc03ad1087ec6bbdfc8cffdba7a2149f730949222224c25921a3c197f17e4412183d59287129b714ec156a9829fddc156de4eae271d004f282444a651b7bc28cf8c34ff27f2f65a556c52068f656f7aefccae9743e8d06f766a2a343040d0d11b7d1969d999463bc8d4e41d84ab159487c", 0xa5}, {&(0x7f0000000600)="8bc7d98b2c097ff8e1ef1dffc9e07417414dcddfe89cbfba314666967eab8dc305d059d2201b8ff7b6301c726ffe12c87c77", 0x32}, {&(0x7f0000000640)="fcb98eb4050f445e4fa8aaabbc7137d4454c15088bf50d84c02c87574ca3391a8f608bceb6b81735f548e0fab85cd307c97d3597868f5d6c997b837ac9d7ef5d2b28b730ae40fecbd825a8dced57c21c0756739cebc79b3621c34878ab3521bc396091014640117d2bc3c69aa84d63729c75ee74e2c57702c0129f36ff39fc5365e69501f958acf5da09248c", 0x8c}, {&(0x7f0000000700)="ba6d0e59c2c7c99e7f2a1ffe1a94cac39055c9b2fe898fb0be1af742464dc2e357cbe65fea293489c298308c904731d662c5cdf4e0292435d0c978aa77b0d841887134ae6ff967bf3f81a532fb2e9a71ca9fb86284ed4c630453ebc46ef22eb6b267935413f8ad0d3a1431cbcfafcc520717f82e7631fc89b37babe72e6e7367da1d90f4b3b3f872f234708cf2952b12ded163084edda7ff9c269fe8d4cccf17636e29c25551db2a717b25f5bd76f504b9fc9f4020fbba20a1da451030752672dd9e88ff4abec14c299d8e40f71a10c047bca9407ee28854094255adfe2c1af66d75b7de2daffa59f6b051e24e6d4a6bf7b941", 0xf3}, {&(0x7f0000000800)="5f46016eb85a22ebe39e19e14c8cf23d33dabe8cf99ddc13f07e53030241a0c813f03d586fa8e2f63059258a75ade7da3c5bb36c2b7f2eb10bbe7057a68d01fec8a8920bba52b153a05379245dbf72253c3d7329f1ead32fc4c456f30a5eab4b0fd4a429631603ff211db51505d3de477a452653456af3d397847bd2d08aaa0ba6a9d823886f59d5a733f5aa5afd3b8343b45b4919447b922b01b61bf6daa60cfc74b94266fc54cc21571b5dc9", 0xad}, {&(0x7f00000008c0)="dd71df103ee136a1acb7b423295b09bbe759d5ff3e2ac51649151f48f356713d6e2a1fb3a3c188bd14b36e962d3c045a03209bd24839fd6852e50693d1b1cc74ef0c1536c9adfaa2653485cd008695e5c72f4f3e904b9baa41523474efd922bb0bcce07cf13324fada41c9", 0x6b}, {&(0x7f0000000940)="3b333bffb3e335d68a34d50c85aa779e2d67634a1200a0e8541818ec93851b76f428ebb9867632c5277c157e5ae5451a6fc676cb69a5abf152ea50f4b860ba5eb8cbd231177c4d7e9eb2237e32654dcd2575ea8ffec3287eaacdc3b1727fc7045d6df738601e958cb8b5b7ee506131bab3df95684208b019b78aac09", 0x7c}, {&(0x7f00000009c0)="3a2760b9137ed3f391f453d4b373ebc965d40dcc3bf65e74622aee3debf7d4c04e3244cee2c4cad5acd364585e1f48773c54b6c8226d07ca0eda9269502c187769886ec621a6ca9ad130fc24efd0fe8be0f0fdcdf6540c5e3bcf287a30b7699c1f8f73738c33b41f9e7ac9bac9a3af8f55d7701039ab74334dc290aefa4fd3b50fd4dcdcaca7258d22a84a6cb8e05142e23bfc7f649d42232cf09af51cc8", 0x9e}, {&(0x7f0000000a80)="80b5bb6d8c67ad9f146e0f85624a644826ee81e169d858813372e70c379c8172c8cf0c77392100cedc36896ad504ecad9beca590bd111a2a918e31778234a7ed95396627e76e6c0a75db27e93be72cafde99c9aaa58c9dc43dc4742746f6ef32b97c872874fd5b616d57de262e56821160639d2d3d70bec7c1b9182aa67d4975b0e4e170655a7577624c0bf300fda79e95ac89f5350a35c87f6be9d331efd22248fa60a046f67724e481c65ffa8615b3edcc23226bc00f16645bfddb0ac6d931ecec728738ba08b208f080968e81ae938b6ce5529d7195554026816eeccc0b9810bfcae638e99ff8640ba5ce43422a274d4207fb60", 0xf5}], 0xa, &(0x7f0000000c40)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x20, 0x8080}}, {{&(0x7f0000000c80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000d00)="9cedf42a5525c8b77753ad6d8128e0d7eb5973f2e7a45f669bb621fad2d454f98378278756c0238dc8ba6f575e20d7ca535021d752c5405342ce0d8c115ef92f48f1cd20efae4cbe4b9686e9b53adc3294b5a98aee5c7ae4384b90f34a6feb9b73e0338dd8204525fd7e73c801050b8ce5ea13cb96ee7e375a393562a98601dd63a3a9f60f2eaf908bbf2299c13d13a7dfa1f55f51046a380e70c7d42cae3eb92868e6ac1d33a145dc776a4ecfe1d7594eaa1d721d69ba9885a0b663095f4fd9e237ee03f8798bce5bd2e7baacb2961464aec6fa", 0xd4}, {&(0x7f0000000e00)="04acced9daed7e440a35702795204b491073", 0x12}, {&(0x7f0000000e40)="b96f2addfdf585c4f48f71fb434643e2b8a86a3f27c9455247e684db6f14ee37364a800a804312824cfd70356f57a5ef50bc24603c899b971fd83f548363e50cf0538a106710e0d5266b2f32", 0x4c}, {&(0x7f0000000ec0)="d3a0850f58", 0x5}], 0x4, &(0x7f0000001240)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYBLOB="000000002c000000000000000100000001007f00", @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32=r9, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x128}}, {{&(0x7f0000001380)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000001640)=[{&(0x7f0000001400)="04f1af3dd5decdc98dec068545ecb5d93da0c9334dca3ce3014c74f78db007ccf860fcc70c2b6fe9bcf33b3bd4a848836e06dff7b645f2b7185e5b77fb90ed8176d81457a62dc3df389ec837576643a882d590102933c9eae2288b9f672226484e079fcdcbdcf1e69e7855085de0b950fa7918383771e984e632237e3ebc4b9a652ed9dc", 0x84}, {&(0x7f00000014c0)="578b3502d9fd41e137df1062364e44150f71c090b79cad824955c077b0674202aa8bc59ff58a684390beb8be69dc3f568a3b43c44f325b23a8237a8159f5f722299cf7d761d9ba73e9da66eb9b10e0b5b84d2a1e4d706e56f5b0fec74228a12a7111", 0x62}, {&(0x7f0000001540)="9e2516d857caa1d70cc376700a62572a8976c25e3fd91e0134f5e5fd1411c7c31312840e57a4cf7c6fb44704d856d57eb873edfd5e03d4d40f4757518d4d65ca97052aa1a36402fd0c9f57601f44294038ef579db87034601f858735c66d7003d3603294c3745e30ed46eee9a1a9002a10d4b14a26044333fdbd67a56a3926bdfe74708bc1becd96b7cd7108b4a6d1174b28724edeb4b8b008ab8a876bba76c6f367de54f7fd2bfbaf72afc3b7f3ecc7e46b86812f8e8245414c68dafe766f2ad0041be600ae0346617d236f44ae33ef1b088bf7fdb6e904ed1573efacb4f32d969600c4bd82178474f3c5b8f5a83e1295bac1", 0xf3}], 0x3, &(0x7f0000000f00)=ANY=[@ANYBLOB="1c82163f83aaaf31caaa8df941000100", @ANYBLOB="7688cbf16577cf496cbbc9a9201eebc45469b22a3ddcae61f1937c2f6f0aea706a56e8c887586da1e51111a26d0cc29b2d15d99249de0098f789a64f7e3eb87b33246c8298dca74c3484", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0], 0x50, 0x20000001}}, {{&(0x7f0000005540)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000005b00)=[{&(0x7f00000055c0)="8550e79317e69243e35875c77caae519c87c134508fc7410c9a6f15fd3e240ca5022a1cc92fbd47a628ee7e3d5bdcc26e32bc1feb7ccf7bcf50691148024041acf5ebf8d96c2ac44c559c302e1f78dde987fe1fe50eca063f76ecfaae32733535f022c7ffdc8e2dab1cff6f336b3e1be06f1167f4bc9d7a7379e2e9cab808c39652df19a81fe7210076c018bb66be08de5e9f58e34da1051c50bb1ab228616142e6353d7939666c09657ccced209af5b68ac7282f61a44a66f6b689e", 0xbc}, {&(0x7f0000005680)="d0c8771dd5c0add581c7816a94da1ed958f97c530cdcee81b5c8c7638193ecd617d66796e047533300b9be1719da8ff7be607ee5f5fe317c1328b9cfa5fa86d22e730152c450a207eeec12bffb449335e00dee31b770f71ac56a154b2ab8ccf26aae877e8e491305468b55b4cea291232983249b0913fa5bce9a9fbeb4661582bc64d90644c08924b390f445fdcd6f4c090d4f5d9c116936a44ae06ee21a7e33560e6788efdbb52372c056a683", 0xad}, {&(0x7f0000005740)="be31ab8381286b917d7ff7d5bef234867ca89513978f543fec06a7e25e86a412ec25a129eb6592b0b181b6de66ad4619fb9bcd6ff9f22562b64fccf534e54ea1482d82c1592532eed4bfcbedef6b7297cd678c5e88f0b9dd8f4d94f5bd33b8e8dde0ae9de3ba2199e1c8e8adab86de9a52bd598f50e99bd4451a6572ab2ee14adaf625ac277e3816b4a1eb3212af0c4da21d51e9876fb8e71d3149ad0152a913b9aadad50ba8b0123f2b285ea69eb0b91fc45a4a8c76fddaae4f268018686ec7156fe1f0a849b4b981f9ecadf7f14b91d2dba17e17080c0d5e049a39f8929f6ffa79821497b4", 0xe6}, {&(0x7f0000005840)="37274ebf690f2cd159f4e27583a3ad19fdc0a8ea8d0097fbd321ad91eb50c5ec18b2b67965219736e0d378167dfce5f40b66dbab7cbe5b69a76a94cb63871034f298bc63828abfe14ae52ebfad11d6750a44b8c05e3b25b27a7dccbfe5938859241e76d95c19a2014b5a01bf21070c9fa3b6be24a34d319dbf7d0baa52c760152e7b30a13dc0f14d0ad1481fe22c32a04dca736317676b803bb3e8c42afaec9a50cc10953244f5783e49fd40bee5f8ac0c6eb9051c5f68b64f8fd3", 0xbb}, {&(0x7f0000005900)="5e578999e7f7590079dc30c7af95b97d32dac196bd39c57808b29c1867277af8b2a276b2a713053f869e7d06c237fb7db4724010058886e809f150c1967c48841f3617d440347e65cde3fbcb47643abc3139cdf72392539fef39c08aab536c9e69172f49ea60b67f6b468352b0f7a5f1965142cd80580b884a1a5a7cdc8b10d8cb8094ca1a41c1ff7ac043aeae5554883aa029389589d2ce93cc30a8823f29e4b521567827d23e91913419036ca874090649b0ca", 0xb4}, {&(0x7f00000059c0)="42d7d3adcfdb292ab3858b977974b05929c9da33d3159bfe92b367bc11dab6464fac17ee34bdaeb193ddb4572c3021aa3163074dabacdae98db03b664601f6e4d38d22fa00a32372acb9b878fa5d2577b32ccf42ae18c3997e44aceb7e571baf41dd598aceab69b6535ffbc26f4244185fcac60c2b6850c24f3dcd08e95dd5f44f1a7cc3292d406f1231565e7223b594d48b27423a48063430a1507fc5d692dd911f77bdd0d7", 0xa6}, {&(0x7f0000005a80)="fb5d622c9ec2420cbeb4930a162251474db83daf6153ce7e95da2873fafaab5f72903df0c571a49c5a26bcd994e4971d36d01acdc2ade130f9f34257456297a14372c877f7ff99fea0ecc113", 0x4c}], 0x7, &(0x7f0000005b80)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18, 0x4000}}, {{0x0, 0x0, &(0x7f0000005e00)=[{&(0x7f0000005bc0)="1efb664407793e79b8a625e5582610a891f27225f16eb4937144c89e79220ec6a6ff79745c410531f7fd1df36bbf8808e8f90fec8e5ccfe3dd84196b926e72e6d45add205d0f86d5d97cfbbfc52b7f4b5d6e361e0173a951ec4d4d596b8bf99372271c1f94dba18fe82bd3ee8d96e9f3adc536d359ac84df067af4f0934aaee98e99187e8f1aeac858c6c16aeb2568bf3ec418773f14fc8adbb7161ae9ba93882bea67bc3092576d503f6d66916d4826bdf32066633a4bbf5accfa31911a03eac36ae5c36792551c12e0eaaaf6775fd2b2a142784c5aae8eabe75256dd68b7544ea55b014013ae14f5bf8abc801ec8db116aeb0a4b9e", 0xf6}, {&(0x7f0000005cc0)="776d668ba44cee2dfccc5e1a343e1c10b706be39498e8b39ec7cbf5090c359d43583b0f631f1903c5b0db3e6f0e974d61ff21df2015dafefde9502472bd4d1629f7f5c1c4f75a95e6120e22b20ee03fde0f1c1e09c74bb969ffc35c6a0e75a82", 0x60}, {&(0x7f0000005d40)="ea78b00be2d7e3e6772a3c8384bf62e957fd3f61508301d365e487b87e1ce8819f20749d4a", 0x25}, {&(0x7f0000005d80)="7d8a0f8b2db127cfd920faea50d59b0f6363a80cc35969e4dc97df203738223deff340cbcd8ad0dab468fe3f74a941826b7270b1f81fead71de4cc43e92c36657fc20412cb86354bf4e058d1f2acc8bab7b7acd1e03c0e2b", 0x58}], 0x4, 0x0, 0x0, 0x5}}, {{&(0x7f0000005e40)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000006100)=[{&(0x7f0000005ec0)="d1c6967ad2cc1a253e3e08ae4d585c3dcb6b8e8fb7d2f1042cdd5e1f2d98c9194483b2006998", 0x26}, {&(0x7f0000005f00)="29b1ee63edeaea15adc967481468c2ab0a1dbb9417eadcb72e6554b49445d07767d6949c45cbc19276be8640f34d288a5dc4d5b501ad5459c47549b91a9292b7fde404af04199f01a78eb14bfa2142fd55fcd4552cbeadc74c5ddb0b66c4e561c9f85e146a167fb59b10534128295d965ac685b44d6eed10461db93d4c07cf452ef5f81ee9388289bf182e0f5be23d8e6d5623b098442c181be33b65aefb716790c8d65d0c0158dccc0d786d06d87a0920008f1103a20a8cc076c995a2cae76b0b2b58d5a1800598a1", 0xc9}, {&(0x7f0000006000)="82c8e77a489c040c09abc28ce7011a131e9635f23acfac80364083663f2c28e71af3d7195fa46ce89917b70ac69d20a9bbbdb56f11a0c6b282b5dbf92f2ea877c96a6fc00ba2fd49117b96d26803a6cfff", 0x51}, {&(0x7f0000006080)="060b5ece432be09c42eae5737d70573b63722233257e2c39ffdc492a8ce17b2556bbde09f31dbe0b5f83af9348a6cb7e33bc3494735dedd4845885e23d8a5e9d0a09e3c53ea094cdb96950dc6915b4c4f6cb3f89e93c781f34f82ca3b6d188beb73cf1a5a3516b", 0x67}], 0x4, &(0x7f0000006140)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee00}}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x80, 0x20004800}}, {{&(0x7f00000061c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000006480)=[{&(0x7f0000006240)="1cb7473071a09bb1d4c803c77a9c0b4ccbf6311d3fcb1543c28d5d54f949428adaba93e2510bf02c2463a48479ae80c5277d64474280adb0a055f5572d488d25a546b096346fdd4aca9a06f0550a4024d532da213a1a1dd5c35c6985cb97a1727bcefd6eeac12845688ea97eb3e3ae4b6fbc77454b108189b52081d4c2a956f93a9b44f28fe38eebeb5fdcf3eed40a0db994594eac4034f76f4d2ccdbe643a4fc727e01be7f62e8ae9217db22dd5", 0xae}, {&(0x7f0000006300)="4d3b8158b4e17dd6c9ac890b3924b7a81a0788b55c31fdf5f2f5fbc85535c1889e4b4c626e12498b12e0f24abf15ab359c872b3301a7c4951d1cf53eab2ee9fe40ebc88bc061fbc4d72f848665f73ac217", 0x51}, {&(0x7f0000006380)="cde958053393295ba8c8c4d047b901b611f56e8e9d82fc05e5bbf546b91b7dbe637af256df1091c3d3c0975ba5f07cf354dcc845e728ed3e9a494792fef9", 0x3e}, {&(0x7f00000063c0)="1e09b054de1c59481fdf213d6a86cdb2dd64c2a54d85a0206c9106541e40dde5d65d43ef7649323588cf60312eba527681a9360ab2d9f83cd8d2a04a59ca88efa62a97a438053146ee0ac95ef97feba56287445c8731fd3d8c0b497d6c56ea73c3bc3af2c61c3167", 0x68}, {&(0x7f0000006440)="59815aff2a217241df04e83ca0148e19b9ac9beb6b150e740d", 0x19}], 0x5, &(0x7f0000006580)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x50}}, {{&(0x7f0000006600)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000077c0)=[{&(0x7f0000006680)="15b5b5acdb432fa502e970195264e837737eedd853c4794d702b72edab585c3fc6fd17e60845a5f2f145a2dec7d63cc109e09890ddc5889365e031eeb7c0a1cd9418187a65", 0x45}, {&(0x7f0000006700)="9800d9fba5f7c78fa62df32227f20d2573246be7", 0x14}, {&(0x7f0000006740)="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", 0x1000}, {&(0x7f0000007740)="bca010b24fb8db4d", 0x8}, {&(0x7f0000007780)="2346330c3dadd32ca79cce387d03807e2bebf3d46c4e00a17136f75b50e7369d91972f72f58a943ebf19e08c6e941ae125", 0x31}], 0x5, &(0x7f0000009880)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x20, 0x2000c001}}, {{&(0x7f00000098c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000009a00)=[{&(0x7f0000009940)="76fbc84ace5a43c9929d62aef2557607d67fe31afdf7811d0225c0ea6e31eec4ab1f4007887f9a39dfa8b137129f1991b173f741e19326228ac8c35cbbcc4d909bda2f9fa85e10246bc12950ff2322940fafe65ceed73e2d0287a39aa8104dcde7edc292269e6c7a631d72e73118c116725a1c710e0fd325b029748c422b621e78e09f6e142fa1e329b233509af44b8f2d02194d9ede674ef7b8", 0x9a}], 0x1, &(0x7f0000009bc0)=[@rights={{0x2c, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @rights={{0x2c, 0x1, 0x1, [r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @rights={{0x28, 0x1, 0x1, [r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {r2, r4, 0xee01}}}, @rights={{0x28, 0x1, 0x1, [r0, r5, r6, r7, r8, r9]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0x0, r12}}}], 0xf0, 0x4850}}], 0xa, 0x20000004) 18:37:13 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xda030000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:13 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x5865, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:13 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x4c00, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2034.466239][T24620] __nla_validate_parse: 11 callbacks suppressed [ 2034.466294][T24620] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2034.582346][T24624] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:37:14 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xf6ffffff, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:14 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000040)={[{@user_xattr}, {@barrier_flush}]}) [ 2034.871245][T24619] device veth1511 entered promiscuous mode [ 2034.896421][T24619] device bridge878 entered promiscuous mode [ 2034.908873][T24619] debugfs: Directory 'hsr623' with parent 'hsr' already present! [ 2034.922415][T24619] Cannot create hsr debugfs directory [ 2034.966328][T32260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr623: link becomes ready [ 2034.986915][T24629] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2035.236047][T24645] device veth2537 entered promiscuous mode 18:37:14 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xf9fdffff, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2035.372886][T24645] device bridge1101 entered promiscuous mode [ 2035.394165][T24679] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2035.508558][T21759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr715: link becomes ready [ 2035.531895][T24619] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2035.541491][T24624] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2035.639404][T24679] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:37:15 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x6000, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:15 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xfeffffff, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:15 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]) [ 2035.992119][T24708] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2036.163400][T24717] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2036.294408][T24730] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "jzfm" [ 2036.398414][T24724] device veth2539 entered promiscuous mode [ 2036.444395][T24724] device bridge1102 entered promiscuous mode [ 2036.536757][T32260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr716: link becomes ready [ 2036.564898][T24717] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2036.940119][T24771] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2037.029212][ T1229] ieee802154 phy0 wpan0: encryption failed: -22 [ 2037.035903][ T1229] ieee802154 phy1 wpan1: encryption failed: -22 [ 2037.122705][T24775] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2038.307088][T24791] device veth87 entered promiscuous mode [ 2038.492989][T24791] device bridge46 entered promiscuous mode [ 2038.599539][T24791] debugfs: Directory 'hsr34' with parent 'hsr' already present! [ 2038.607427][T24791] Cannot create hsr debugfs directory 18:37:18 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) getuid() r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:18 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x5, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:37:18 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x101081, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x100000, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',nodevmap,mmap,pcr=00000000000000000049,obj_type=:@,obj_type=,permit_directio,smackfshat=,obj_role=@^,:^,uid>', @ANYRESDEC=r2, @ANYBLOB=',\x00']) 18:37:18 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xff000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:18 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x6558, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2038.658275][ T2936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr34: link becomes ready [ 2038.969931][T24832] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2039.173391][T24832] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:37:19 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x4c00, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:19 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xff0f0000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2040.001640][T24837] device veth2543 entered promiscuous mode [ 2040.061517][T24837] device bridge1103 entered promiscuous mode [ 2040.181836][T24836] device veth1513 entered promiscuous mode 18:37:19 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x20000, &(0x7f0000000000)={[{@nolargeio}]}) 18:37:19 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xfffffdf9, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2040.291186][T24836] device bridge879 entered promiscuous mode [ 2040.364536][T24836] debugfs: Directory 'hsr624' with parent 'hsr' already present! [ 2040.373392][T24836] Cannot create hsr debugfs directory [ 2040.380237][T24836] hsr624: Slave A (veth1513) is not up; please bring it up to get a fully working HSR network [ 2040.402916][T24820] __nla_validate_parse: 6 callbacks suppressed [ 2040.402937][T24820] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2040.420457][T24825] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2040.516524][T24849] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:37:20 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@deltfilter={0x3c, 0x2d, 0x200, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0x0, 0x5}, {0x6, 0xffff}, {0xa, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0xc6e2}, @TCA_RATE={0x6, 0x5, {0xe1, 0x9c}}, @TCA_RATE={0x6, 0x5, {0xfc, 0x5}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040040}, 0x20000000) [ 2040.743539][T24829] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:37:20 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xffffff7f, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2040.791631][T21759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr717: link becomes ready [ 2040.813496][T21759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr624: link becomes ready 18:37:20 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x6, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2040.954753][T24936] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2041.012030][T24943] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 2041.093201][T24947] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 2041.187780][T24936] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2041.266378][T24963] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2041.374119][T24965] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2041.651782][T24976] device veth1515 entered promiscuous mode [ 2041.758381][T24976] device bridge881 entered promiscuous mode [ 2041.784110][T24976] debugfs: Directory 'hsr625' with parent 'hsr' already present! [ 2041.792501][T24976] Cannot create hsr debugfs directory [ 2041.824038][ T136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr625: link becomes ready [ 2041.845944][T24994] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2041.907856][T24995] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2042.014277][T24996] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2042.157893][T24963] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2042.395804][T25000] device veth493 entered promiscuous mode [ 2042.870517][T25000] device bridge242 entered promiscuous mode [ 2042.939326][T25000] debugfs: Directory 'hsr79' with parent 'hsr' already present! [ 2042.947155][T25000] Cannot create hsr debugfs directory [ 2043.204418][T25003] device veth89 entered promiscuous mode 18:37:23 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) getuid() r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:23 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x6800, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:23 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xffffff8c, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:23 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6a71666d743d7666737630338e53997ecc4b3f38deea0e422b2c004df1c34f37ff117cefb84cbeebb42f70d28dbc57e2072a5e0f1c7b5d"]) 18:37:23 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x7, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2043.950552][T25054] REISERFS warning (device loop4): super-6514 reiserfs_parse_options: unknown quota format specified. [ 2044.195063][T25003] device bridge47 entered promiscuous mode [ 2044.411819][T25054] REISERFS warning (device loop4): super-6514 reiserfs_parse_options: unknown quota format specified. [ 2044.497976][T25003] debugfs: Directory 'hsr35' with parent 'hsr' already present! [ 2044.506334][T25003] Cannot create hsr debugfs directory [ 2044.551198][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr79: link becomes ready [ 2044.624158][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr35: link becomes ready [ 2045.231313][T25063] device veth1517 entered promiscuous mode [ 2045.323965][T25063] device bridge882 entered promiscuous mode [ 2045.352948][T25063] debugfs: Directory 'hsr626' with parent 'hsr' already present! [ 2045.361082][T25063] Cannot create hsr debugfs directory 18:37:25 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x4c00, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:25 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xfffffff6, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:25 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000500)=0xe8) syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6, 0x4, &(0x7f0000000340)=[{&(0x7f0000000100)="22c127e58431cbd5756b7485824397e48ca3a9c0befb1d38d82ed0674a85eec18e71347c8e8ff758d2ec16c55ca018f3e7f9935b31c1327e45a03377368a9fef4100d8ea0c178bbbee1ffeb82be6739c288b5acb87dd03a2e37e55c46fb9c4a2c808a462f4", 0x65, 0x6}, {&(0x7f0000000180)="1ff0002ef269100bb9fcd6cce846b251203bc113341b7cdbc5192a847d70f5d92eefa72ba695c2af856f5f86244323411798563c460f0851e0a7ba445950080ba72303ad46d917514f7d5ca15c", 0x4d, 0x8}, {&(0x7f0000000200)="4baa799ed3f6f985dbc832e2514b204e075488d7f8848fed1e97efe08702c0e16cf4dfb341e253d353fc42de8ffadab168ffcba0391d3dad203af313b7b29070ea446be0a26fbc11b4960acb4187760cc36220bed70074de9339cd247196339f64abe695b7", 0x65}, {&(0x7f0000000280)="797f710ca76188b7356c4b514fe1fe12a869f734501ef00b7521df6eddcbfdc1287eb00093151c7a149154419263d23f2aee6a3a87e0e600496df7289b000d4e242632f9d0d35aed2e21d03931f1d7f4a5aeec6894225c0641a5caf83cf7ec4c9b027c59c71da68c7fb0b0608a72e43df98b4f13055bc32177be021c6cee8e7487d92e16395c684edc08a4894be9e84d1d935f0a3f3e8072ec0be86a1275f7ef2587b91016", 0xa5, 0x4}], 0x100000, &(0x7f0000000540)={[{@nls={'nls', 0x3d, 'cp1250'}}, {@errors_continue}, {@case_sensitive_yes}, {@case_sensitive_no}, {@show_sys_files_yes}], [{@fowner_gt={'fowner>', 0xee00}}, {@obj_role={'obj_role', 0x3d, '&#&#'}}, {@euid_lt={'euid<', r0}}, {@dont_hash}, {@smackfshat={'smackfshat', 0x3d, 'reiserfs\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x7}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@dont_hash}, {@pcr={'pcr', 0x3d, 0x30}}, {@uid_eq={'uid', 0x3d, 0xee01}}]}) [ 2045.446733][T25066] device veth2545 entered promiscuous mode [ 2045.533866][T25066] device bridge1104 entered promiscuous mode [ 2045.535159][T25126] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:37:25 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xfffffffe, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2045.629112][T25076] __nla_validate_parse: 6 callbacks suppressed [ 2045.629131][T25076] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2045.722102][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr626: link becomes ready [ 2045.742861][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr718: link becomes ready [ 2045.766876][T25065] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2045.779007][T25089] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2046.038937][T25126] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2046.064283][T25068] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2046.075591][T25101] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:37:25 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2046.388800][T25079] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:37:26 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x6c00, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:26 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000014c0)={[{@tails_small}]}) [ 2046.962420][T25107] device veth495 entered promiscuous mode [ 2047.107643][T25107] device bridge243 entered promiscuous mode [ 2047.146167][T25107] debugfs: Directory 'hsr80' with parent 'hsr' already present! [ 2047.169269][T25107] Cannot create hsr debugfs directory [ 2047.224156][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr80: link becomes ready [ 2047.317828][T25205] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2047.505056][T25209] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2047.676738][T25217] device veth2549 entered promiscuous mode 18:37:27 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) getuid() r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:27 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xedc000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:27 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6a71666d743d76667376302c646174613d000000007265642c646174613d6f7264657265642c7573726a71756f74613d73797a2c626c954251c1616c6c6f6361746f723d686173686d645f72656c6fda948339d261379725ad583144c677b716fe440000000000000000"]) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) 18:37:27 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x8, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2047.787473][T25217] device bridge1105 entered promiscuous mode [ 2047.871698][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr719: link becomes ready [ 2047.885028][T25223] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2047.926815][T25213] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2048.006288][T25260] REISERFS warning (device loop4): super-6506 reiserfs_getopt: empty argument for "data" [ 2048.006288][T25260] [ 2048.188031][T25233] device veth91 entered promiscuous mode [ 2048.216838][T25233] device bridge48 entered promiscuous mode [ 2048.301188][T25260] REISERFS warning (device loop4): super-6506 reiserfs_getopt: empty argument for "data" [ 2048.301188][T25260] 18:37:28 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x1000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2050.920570][T25233] debugfs: Directory 'hsr36' with parent 'hsr' already present! [ 2050.928656][T25233] Cannot create hsr debugfs directory [ 2050.969544][T25209] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2051.143815][T25265] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2051.173041][T25282] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2051.431236][T25293] device veth1519 entered promiscuous mode [ 2051.495418][T25293] device bridge883 entered promiscuous mode [ 2051.510320][T25293] debugfs: Directory 'hsr627' with parent 'hsr' already present! [ 2051.518671][T25293] Cannot create hsr debugfs directory [ 2051.568139][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr36: link becomes ready [ 2051.598074][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr627: link becomes ready [ 2051.612973][T25297] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2051.622805][T25307] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:37:31 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) r0 = gettid() getpid() r1 = gettid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x4, 0x40, 0x40, 0x4, 0x0, 0x8e8, 0x8800, 0x42ee4b3afba477cc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x2, 0x5}, 0x50, 0x7, 0x2, 0x9, 0x5c6e, 0x10001, 0x5, 0x0, 0x2, 0x0, 0xffffffff}, r2, 0xb, 0xffffffffffffffff, 0x9) rt_tgsigqueueinfo(r0, r0, 0x400, &(0x7f0000000180)={0x0, 0xbe, 0xfffffffa}) ptrace$getenv(0x4201, r0, 0x9, &(0x7f0000000000)) 18:37:31 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x40000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:31 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x6, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000000)=ANY=[@ANYRES16]) 18:37:31 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x7400, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2051.829486][T25367] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "ÿÿ" 18:37:31 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x100000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2051.932733][T25350] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2051.984145][T25356] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:37:31 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)=ANY=[@ANYBLOB='qf-\x00 ']) [ 2052.429039][T25357] device veth497 entered promiscuous mode 18:37:32 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x100000200000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2052.544853][T25422] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "qf-" [ 2052.780527][T25357] device bridge244 entered promiscuous mode [ 2052.998025][T25357] debugfs: Directory 'hsr81' with parent 'hsr' already present! [ 2053.005854][T25357] Cannot create hsr debugfs directory [ 2053.045801][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr81: link becomes ready [ 2053.055648][T25376] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2053.097201][T25382] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:37:32 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2, &(0x7f0000000000)={[{@jqfmt_vfsv0}, {@tails_off}, {@barrier_flush}, {@data_ordered}]}) 18:37:32 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x200000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:32 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) setresuid(0xee01, 0x0, 0xee00) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:32 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x9, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2053.288578][T25456] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2053.405684][T25385] device veth2553 entered promiscuous mode [ 2053.460791][T25385] device bridge1106 entered promiscuous mode 18:37:33 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x300000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2053.569112][T25456] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2053.644838][T25400] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2053.833135][T25428] device veth2555 entered promiscuous mode [ 2053.967927][T25428] device veth2555 left promiscuous mode [ 2054.113627][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr720: link becomes ready [ 2054.570217][T25485] device veth1521 entered promiscuous mode [ 2054.619016][T25485] device bridge884 entered promiscuous mode [ 2054.646696][T25485] debugfs: Directory 'hsr628' with parent 'hsr' already present! [ 2054.654746][T25485] Cannot create hsr debugfs directory [ 2054.770897][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr628: link becomes ready 18:37:34 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) r0 = gettid() getpid() r1 = gettid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x4, 0x40, 0x40, 0x4, 0x0, 0x8e8, 0x8800, 0x42ee4b3afba477cc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x2, 0x5}, 0x50, 0x7, 0x2, 0x9, 0x5c6e, 0x10001, 0x5, 0x0, 0x2, 0x0, 0xffffffff}, r2, 0xb, 0xffffffffffffffff, 0x9) rt_tgsigqueueinfo(r0, r0, 0x400, &(0x7f0000000180)={0x0, 0xbe, 0xfffffffa}) ptrace$getenv(0x4201, r0, 0x9, &(0x7f0000000000)) 18:37:34 executing program 4: r0 = syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001200)=[{&(0x7f0000001500)="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", 0xff, 0xbe19127}, {&(0x7f0000000000)="352fd1c17f7dcd8724b2026728920e34bb8580e5c2827d2abcb616c912459fb0b7a5970d4b025ae34f", 0x29, 0x1f}, {&(0x7f0000000200)="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", 0x1000, 0x200000fe93}, {&(0x7f0000000100)="4304c91bd7ae702b5671e8c70ae8f93bbfcb2edef742eaedf0bbdc15a474fec8082699836695d0f7818af4544c077e7b00bba414e1509721350608daf8af8ce56b3413f1dd689cec9753fcd7533bc17649651c99b126631771b6a54c89be68dc3740dc066cd79b40c51483a04c409f268f11d70707784ede9fdd2c6cccbeccf953cb979e99fc6498061359f6340283833c6d527c376c64fd52352ebde4a11da7b8296a54422a5ec682f30e58bcdf899883a322c32456ddf1c204234c3d65845e7d8f81bf431d", 0xc6, 0x18b}], 0x0, &(0x7f00000014c0)={[{}]}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000001380)={{0x1, 0x1, 0x18, r0, {0x1000}}, './file0\x00'}) mount$9p_fd(0x0, &(0x7f0000001300)='./file0\x00', &(0x7f0000001340), 0x4009, &(0x7f00000013c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@debug={'debug', 0x3d, 0x400000000000000}}, {@cachetag}, {@cachetag={'cachetag', 0x3d, 'reiserfs\x00'}}, {@version_9p2000}, {@version_u}, {@privport}, {@cachetag}, {@nodevmap}, {@loose}, {@cache_mmap}], [{@obj_role={'obj_role', 0x3d, 'tails=on'}}, {@subj_role={'subj_role', 0x3d, 'tails=on'}}, {@dont_hash}]}}) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000001280), 0x1000, &(0x7f00000012c0)={[{@nfs_export_off}], [{@permit_directio}, {@context={'context', 0x3d, 'root'}}, {@dont_measure}]}) 18:37:34 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x400000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:34 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x7a00, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:34 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xa, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2055.475391][T25582] loop4: detected capacity change from 0 to 250257 18:37:35 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x500000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2055.698753][T25568] device veth499 entered promiscuous mode [ 2055.747449][T25582] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2055.773221][T25568] device bridge245 entered promiscuous mode [ 2055.815945][T25568] debugfs: Directory 'hsr82' with parent 'hsr' already present! [ 2055.824137][T25568] Cannot create hsr debugfs directory [ 2055.860972][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr82: link becomes ready [ 2056.012354][T25582] loop4: detected capacity change from 0 to 250257 [ 2056.069515][T25591] __nla_validate_parse: 10 callbacks suppressed [ 2056.069607][T25591] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2056.112107][T25582] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2056.141203][T25629] 9pnet: Insufficient options for proto=fd 18:37:36 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x504000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2056.433688][T25593] device veth1523 entered promiscuous mode 18:37:36 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="6a716e89743d76015c76302c0045017d4943c5ac215c0adc4862004c0148539fdf2d0345930d4d6da6b4bdaf2e526cf0fe76ea65d5fed17b660de642994ad92168191d17103377b2531d1e446e7b9b"]) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x4e24, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r1, 0x8907, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e21, @private=0xa010100}}}, &(0x7f0000000440)=0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={r4, @in={{0x2, 0x4e22, @loopback}}}, &(0x7f0000000540)=0x84) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r2, 0x8907, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000280)={'veth0_vlan\x00', 0x50e}) ioctl$AUTOFS_IOC_EXPIRE(r2, 0x810c9365, &(0x7f0000000100)={{0x0, 0x2a}, 0x100, './file0\x00'}) lseek(r0, 0xffffffffffff6a2d, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) [ 2056.661698][T25593] device bridge885 entered promiscuous mode [ 2056.761508][T25593] debugfs: Directory 'hsr629' with parent 'hsr' already present! [ 2056.769581][T25593] Cannot create hsr debugfs directory [ 2056.871962][T25594] device veth2557 entered promiscuous mode [ 2056.912571][T25656] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "jqn‰t=v\v0" [ 2056.925748][T25594] device bridge1107 entered promiscuous mode 18:37:36 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x600000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2057.149471][T21759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr629: link becomes ready [ 2057.172794][T21759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr721: link becomes ready [ 2057.194538][T25597] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:37:37 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) setresuid(0xee01, 0x0, 0xee00) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:37 executing program 4: r0 = syz_io_uring_complete(0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f00000001c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r1, 0xffffffffffff6a2d, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000180)=r1) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x0, 0x200, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8004004}, 0x0) syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:37 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xc, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2057.978222][T25703] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2058.162742][T25706] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2058.197608][T25704] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:37:37 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x700, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:37 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x8100, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:37 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x700000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2058.388733][T25704] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2058.433769][T25709] device veth1525 entered promiscuous mode [ 2058.501828][T25709] device bridge886 entered promiscuous mode 18:37:38 executing program 4: r0 = syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaac46, &(0x7f0000001200)=[{&(0x7f0000000100)="3519a79d358050921195e446dfbd7e6bf8ed0002ff144f8c9b80ece68489e2e7ee1c3360ce56aa69ab666da9e9e0740fdcbd365a62c2024b0ebe5f6f6a576563ec90e8bf0cfcf391b279b3fb33dc0bd92c9e7911e792f15a79202369a0c08867df16026aa645d289f8628b168e88e9de6dea061caea85dac8459b8be0ccf3de7f962170cb97b266b1039b8558088bacdbeb99d4745f67752b6956f82f1d968ea7d3da226a7bc46877eae938644c8c76e65c535d65a1ea614a458eb596bc69db00b93133b1d5d512fba6aff21580253ea35948812b18a422ff4207869fe7bffedd11f89824b2a73d100bf07cfcf5c7c8833355cc2c9760150fb7c1575aeeb7267681d991b2023930812a2fa3548564442888413e3916d0385b06c0dc66b35e52304f8ade64862f51e0d4cc838ce9e725627a0a7a6e16edc89c9d75a224161f8e16ab6554b855c6a06a4e1cc988f12ae4283bcc5f187909024904de369ddd25d0d97fc1cbb9bfe00b2ecec5cff6bc8ebcf87a30e7efcdd5a096b794a6a04811fbcaa370eff0a16b0fa982a99f8463150b3cb51377dc09866c7c87120a5e2f9f1a469bb4602ad9c6c4ca46074fcd7fae3dbba2ba9dc4c2c4437bcf184447a1d88bc7a13bda845fdab73bdc6a17b405a18163f0777901e283b737090bc57a24f1fa2d37c8afe9a48bd633430b2657d3b42d323a8d2fa0032d6cdd4d79c0b31e2e15dcc2667f18c09c0762ad38a9f0240f35e27d3aa61ad7c8aad1ecf715351cb80ad760a61358636a86c4994320d75ec80f613439de5d61cc82db23fa68c9ad4f295fdaf099b42a36bb674af54ab754173a06d681a9c47b1efd2437a33dbb3e341e35c2b5afb71d822a1b97594c2265b3e55fb98ff1ccfea8a9c32d9d2e0894eafd9ebba04dcd5a646066fd923344a7891fb7ae09271c20c62beb9f79a0450ab943d44b3104379b42919417b6d5382edd21d42e3cc2e949ef7e66dc8c914bc5f61c3f1bd9550211fb63c99480712cc64fcf5a7802f6c50a2aa30cc7684ad4b7e4211795614310b45934cad29e63ce05c1dde5b70c3d0f5129a74f9a4b2a33fe625c011c5ce7ab746ba547c685de1d4f951462301fdc110331d65ce162cf5659ff1fef13a0ec7beffab44181df1ca56a4b6b642ff1c12c0c9669d8dc2fd318875d951159dc6e91049eec9edba0e76e9165c26cb5a72d21144f367338a250296e7a9dbbd06833abfdbb901743eaf7b31f725ca68700feb68755ed20dc63c00f80c7e434ea87e477fc40997e8fb11a07ffba4d6799361e64bb13010decafb6596435afbb2d02c17cd2c1306a085902a16feee17f90aa598d409d8ba6724e54a26dffb691a5f9e672d9550e3d2c9c835dca72ee966003c912d7c2821b6e4b20b94ec20a62db5803a82019d425b656fcadf9c320d62b0d3d5c9720c5cbdcdcfc835d1018799a272716c625e3fd46da0899e23c1e0ebbaa21ba6fb7d774600acd8fe5db6cc59e1a942bfbba6db2b70916d507db6310669ca2deffa731cd4d475941a75478932ccfdb75b7e2c9ace3f277b6dcb48fcfae897c61be617c2a089c54058ca74284c334bffdbd1ba1e3abe2927438945d0ae676831b64988d8d1e6920047b2a49bd4c9a5952211e2a76740d3b2ec78029287eb8e556448f2bcd78f88ab757291a286822fa489b668a5bf327570a709e4c863cc6c73c9bcfe5780d361430d58e24a4253061670f6aa9230fbe60ca56435f602197c6e52b73183bca4aa51838b811aa46add1137738398fada18fd8425e89a87bf274247e4bf563af669bf7673d977c173f44d8af28b4dd72a2051b608ef446a65d1070f6348cc089d815ce800e6b39d810ac43a5c3816bf4d13793cfb525d4d894dfae46aec7351b01dddeb928f2f871b9ad67383462046ba1055f13753a3faf69df3c9f6f2253e80e36661928c59c2c9624e0cd63b932afe6b9a39aa11972a49f45b32f837893467b48ec63588360bbd2e2630628da0f6c3b0e8a5fe68e79af1dc665e88af6f6965715c27c5ca182f4dd49e9f5211df76e60571c1d2985cfcf85440e87c1e9c2fe4350b5750e4a1cfe6062b4f83be7295304f933a33224bbb513f6e8ccec9b8596cfbde1824a8839f8061fc335c4f197ecd45294d2862faae055028c368836162f63fae41de219b6bb3d7f46f5aeb60dcca2080be648bd281660bc85663adf371bd744631b17209a409cdfe9c60471b95d0d35d0417e94cb4da123840637eeffa7159a7655da18013cdc4cffb82ac47d9c07afd791ea0f1df5bf064487fdf04ee15834627f2beec456d6709552835c792df0a81892373781465e5094a8a4d8193d7d66af7ef766b78d48cb417d9d363f9c5d4050c7c668fa0d6eb1e21a47e61756b57cb5eec879ab498a938e48b237daf90e0df2870c2c500c613f084b615b2693c265e3b36fae59048f73012a39a585a590c79959c2193093717bd75d75b905827309745dfcff71460e762806f7631f82d1ee7571bb62f6f2dd6c645251927a80679ba9bdecae87ddda9d9df2b0d4394d767e6b725a68567d727a0b16db26c343d0d2ed9a0afce26887d7cbf01f5ddee58ca1aab66a87423207720b6cde303bf402257e886328db791eb4aabc4fb79c9126eddcd4ef728403a0f0bb4bbd8e63d4380f07053956265d4a87a57d4cdb62e0f673a4f163729521774776d9ef43d64143cf28170d711f91e29206683a00ccfa65013654a4dc3f5c6cf711e044c251317a3c0979baceeaa3aac5ea167c5c41c86c14802b28f8290518b732ed7b062fe92f74271b5c9858f631520c7c04a40b0d5d75f084dcd252f85a42a28492dcfbf0fe8d3ae1ed32c51375e481f027851530910d595adc66ae9f1c645eb30dedf966a8946ad2233e57d44cb751956058f0dae773b8d343bc6e1d21d9256fdc83d28c9e3be369cc6756c6e03762370e0479c84d04761fbec6a2066f70a4b89ba4e4aea37e23e53ea47f5851caa7d06e762d1056a6f7f4b81e09308baafb22f265d7008c1afbceee962dc172f7e669f1cb4b05ec33e55fc2617c9709cffdd04c73f74a35698ebc220db32201511d8b5b98a0e387140096abc8beb0c566a83e5729b7e284eb67006cb6090b995cbf3cb4b25e68e141dde388c8b4a9b9ef5de806bb3da9fcde83bc19ed5eff85be19b639e434108138065e52dddea746c5faa1442dd17863fcf4f7eb846f9bb39bb03fcad26959414f45015ad74023c567fec9e64edbcabd46ec21c477a029229abd10eae8e707649b2b670e833ab9134502c2e086fcc330cb371871acb0fd9023035f15623963443785b572fd0ad842b784e7e00396fcc1b162730f300cb07c87779c1bab27b69d28ffdf4835974cb4b62d0962d90694bc0054e4a33febe3ce299dac073ba34d7ef78d56374513a03b7e1ec180b50f2be8c9ddf04ca4d9f47ed5c01d3e2b6983ebd01ff943644fba941ccdebbb979cb318f5ac73bf8741dd756022e7e5e3badec061b04672f0b9b9fc54a86cbb18968667f8570749bf260f316f5c9ac379ac341d91cff72eaf1ec636fc87f90a103577dfa95f03df627fc1394d3e24a2111846799a4199d42ad0cc82d58c04f21c13e3854ac8ffc0458aeaf9bf7e6b26380737ef3d720519ed8cb8e0658828271ac2067b8bb6780f57797c0b1fc10766eb944a39315003fad4950b3032b7963c016327e07f2972f8480070bcd4b7ac7d0544380a2b0c3ed9adcf2924db4a758a0511c05af80b131d9019e3f4164b8d5263a3ee0864d3a891115d1dccf3897a2fd9b84179525159bd9e0bf3d7ada51cd60a8d4c306ed98cb6feab3965138e5bb222ca0cf21fc55e9db2cc91854bfd2c61e8a7e35a10fa5481c8b7cd786093154dbce446f9cc20aedca0b22ca1d2ce9a38062e72ca5d582968b6462fcf2f3fa91ebab3e19dac5de1f4d1d120275477e381bb03bc9be04ffadc8e233537e18b855e69f39d31d09abe5fdd267a29320230b750850535533e51c884ef34da47a7852653d1f40662e99bf268ed1266fa1bc21c6b2b533e81ea0945de0ec04205c105254863f8372e394b986a7058a6f0727278a55aa4772580844a386bd5e8ab9e9dfb48dff18ee64cd0b689d6f1c3d1ec255e611c766b765f099648592d2906d93c144f26e4b94f7d5545520eed40c042aeec593d0c890f17d446c8665ebb5c8595207d074f0d92d1e8ccc3af27c0ecbf9a06e9e95735e1ff0d94350f8157a2455005687d53f3aef5ad947dbc75e7161c9a50f10a533e871257f3f040fdaac0a45f5f3732173c984da4ce32bab4f58f4c7dc4883eafc1bd959156448c654ce530337b2e6e1cb238540f722e6b98a56ac961790948c40ee2271daf099722ded1aecd595dd6ecfd9c6a7800ee84109436e26afed297ff95d65a084b113f241efef325e241d30afc9d95b97bc5af480d702a73163d8edd9278c80d667936f32e22f5649e8c88efff301540c9d52365955716c4c5f280bf2f00eb66ce4342b7674c0a13402077880211ee5e611fb4644cea0e4027a899601609436829da6d3f2ff8668ea04f812d8ba282102c574913236308f2aa64a5017a19c1bb969bfcc4030b6249af18aa344f31050cadbe190397933f97b3a94685b8c75796bee18b796970904c64094283b59fd0dff5ffe4289b5fdd7a59dc83627616250493797c2fd883eb0e908e9530cf871c335412d611b13a01921c1301b82dac9cd5d829ebe4093880172e5d5032903f9103ce612639059d7bd6c387d0a14a55b5c33e470e434fd3d00125b2c4259be3b85eea1c31567896d284d0e60e7eeb4c8872479efae72998f588dd19dab0be3d2717da9ce350352063bcb52381ce332d81edc5a909fdad4cec4d2897f6971218acddcfbb55b9b1731e167e6b73b619fc2b343c6fdff66a0dff33888ba0c09e4f54ebc29a33143f927adf240af3f8430c26cc48983d21beb200f44b7a5633e7c6fa88456d9db0a5ff30c0babb8f15baae3aab54f6db420a70df53e6ea8e0fc5362c9ce8cddecc49bc1f7ca5a115cb92dd7427985c4eaf7520e4fde7612b90f5580ee1d842a13d1c981de1e879e5cb22ce94a07863942dc3f69a070a99770567134a314384afd2fa15d2d11838b09eb9b29784f41f5ec109a9eccb1df59f1d4997fa7405f90c03d29c419489646295d331851e9376818e3bb8ca4da33ef2b0b73f5c0a90a3279041e2fa6e8215ede9a2d55ad61161bfc231e3fdbd0a9c008f5aad9592cc59c99e349fb7db1fb0978c6d7c20e7ff0edf64b8b4a8f06851667043afb596f9eba7ed769471157117694349564cbb55099d513724f7196bbceae338684ce0917bfdd288d586c6e6dc298544d32dc8cb9824f50cb00270e122339127990c9bbb196b183c18b0f70c704aa41918ae4677560cfec4a04acfcc26cea16e14ed907ed16f62128e238f629c62a5aab713958dc516a4487ee1bcfa92be24fc27cb325e81673bc1039e5db0511f3fccbeba0922df0e19438a5236ea5abc762e8a828d84e837fa20d71446a7a16815236e9c9dfd7218e487bd9ae2231ea5221cef64e921798832b84d5ae660b4e7205d441524347c8720d8c20a28cbe2487e1943e9193747aab55fadcab144db4d4ae50060d3e9da9d09720490dd8de3d6237025db0af42055480b9b3979d666c051cccc11fd25f4c2d1766c1d4e3f5bd82770707e27584869d281aad1bc3cfd7b2e10ca461299ab79ab1f6512af6eed634bade1b0fd742141e6681ac670ec64d85d9d42dd390b9b0fc5163b4c4982bd40d8e36df470e0aa6", 0x1000, 0x8000}, {&(0x7f0000001100)="1ad94e13628bc032e2413727f09b8c05a6c954f69031b85bc93894f9c7889a868d336d3203939d371ac905785384e50d475f95b92c6f1ab47d5530707e7f0165f43a2b22ad9c387bd2b05d50ba7d3325d7d225064d09ebf258ca59f836c08d9c7e0b19fdd4cc5a75c394254558fe7ba5e33a78568a8e45f8146aba312518c710220a0c8dd289618a45f4c68e8b6d3f886d2df8476cce5ee7f95c3a91a41f079b95505346e8185ae8100c5e8dcb8d917779118d6b2a05d8514c470daaf541d358afccb469f99080a9bc67f67ec584d7cc5cbb65d126c5349ae3ac730325ff679c0b7cec9affc43960a9b111b2ec252d51bf", 0xf1, 0x1000}, {&(0x7f0000001500)="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", 0x99, 0x1001}, {&(0x7f0000000040)="08a1ee92bf57f6d71e8e5d000000005dc28f7129698c708d24e7da27fd06ee9ee55e809b866de5bbc45423999919ff974cba63d0b2f378e5de6ce99a68", 0x31, 0x40}, {&(0x7f00000012c0)="3bd6a398130acc7a59851c63c8a36ed096cbba2cba4ce162629e9e692d9bdd0419b9195c48ae19592a4a1e81f400fcbf784fee276e57019390370faad577191d4508d4c234485e886e3b421c01d1f2e1bc19de1165a4946ae7eebe6ee87d22c330e78ad3316e695a709b812df08de293969784ad", 0x74, 0x5}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='tai\t\x00\x00\x00n,\x00']) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r1, 0xffffffffffff6a2d, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005640)=[{{&(0x7f0000001380)=@abs, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001400)=""/48, 0x30}, {&(0x7f00000016c0)=""/213, 0xd5}, {&(0x7f00000017c0)=""/226, 0xe2}, {&(0x7f0000001440)=""/190, 0xbe}, {&(0x7f00000018c0)=""/181, 0xb5}, {&(0x7f0000001980)=""/193, 0xc1}, {&(0x7f0000001a80)=""/66, 0x42}], 0x7, &(0x7f0000005a80)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000100000000000000001000000010000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000097c15139354a1b5d0cfa7d1920f2a336bd9c225cc1653bf53f1b16be09ad7575eb206f6f108dcd59e87d9246a4e6"], 0x108}}, {{&(0x7f0000001cc0), 0x6e, &(0x7f0000002180)=[{&(0x7f0000001d40)=""/86, 0x56}, {&(0x7f0000001dc0)=""/21, 0x15}, {&(0x7f0000001e00)=""/129, 0x81}, {&(0x7f0000001ec0)=""/141, 0x8d}, {&(0x7f0000001f80)}, {&(0x7f0000001fc0)=""/26, 0x1a}, {&(0x7f0000002000)=""/154, 0x9a}, {&(0x7f00000020c0)=""/103, 0x67}, {&(0x7f0000002140)=""/53, 0x35}], 0x9, &(0x7f0000005bc0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c010000000000000100000002000000ac8cfef3d6f6614921d5706816954775c9e3c9f5dd7d1e70a9c25df8d863f527b39544ba0fc10fc2c19b99f2a23fd94bea73488342f909e13f89c33f39203747d00fe8567597e72471750ff78da92d47bb70f4401a530001da123ddf40000000000000000cc93460f905d20c8bacbf71817af4dc9915876476b9eb6ac95e8f4aab7359b4dc3ef5d4ad23cb8fa0485a7e25f8a684b5ec9ffecc7227322953d1c4438320f29a1d864b0183ab44b8122898fa2475c042d9de1f5e6caff9bf4ce255", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x130}}, {{0x0, 0x0, &(0x7f0000002680)=[{&(0x7f0000002380)=""/179, 0xb3}, {&(0x7f0000002440)=""/61, 0x3d}, {&(0x7f0000002480)=""/132, 0x84}, {&(0x7f0000002540)=""/52, 0x34}, {&(0x7f0000002580)=""/196, 0xc4}], 0x5, &(0x7f0000002700)}}, {{&(0x7f0000002740), 0x6e, &(0x7f0000004ac0)=[{&(0x7f00000027c0)=""/167, 0xa7}, {&(0x7f0000002880)=""/66, 0x42}, {&(0x7f0000002900)=""/93, 0x5d}, {&(0x7f0000002980)=""/4096, 0x1000}, {&(0x7f0000003980)=""/23, 0x17}, {&(0x7f00000039c0)=""/32, 0x20}, {&(0x7f0000003a00)=""/4096, 0x1000}, {&(0x7f0000004a00)=""/125, 0x7d}, {&(0x7f0000004a80)=""/62, 0x3e}], 0x9, &(0x7f0000004b80)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x138}}, {{&(0x7f0000004cc0), 0x6e, &(0x7f0000005100)=[{&(0x7f0000004d40)=""/199, 0xc7}, {&(0x7f0000004e40)=""/36, 0x24}, {&(0x7f0000004e80)=""/229, 0xe5}, {&(0x7f0000004f80)=""/72, 0x48}, {&(0x7f0000005000)=""/35, 0x23}, {&(0x7f0000005040)=""/41, 0x29}, {&(0x7f0000005080)=""/72, 0x48}], 0x7, &(0x7f0000005180)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f0000005540)=[{&(0x7f00000051c0)=""/187, 0xbb}, {&(0x7f0000005280)=""/79, 0x4f}, {&(0x7f0000005300)=""/64, 0x40}, {&(0x7f0000005340)=""/134, 0x86}, {&(0x7f0000005400)=""/102, 0x66}, {&(0x7f0000005480)=""/138, 0x8a}], 0x6, &(0x7f00000055c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}], 0x6, 0x2, &(0x7f00000057c0)) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001b80), 0x101000, 0x0) ioctl$FIGETBSZ(r5, 0x2, &(0x7f0000001bc0)) r6 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000001c00), 0x80100, 0x0) r7 = fcntl$dupfd(r4, 0x406, r6) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r7, 0xc0984124, &(0x7f0000002240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) r8 = userfaultfd(0x80800) ioctl$AUTOFS_DEV_IOCTL_READY(r6, 0xc0189376, &(0x7f0000001c40)={{0x1, 0x1, 0x18, r8, {0x10001}}, './file0\x00'}) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r9, 0xffffffffffff6a2d, 0x0) openat$cgroup_ro(r9, &(0x7f0000001c80)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000001280)='./file0\x00', &(0x7f0000001340), 0x200000, &(0x7f0000005800)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r3}}, {@debug={'debug', 0x3d, 0xfffffffffffffffb}}, {@mmap}, {@access_user}], [{@fsuuid={'fsuuid', 0x3d, {[0x62, 0x36, 0xd, 0x31, 0x37, 0x64, 0xc7, 0x31], 0x2d, [0x65, 0x63, 0x31, 0x50], 0x2d, [0x36, 0x35, 0x64, 0x61], 0x2d, [0x31, 0x37, 0x65, 0x32], 0x2d, [0x31, 0x2, 0x32, 0x32, 0x38, 0x37, 0x33, 0x38]}}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<', 0xee01}}, {@permit_directio}, {@hash}, {@obj_role}]}}) readv(r2, &(0x7f0000002700)=[{&(0x7f0000001f80)=""/51, 0x33}, {&(0x7f0000005900)=""/227, 0xe3}, {&(0x7f0000005a00)=""/98, 0x62}], 0x3) [ 2058.640547][T25709] debugfs: Directory 'hsr630' with parent 'hsr' already present! [ 2058.648796][T25709] Cannot create hsr debugfs directory [ 2058.657468][T25709] hsr630: Slave A (veth1525) is not up; please bring it up to get a fully working HSR network [ 2058.722743][ T136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr630: link becomes ready [ 2058.743888][T25744] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:37:38 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x800000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2059.167734][T25753] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:37:38 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xe, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2059.332250][T25775] uffd: Set unprivileged_userfaultfd sysctl knob to 1 if kernel faults must be handled without obtaining CAP_SYS_PTRACE capability [ 2059.426477][T25747] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2059.508062][T25744] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2059.517599][T25758] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:37:39 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r0, 0xffffffffffff6a2d, 0x0) ioctl$SNDCTL_SEQ_SYNC(r0, 0x5101) 18:37:39 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x900000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2059.766415][T25759] device veth2561 entered promiscuous mode [ 2059.811104][T25813] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2059.831902][T25759] device bridge1108 entered promiscuous mode [ 2059.963501][ T136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr722: link becomes ready [ 2059.990395][T25788] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2060.098873][T25813] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:37:39 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xa00000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2060.642709][T25818] device veth1527 entered promiscuous mode [ 2060.674195][T25818] device bridge887 entered promiscuous mode [ 2060.690481][T25818] debugfs: Directory 'hsr631' with parent 'hsr' already present! [ 2060.698712][T25818] Cannot create hsr debugfs directory [ 2060.774550][ T136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr631: link becomes ready 18:37:40 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) setresuid(0xee01, 0x0, 0xee00) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r5, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r7, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:40 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x8803, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:40 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) setpriority(0x2, r0, 0x7720e4fe) prctl$PR_SCHED_CORE(0x3e, 0x4, r0, 0x1, &(0x7f0000000040)) 18:37:40 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000400)={@qipcrtr={0x2a, 0x4, 0x2}, {&(0x7f0000000380)=""/16, 0x10}, &(0x7f00000003c0), 0x5}, 0xa0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x7010, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1c00}}], [{@appraise_type}, {@fowner_lt={'fowner<', r1}}, {@audit}]}}) 18:37:40 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x10, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:37:40 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xb00000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2061.151591][T25902] __nla_validate_parse: 2 callbacks suppressed [ 2061.151630][T25902] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2061.282310][T25907] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2061.417401][T25903] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2061.473499][T25901] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2061.729909][T25913] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2061.824261][T25903] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:37:41 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x1000000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2062.032663][T25901] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2062.193960][T25918] device veth1529 entered promiscuous mode 18:37:41 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x800000, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_L}, {@version_u}], [{@euid_eq}]}}) [ 2062.317116][T25918] device bridge888 entered promiscuous mode [ 2062.338320][T25918] debugfs: Directory 'hsr632' with parent 'hsr' already present! [ 2062.346497][T25918] Cannot create hsr debugfs directory [ 2062.377914][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr632: link becomes ready [ 2062.406443][T25907] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:37:42 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x12, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2062.858452][T25992] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 18:37:42 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xd203, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:42 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x1f00000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2063.125530][T25992] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2063.291170][T25993] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:37:43 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2000000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2063.655203][T25994] 9pnet: Insufficient options for proto=fd [ 2063.740468][T25995] device veth1531 entered promiscuous mode [ 2063.835817][T25995] device bridge889 entered promiscuous mode [ 2063.855221][T25995] debugfs: Directory 'hsr633' with parent 'hsr' already present! [ 2063.863450][T25995] Cannot create hsr debugfs directory [ 2063.889898][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr633: link becomes ready [ 2063.902094][T26026] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2064.094753][T26032] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2064.404349][T26033] device veth2567 entered promiscuous mode [ 2064.481205][T26033] device bridge1110 entered promiscuous mode [ 2064.764965][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr723: link becomes ready [ 2067.063961][T26073] device veth503 entered promiscuous mode [ 2067.102458][T26073] device bridge247 entered promiscuous mode [ 2067.119693][T26073] debugfs: Directory 'hsr83' with parent 'hsr' already present! [ 2067.127604][T26073] Cannot create hsr debugfs directory [ 2067.169217][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr83: link becomes ready 18:37:46 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:46 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2010000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:46 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="8f07f545b0308a27286a71666d743d76667376302c00"]) 18:37:46 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x25, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:37:46 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xd605, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:46 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) setpriority(0x2, r0, 0x7720e4fe) prctl$PR_SCHED_CORE(0x3e, 0x4, r0, 0x1, &(0x7f0000000040)) [ 2067.371921][T26134] __nla_validate_parse: 6 callbacks suppressed [ 2067.371943][T26134] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2067.496445][T26138] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2067.540041][T26135] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "õE°0Š'(jqfmt=vfsv0" [ 2067.577876][T26136] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:37:47 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x3f00000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2068.086129][T26138] device veth1533 entered promiscuous mode [ 2068.141602][T26138] device bridge890 entered promiscuous mode [ 2068.147340][T26135] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "õE°0Š'(jqfmt=vfsv0" [ 2068.180323][T26138] debugfs: Directory 'hsr634' with parent 'hsr' already present! [ 2068.194897][T26138] Cannot create hsr debugfs directory [ 2068.231865][T26134] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:37:48 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4400000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r1, 0x8907, 0x0) ppoll(&(0x7f0000000200)=[{0xffffffffffffffff, 0x2c}, {r0, 0x2200}, {r1, 0x8488}, {0xffffffffffffffff, 0x9150}], 0x4, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)={[0x10000]}, 0x8) syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="0f9c0c06619a9e866faae022c13b2e8b6a4c39fb3abf6c61219d95d06fce8d5dee8a1af6aee04f66f36cd016d85f653ad939d1237c87476c10ca37b550a318821cfb4b3038180acc035462703e2514c70c26515cc45c5c72958805ffdd25b7ac1199cc51dc1c885593eafeb6bb2c38bcaeddc4f27ba66fb64ad75b753ed6429095e41bffdc2a0c22e8c735548f31071907a3a74b9c37f2b2c948fb55264607ff8942cda1f460b7bc0f81fa363429d3d53fb5028c809ddba332316148886066a3b0258b5db22dfc6ea9a3c7e2532f648f3aeb13f45e78e52b8dd4586ebcd9dd4a8d775ce026a006", 0xe7, 0x5}], 0xd800, &(0x7f0000000000)) [ 2068.570391][T26139] device veth2571 entered promiscuous mode [ 2068.719885][T26139] device bridge1111 entered promiscuous mode [ 2068.841003][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr634: link becomes ready [ 2068.877503][T26224] loop4: detected capacity change from 0 to 264192 [ 2068.949654][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr724: link becomes ready [ 2068.957711][T26136] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2068.958808][T26138] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:37:48 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4800000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2069.262688][T26149] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2069.272806][T26197] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:37:49 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x48, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2069.453680][T26248] loop4: detected capacity change from 0 to 264192 18:37:49 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xd712, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2069.771222][T26274] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2069.950667][T26275] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2070.273589][T26278] device veth1535 entered promiscuous mode [ 2070.348308][T26278] device bridge891 entered promiscuous mode [ 2070.398672][T26278] debugfs: Directory 'hsr635' with parent 'hsr' already present! [ 2070.406746][T26278] Cannot create hsr debugfs directory [ 2070.413243][T26278] hsr635: Slave A (veth1535) is not up; please bring it up to get a fully working HSR network [ 2070.473534][T26283] device veth2573 entered promiscuous mode [ 2070.509072][T26283] device bridge1112 entered promiscuous mode [ 2070.584441][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr635: link becomes ready [ 2070.596818][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr725: link becomes ready [ 2071.318156][T26328] device veth505 entered promiscuous mode [ 2071.490027][T26328] device bridge248 entered promiscuous mode [ 2071.511672][T26328] debugfs: Directory 'hsr84' with parent 'hsr' already present! [ 2071.519783][T26328] Cannot create hsr debugfs directory [ 2071.528547][T26328] hsr84: Slave A (veth505) is not up; please bring it up to get a fully working HSR network [ 2071.585486][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr84: link becomes ready 18:37:51 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:51 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x4c00000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:51 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xf000, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:51 executing program 4: r0 = syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)=ANY=[@ANYBLOB='kqfm\x00\x00\x00\x00\x00\x00\x00\x00\x00']) openat(r0, &(0x7f0000000000)='./file0\x00', 0x7a003, 0x1) 18:37:51 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) setpriority(0x2, r0, 0x7720e4fe) prctl$PR_SCHED_CORE(0x3e, 0x4, r0, 0x1, &(0x7f0000000040)) 18:37:51 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x4a, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2071.914248][T26374] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "kqfm" 18:37:51 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6000000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2072.148318][T26376] device veth2575 entered promiscuous mode [ 2072.205006][T26374] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "kqfm" [ 2072.284721][T26376] device bridge1113 entered promiscuous mode [ 2072.400519][T26397] __nla_validate_parse: 8 callbacks suppressed [ 2072.400539][T26397] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:37:52 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6a7166d7c6d6ac635b21a4cf3d708b11996d743d76e140b9de5917"]) 18:37:52 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6800000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:52 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xfeff, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2073.118187][T21759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr726: link becomes ready [ 2073.165606][T26445] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "jqf×ÆÖ¬c[!¤Ï=p‹™mt=vá@¹ÞY" [ 2073.266731][T26409] device veth1537 entered promiscuous mode [ 2073.340484][T26409] device bridge892 entered promiscuous mode 18:37:53 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x6c00000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2073.412129][T26445] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "jqf×ÆÖ¬c[!¤Ï=p‹™mt=vá@¹ÞY" [ 2073.460558][T26409] debugfs: Directory 'hsr636' with parent 'hsr' already present! [ 2073.478565][T26409] Cannot create hsr debugfs directory [ 2073.485086][T26409] hsr636: Slave A (veth1537) is not up; please bring it up to get a fully working HSR network [ 2073.507796][T26415] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2073.655805][T26443] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2073.775288][T26451] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:37:53 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@rc, &(0x7f0000000100)=0x80) [ 2074.092554][T21759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr636: link becomes ready [ 2074.180864][T26457] device veth2577 entered promiscuous mode [ 2074.201313][T26506] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2074.328638][T26457] device bridge1114 entered promiscuous mode [ 2074.375403][T26457] hsr727: Slave A (veth2577) is not up; please bring it up to get a fully working HSR network [ 2074.417705][T26462] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2074.437924][T26504] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2074.616335][T21759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr727: link becomes ready [ 2074.820326][T26538] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2074.955164][T26541] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2075.035202][T26543] device veth507 entered promiscuous mode [ 2075.100149][T26543] device bridge249 entered promiscuous mode [ 2075.123391][T26543] debugfs: Directory 'hsr85' with parent 'hsr' already present! [ 2075.131211][T26543] Cannot create hsr debugfs directory [ 2075.152634][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr85: link becomes ready 18:37:54 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:54 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x7400000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:54 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xff0f, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:37:54 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x285080, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:54 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x25, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:37:54 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x4c, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2075.471093][T26563] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2075.587017][T26569] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 18:37:55 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x7a00000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:55 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6a71666d743d59667376302c0014de64dacd764e7f0bf6a403796671f295daf418c064d62c1d409bfac7f49a79fc20a79432985ea1e95af97444e75343b1c320711d1f53ddf85f"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x216840, 0x80) [ 2076.006761][T26581] device veth2581 entered promiscuous mode [ 2076.090333][T26581] device bridge1115 entered promiscuous mode [ 2076.150959][T26581] hsr728: Slave A (veth2581) is not up; please bring it up to get a fully working HSR network [ 2076.210757][T26567] device veth1539 entered promiscuous mode [ 2076.328169][T26567] device bridge893 entered promiscuous mode [ 2076.340502][T26636] REISERFS warning (device loop4): super-6514 reiserfs_parse_options: unknown quota format specified. 18:37:55 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x8000000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2076.415367][T26567] debugfs: Directory 'hsr637' with parent 'hsr' already present! [ 2076.423250][T26567] Cannot create hsr debugfs directory [ 2076.463757][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr728: link becomes ready [ 2076.476599][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr637: link becomes ready [ 2076.580015][T26636] REISERFS warning (device loop4): super-6514 reiserfs_parse_options: unknown quota format specified. 18:37:56 executing program 4: ioctl$FS_IOC_READ_VERITY_METADATA(0xffffffffffffffff, 0xc0286687, &(0x7f0000000200)={0x1, 0x4, 0x2b, &(0x7f00000001c0)=""/43}) r0 = syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)=ANY=[@ANYBLOB='\x00'/13]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r3 = socket(0x1d, 0x2, 0x6) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140), 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=@ipmr_newroute={0x2c, 0x18, 0x20, 0x70bd26, 0x25dfdbff, {0x80, 0x784fcead48285ce6, 0x0, 0x40, 0xfc, 0x3, 0x0, 0xa, 0x400}, [@RTA_IIF={0x8, 0x3, r4}, @RTA_GATEWAY={0x8, 0x5, @broadcast}]}, 0x2c}}, 0x40000) setreuid(0x0, r2) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SIOCGSTAMPNS(r5, 0x8907, 0x0) dup(r5) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r6, 0x8907, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r6, 0x80049363, &(0x7f00000002c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x2081001, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) 18:37:56 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x8001000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:37:56 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xff7f, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2077.147449][T26687] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 2077.431799][T26707] __nla_validate_parse: 5 callbacks suppressed [ 2077.431834][T26707] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2077.639057][T26711] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2077.898615][T26707] device veth2585 entered promiscuous mode [ 2077.986299][T26707] device bridge1116 entered promiscuous mode [ 2078.112018][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr729: link becomes ready [ 2078.136498][T26679] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2078.258661][T26721] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2079.046024][T26701] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2079.388399][T26707] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2079.408551][T26711] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2079.468636][T26738] device veth93 entered promiscuous mode [ 2079.809691][T26738] device bridge49 entered promiscuous mode [ 2079.828114][T26738] debugfs: Directory 'hsr37' with parent 'hsr' already present! [ 2079.836223][T26738] Cannot create hsr debugfs directory [ 2079.861737][T26739] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2080.377452][T26743] device veth509 entered promiscuous mode [ 2080.528902][T26743] device bridge250 entered promiscuous mode [ 2080.567357][T26743] debugfs: Directory 'hsr86' with parent 'hsr' already present! [ 2080.576433][T26743] Cannot create hsr debugfs directory [ 2080.629633][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr37: link becomes ready [ 2080.658191][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr86: link becomes ready 18:38:00 executing program 3: mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:00 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x60, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:38:00 executing program 4: ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000001180)={0x0, 0x1, &(0x7f0000000040)=""/29, &(0x7f0000000100)=""/4096, &(0x7f0000001100)=""/87, 0x4}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0xffffffe1, 0x200, 0x7, 0x10000, 0x6, 0xdb}) syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@usrquota}]}) 18:38:00 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xfffe, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:00 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x8cffffff00000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:38:00 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x25, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2080.891585][T26792] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2081.300008][T26793] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2081.308680][T26795] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 18:38:01 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xca00000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:38:01 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = socket(0x18, 0x0, 0x0) close(r2) r3 = socket$can_j1939(0x1d, 0x2, 0x7) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) bind$can_j1939(r3, &(0x7f0000000480)={0x1d, r5}, 0x21) connect$can_j1939(r2, &(0x7f0000000000)={0x1d, r5, 0x0, {0x0, 0xff}}, 0x18) sendfile(r2, r1, 0x0, 0x80005) bind$can_j1939(r2, &(0x7f0000000140)={0x1d, r5, 0x1}, 0x18) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:38:01 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xffff, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2082.275089][T26795] device veth1541 entered promiscuous mode [ 2082.444560][T26795] device bridge895 entered promiscuous mode [ 2082.594366][T26795] debugfs: Directory 'hsr638' with parent 'hsr' already present! [ 2082.602206][T26795] Cannot create hsr debugfs directory [ 2082.637270][T26874] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2082.649184][T30627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr638: link becomes ready [ 2082.674184][T26830] __nla_validate_parse: 2 callbacks suppressed 18:38:02 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xda03000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2082.674202][T26830] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2082.692246][T26846] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2082.871807][T26878] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2083.002230][T26886] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2083.193553][T26852] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2083.379812][T26903] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 18:38:03 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x68, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:38:03 executing program 4: r0 = syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x2100020, &(0x7f00000001c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, r1}}, {@afid={'afid', 0x3d, 0x80000001}}, {@fscache}, {@aname={'aname', 0x3d, 'jqfmt=vfsv0'}}, {@posixacl}], [{@fowner_gt={'fowner>', r3}}, {@fsmagic={'fsmagic', 0x3d, 0x8000}}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@dont_measure}, {@audit}, {@appraise}, {@permit_directio}, {@measure}]}}) [ 2083.994876][T26949] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2084.062157][T26941] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2084.123073][T26947] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2084.176356][T26949] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2084.258205][T26910] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2084.408434][T26944] device veth95 entered promiscuous mode [ 2084.485761][T26944] device bridge50 entered promiscuous mode [ 2084.522498][T26944] debugfs: Directory 'hsr38' with parent 'hsr' already present! [ 2084.530310][T26944] Cannot create hsr debugfs directory [ 2084.538918][T26944] hsr38: Slave A (veth95) is not up; please bring it up to get a fully working HSR network [ 2084.573964][T26948] device veth1543 entered promiscuous mode [ 2084.692105][T26948] device bridge896 entered promiscuous mode [ 2084.718937][T26948] debugfs: Directory 'hsr639' with parent 'hsr' already present! [ 2084.726834][T26948] Cannot create hsr debugfs directory [ 2084.823341][T26915] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2085.232132][T26969] device veth511 entered promiscuous mode [ 2085.379296][T26969] device bridge251 entered promiscuous mode [ 2085.532172][T26969] debugfs: Directory 'hsr87' with parent 'hsr' already present! [ 2085.540223][T26969] Cannot create hsr debugfs directory [ 2085.573767][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr38: link becomes ready [ 2085.586950][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr639: link becomes ready [ 2085.698890][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr87: link becomes ready 18:38:05 executing program 3: mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:05 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44002}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:05 executing program 4: r0 = syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) chdir(&(0x7f0000000000)='./file0\x00') r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@cachetag}, {@cachetag={'cachetag', 0x3d, '/proc/asound/seq/clients\x00'}}], [{@context={'context', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x17}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@fsmagic={'fsmagic', 0x3d, 0xffff}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r2, 0xffffffffffff6a2d, 0x0) fanotify_mark(r1, 0x5, 0x3c29f1a90e28c0cf, r2, &(0x7f0000000100)='./file0\x00') 18:38:05 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xf6ffffff00000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:38:05 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x25, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:38:05 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x6c, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2086.305980][T27040] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:38:06 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xf9fdffff00000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2086.669554][T27040] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2086.866909][T27054] device veth2591 entered promiscuous mode 18:38:06 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x301100, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0xb0840, 0x64) ioctl$SOUND_MIXER_READ_VOLUME(r1, 0x80044d0d, &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r0}}, '\x00'}) syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6a71589b5214ea0611d16d743d76667376302c00"]) [ 2087.038838][T27054] device bridge1119 entered promiscuous mode 18:38:06 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xfeffffff00000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2087.129160][T27063] device veth1545 entered promiscuous mode [ 2087.171035][T27063] device bridge898 entered promiscuous mode 18:38:06 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44003}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2087.328672][T27063] debugfs: Directory 'hsr640' with parent 'hsr' already present! [ 2087.337150][T27063] Cannot create hsr debugfs directory [ 2087.386628][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr640: link becomes ready [ 2087.474320][T27119] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "jqX›RêÑmt=vfsv0" [ 2087.704971][T27132] __nla_validate_parse: 9 callbacks suppressed [ 2087.705030][T27132] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:38:08 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x74, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2088.609983][T27119] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue 18:38:08 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xff00000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2089.036119][T27180] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2089.287517][T27140] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2089.375804][T27159] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2089.510899][T27162] device veth2595 entered promiscuous mode [ 2089.537401][T27162] device bridge1121 entered promiscuous mode [ 2089.567193][T27168] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2089.660385][T27194] device veth1547 entered promiscuous mode [ 2089.691227][T27194] device bridge900 entered promiscuous mode [ 2089.742539][T27194] debugfs: Directory 'hsr641' with parent 'hsr' already present! [ 2089.750343][T27194] Cannot create hsr debugfs directory [ 2089.756979][T27194] hsr641: Slave A (veth1547) is not up; please bring it up to get a fully working HSR network [ 2089.776160][T27183] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2090.015999][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr731: link becomes ready [ 2090.039371][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr641: link becomes ready [ 2090.161207][T27244] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2090.250582][T27248] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2090.383287][T27244] device veth513 entered promiscuous mode [ 2090.409969][T27244] device bridge252 entered promiscuous mode [ 2090.430969][T27244] debugfs: Directory 'hsr88' with parent 'hsr' already present! [ 2090.439717][T27244] Cannot create hsr debugfs directory [ 2090.464692][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr88: link becomes ready 18:38:10 executing program 3: mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:10 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r0, 0xffffffffffff6a2d, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x8, @tick=0xd32, 0x5, {0xf9, 0x2}, 0x6, 0x1, 0x1}) syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') 18:38:10 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xff0f000000000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:38:10 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x7a, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:38:10 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44004}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:10 executing program 1: setpriority(0x2, 0x0, 0x5) [ 2090.668597][T27277] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2090.866752][T27282] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:38:10 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xffffff7f00000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2091.011719][T27278] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2091.182563][T27281] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue [ 2091.417702][T27295] device veth1549 entered promiscuous mode 18:38:11 executing program 4: ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)=ANY=[@ANYBLOB="6a71666d743d76660400000000"]) 18:38:11 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xffffffff00000000, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2091.724991][T27295] device bridge901 entered promiscuous mode [ 2091.837682][T27295] debugfs: Directory 'hsr642' with parent 'hsr' already present! [ 2091.845503][T27295] Cannot create hsr debugfs directory [ 2091.891651][T27303] device veth2597 entered promiscuous mode [ 2091.991013][T27359] REISERFS warning (device loop4): super-6514 reiserfs_parse_options: unknown quota format specified. [ 2092.023337][T27303] device bridge1122 entered promiscuous mode [ 2092.101857][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr642: link becomes ready 18:38:11 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0xffffffffffffffff, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:38:11 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xf0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2092.483968][T27311] device veth2599 entered promiscuous mode [ 2092.598986][T27359] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue [ 2092.610032][T27311] device veth2599 left promiscuous mode [ 2092.803456][T27395] __nla_validate_parse: 4 callbacks suppressed [ 2092.803476][T27395] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 18:38:12 executing program 4: r0 = syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)=ANY=[@ANYBLOB="6a0000017376"]) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup3(r0, r0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000840)={0x67, @private=0xa010100, 0x4e23, 0x0, 'lblcr\x00', 0x35, 0x1c0, 0x56}, 0x2c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r1, 0x8907, 0x0) mount$9p_fd(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740), 0x2020400, &(0x7f0000000900)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3dfb42acc256741bea0366372aa88920e6849c8b0f242f11fb0261ee2803bc6b631fe29984bfd4ab2b0d12046122c310fabf9b80a95dd660a07272236ae4d820a009f878e437aa49d399196c27fbe9ae647c074965c0c0a93f7639885de624470e9345c951f26a7569dbef479868cc250e0242671acd877ef2f42a96884502c85c70f7c3935ab19291279cd2c520c17736079a4c0a27c26d29b3e9bdfb9d8bb13da8d8576a93cbbc70ee6060a38d57c8ea8d931e9915b45eb555b6dfa29e25210f", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',version=9p2000.L,privport,dfltuid=', @ANYRESHEX, @ANYBLOB=',uid=', @ANYRESDEC=0x0, @ANYBLOB=',context=user_u,\x00']) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) openat(r0, &(0x7f00000006c0)='./file0\x00', 0x1a000, 0x48) setreuid(0x0, r4) syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xff, 0x7, &(0x7f0000000580)=[{&(0x7f0000000100)="da640d586360d8a50dccd07f61ba7452753905c10d9d2c7c6ad885862e6c48d97f4c3d4e76e77616f91d4fda2c8565b1ff2a0704bb7edc0b12bfe5b924e6868fd18a056e71455f52d3fab47e4ac9531d628b52eacd821eba6c55aa331d6fa1c36202f5bed66833a25b54a748d71801bc0a699667928994de4aa22b1bbb4b8676b94c94306f9c7faf56b110d092baea38a1a138f3426a22d8d3a8282b89e3", 0x9e, 0x2}, {&(0x7f00000001c0)="4c1574f6563daf5878cad676e29793aea8fa750d70bcff1fd25051fe5f6442aebdf642192f10c48e3abed6f1cc45ce6fdaaa9131f080272b2bdcba10c2539dc26a7abeff69fe101ef841883f4af7c3018d3d05054d31cb72e7d6f6e566f5b5ad671b51fd542bfe2ea619c66c4acfb33432b2947bb5b2447b6c2d2a9a75be2273acd8901d5428c8f49be9cb60c58b2edf962bd14c645cb411efff7835c6966ed7", 0xa0, 0x5}, {&(0x7f0000000280)="2c0afe0546cce2912fc6fbafd1c10043096fe964edab06d90e07b2f4da0fa1aa6b82349c2e9f4535bfa155da0b3f147810128b930c5bb6e18585934825b23ccf6ab32054ca71a52ba884457bf405b80c37df8e25383c9565fe581dbda33eddd046837366132c7b089708f1fb5f84a88f657430d77df51977a8362965ec0978d727ce657f41256b4dfa00acc91b191a77b533b5fb96d0e0cae1bcf7f2cd0da3ca1afa5ebe3abcede1add30a80", 0xac, 0x1ff}, {&(0x7f0000000340)="cd3b91e43872cfdd8c678f882967e0c3560c3218befe223b346dd38306c8ae78984bcc451340f82563842100ebba5e0b1dc2f122d21654ac8c24d86509ffcc291812f113b7dc61a5044eebd349d1b54d5df5597f2f2eda97f297dd678aa9d969532445f2076c087ba24062fd7ec15f9df36d14773b841ccc6095cf16b35bb4e86ceebb1d35b74ff85a1a41fd75c38bbe1460", 0x92, 0x1}, {&(0x7f0000000400)="6c60b5f142f2decfe017", 0xa, 0xce1}, {&(0x7f0000000440)="fdf0b18b2763e71d1389124e72fb3fe847d66808ea5170caaa4d4f06cc7fa766303b40135dac013c15740818253423ad451fcbd656dbea79b0037a2be9ad329f6b569ccfc423340395cb9af6382dad49f9902933d98e2ec34701d6bb0e8ea9069da57b2960e93adeae80409a8c8761d87b653f2799baf00f0018524bf9fc0d41ddba7abd66baa7efa572", 0x8a, 0x861}, {&(0x7f0000000500)="bb855b9c9016beab9d42d0a7923e1621dc137f51bde1aed7d0c1d3a93fb61b4212a3c09b802b2fc2f0c6848151152439075878a49be7be2ee6bcce2aa85cd45c16e0c14fcca271f529896b007ebc7a749ace52480703b3540e2b30fdeef951", 0x5f, 0x79}], 0x400, &(0x7f0000000640)=ANY=[@ANYBLOB='[,*)&,appraise_type=imasig,obj_type=-,*!--&,measure,seclabel,measure,euid<', @ANYRESDEC=r4, @ANYBLOB=',obj_user=.,fsname},\x00']) [ 2092.988884][T27403] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2093.260433][T27420] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "j" [ 2093.277110][T27405] device veth1551 entered promiscuous mode [ 2093.320313][T27405] device bridge902 entered promiscuous mode [ 2093.337646][T27405] debugfs: Directory 'hsr643' with parent 'hsr' already present! [ 2093.345691][T27405] Cannot create hsr debugfs directory [ 2093.394840][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr643: link becomes ready [ 2093.446910][T27405] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2093.533159][T27420] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "j" [ 2094.154992][T27452] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2094.386669][T27456] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:38:14 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:14 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44005}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:14 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0, 0x7}]}) 18:38:14 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x300, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:38:14 executing program 4: ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0) syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:38:14 executing program 1: setpriority(0x2, 0x0, 0x5) [ 2095.256514][T27475] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2095.279314][T27476] REISERFS warning (device loop5): super-6514 reiserfs_parse_options: unknown quota format specified. [ 2095.408767][T27486] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2095.555068][T27483] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:38:15 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0, 0x22}]}) [ 2095.759752][T27485] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:38:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r2, 0x8907, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r1, r2], 0x6) syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000000280), 0x370040, &(0x7f00000014c0)) clone3(&(0x7f00000002c0)={0x200002000, &(0x7f0000000000)=0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100), {0x7}, &(0x7f0000000140)=""/228, 0xe4, &(0x7f0000000240)=""/5, &(0x7f0000000280)=[0x0], 0x1}, 0x58) dup(r3) [ 2095.970611][T27498] device veth1553 entered promiscuous mode [ 2096.050216][T27498] device bridge903 entered promiscuous mode [ 2096.142418][T27514] REISERFS warning (device loop5): super-6514 reiserfs_parse_options: unknown quota format specified. [ 2096.157409][T27498] debugfs: Directory 'hsr644' with parent 'hsr' already present! [ 2096.165852][T27498] Cannot create hsr debugfs directory [ 2096.176080][T27498] hsr644: Slave A (veth1553) is not up; please bring it up to get a fully working HSR network [ 2096.218549][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr644: link becomes ready [ 2096.239374][T27499] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2096.483722][T27514] REISERFS warning (device loop5): super-6514 reiserfs_parse_options: unknown quota format specified. [ 2096.523502][T27502] device veth2601 entered promiscuous mode [ 2096.570314][T27502] device bridge1123 entered promiscuous mode 18:38:16 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x348, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2096.625016][T27551] loop4: detected capacity change from 0 to 264192 18:38:16 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0, 0x3c}]}) [ 2096.781210][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr733: link becomes ready [ 2096.804802][T27522] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2096.868605][T27554] loop4: detected capacity change from 0 to 264192 18:38:16 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) lseek(r0, 0xffffffffffff6a2d, 0x0) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000040)) syz_mount_image$reiserfs(&(0x7f0000000100), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0xb00004, &(0x7f0000000000)={[{@barrier_none}]}) [ 2097.396183][T27575] REISERFS warning (device loop5): super-6514 reiserfs_parse_options: unknown quota format specified. 18:38:17 executing program 4: r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r1, 0xffffffffffff6a2d, 0x0) r2 = gettid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x0, &(0x7f0000000180)={0x0, 0x0, 0xfffffffa}) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r0, @ANYRESOCT=r1, @ANYRES32=r1, @ANYRES32=r2], 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 2097.777712][T27525] device veth2603 entered promiscuous mode [ 2097.820197][T27575] REISERFS warning (device loop5): super-6514 reiserfs_parse_options: unknown quota format specified. [ 2097.920887][T27525] device veth2603 left promiscuous mode [ 2098.049374][T27505] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2098.079685][T27577] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2098.135029][T27608] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2098.330711][T27612] device veth1555 entered promiscuous mode [ 2098.445496][T27612] device bridge904 entered promiscuous mode [ 2098.466396][ T1229] ieee802154 phy0 wpan0: encryption failed: -22 [ 2098.471650][T27612] debugfs: Directory 'hsr645' with parent 'hsr' already present! [ 2098.472887][ T1229] ieee802154 phy1 wpan1: encryption failed: -22 [ 2098.480472][T27612] Cannot create hsr debugfs directory [ 2098.498050][T27577] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2098.661552][T24415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr645: link becomes ready [ 2098.673970][T27634] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2098.865423][T27627] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2098.924800][T27630] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2099.401587][T27627] device veth515 entered promiscuous mode [ 2099.493674][T27627] device bridge254 entered promiscuous mode [ 2099.509114][T27627] debugfs: Directory 'hsr89' with parent 'hsr' already present! [ 2099.517132][T27627] Cannot create hsr debugfs directory [ 2099.542188][T27593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr89: link becomes ready 18:38:19 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:19 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0, 0x6c}]}) 18:38:19 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44006}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:19 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6a71666d2fa9d0577320002c008c29d866090d1177a2006106494275e1a6672d4ac42d3cceeeee9e5d9e3de9d3b7878f37400d803f95bb0bbd2dcdbb2c64825faf171f2aafd1f3c6022287237041b3c93792e82c0e9306e066107f28e60291b659c7f618ba19709c9ce602a2c7c35410cf23e1acaa471ddc04db1ac9"]) 18:38:19 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x392, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2099.917262][T27669] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2100.095327][T27670] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "jqfm/©ÐWs " [ 2100.126784][T27673] REISERFS warning (device loop5): super-6514 reiserfs_parse_options: unknown quota format specified. [ 2100.150853][T27676] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:38:19 executing program 1: setpriority(0x2, 0x0, 0x5) [ 2100.478985][T27681] device veth2605 entered promiscuous mode [ 2100.561639][T27670] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "jqfm/©ÐWs " [ 2100.594274][T27673] REISERFS warning (device loop5): super-6514 reiserfs_parse_options: unknown quota format specified. [ 2100.687935][T27681] device bridge1124 entered promiscuous mode [ 2100.769751][T27682] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 18:38:20 executing program 4: r0 = syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000180)={{0xfffffbff, 0x9}, 0x100, './file0\x00'}) syz_mount_image$hfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8713, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="f8b6a0f51d5de7fd5095247a893590fa9b6db5e3a4f8913f8d2d368b00bc68303b7513b93033a7b2", 0x28, 0x5}], 0x80080, &(0x7f00000003c0)=ANY=[@ANYBLOB="756d61736b3d30303030303030303030303030303030303030313633322c747970653d3c249ef62c636f6465706167653d6d61636761656c69632c66696c655f756d61736b3d30303030303030303030303030303030303030303030372c7569643d", @ANYRESHEX=0xee00, @ANYBLOB="2c66696c655f756d61736b3d30303030303030303030303030303030303030303030372c63726561746f723d9d1465322c61756469742c6d6561737572652c726f6f74636f6e746578743d756e636f6e66696e65645f752c736d61636b66737472616e736d7574653d7b5c2c7569643c", @ANYRESDEC=0x0, @ANYBLOB="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"]) 18:38:20 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:38:20 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44007}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2101.137342][T27694] device veth1557 entered promiscuous mode [ 2101.167931][T27694] device bridge906 entered promiscuous mode [ 2101.216537][T27694] debugfs: Directory 'hsr646' with parent 'hsr' already present! [ 2101.224746][T27694] Cannot create hsr debugfs directory [ 2101.253182][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr646: link becomes ready 18:38:21 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x500, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2101.641379][T27747] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2101.745157][T27754] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2102.417656][T27747] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue 18:38:22 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x2}) 18:38:22 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r0, 0xffffffffffff6a2d, 0x0) r1 = accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x40004, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid={'afid', 0x3d, 0x5}}, {@debug={'debug', 0x3d, 0x1}}, {@cache_loose}, {@mmap}, {@access_user}, {@cache_mmap}, {@mmap}, {@access_user}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@appraise}]}}) [ 2102.788094][T27801] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2102.976911][T27811] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2103.135288][T27751] device veth2607 entered promiscuous mode [ 2103.168485][T27811] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2103.217244][T27751] device bridge1125 entered promiscuous mode [ 2103.278820][T27770] device veth1559 entered promiscuous mode [ 2103.487328][T27770] device bridge907 entered promiscuous mode [ 2103.511464][T27770] debugfs: Directory 'hsr647' with parent 'hsr' already present! [ 2103.519431][T27770] Cannot create hsr debugfs directory [ 2103.613138][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr735: link becomes ready [ 2103.625684][ T8540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr647: link becomes ready [ 2103.640704][T27773] __nla_validate_parse: 7 callbacks suppressed [ 2103.640724][T27773] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2103.843620][T27795] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2103.997114][T27792] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2104.140524][T27798] device veth2609 entered promiscuous mode [ 2104.265487][T27798] device veth2609 left promiscuous mode [ 2104.389824][T27805] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2104.423744][T27831] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:38:24 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:24 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x3}) 18:38:24 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x48f7a, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:38:24 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="ef3aad47b344c7b549686f6b6a71666da7d85b86efd02abc38"]) 18:38:24 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44008}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:24 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x5d6, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2105.006985][T27896] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2105.055632][T27899] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "ï:­G³DǵIhokjqfm§Ø[†ïÐ*¼8" [ 2105.092220][T27898] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2105.177583][T27897] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2105.307495][T27907] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2105.482387][T27899] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue [ 2105.489746][T27906] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2105.579198][T27898] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue 18:38:25 executing program 4: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000100)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep2(r0, 0x83, 0x10, &(0x7f0000000000)=@ready={0x0, 0x0, 0x8, "9e016511", {0x1, 0x9, 0x8001, 0xb1, 0x4}}) syz_usb_ep_write$ath9k_ep2(r0, 0x83, 0x12, &(0x7f0000000040)=@conn_svc_rsp={0x0, 0x0, 0xa, "27a12054", {0x3, 0x1, 0x0, 0x4, 0x83, 0x1, 0x8}}) r1 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000280)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep2(r1, 0x83, 0x12, &(0x7f0000000300)=@conn_svc_rsp={0x0, 0x0, 0xa, "c3cc1c13", {0x3, 0x100, 0x0, 0x80, 0x6, 0x1f, 0x6}}) syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001440), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6a7166a3ef2de1a6bc6d743d76ada82275243715667376302c00596e268e338c99ab1185c6a4bae3e187c17290647cf288f326689130f5de23946b5486ea555c03fbf01a29c670336d35f2ef664a1b4445e503153f4415299a7d6ce2df3ba001214de8ed407032387483057cb756a3223373346b9a8e94dcbfb4e51d45b804003a93dda7a16ddc3d5997bfb58cc9d399671d135f6903306855b26d2244cbed842298fbb8c45a2dc4233fe8aeff90f80c2017d53c70e3cb09535a3974452758432d00000000d3d6989e4d8e3e48ec3878d98ef7531dc6f00e56e149d6463c07137dee30fb379f51e5"]) syz_usb_disconnect(r1) [ 2105.862967][T27910] device veth1561 entered promiscuous mode 18:38:25 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x4}) [ 2105.981878][T27910] device bridge909 entered promiscuous mode [ 2106.083366][T27910] debugfs: Directory 'hsr648' with parent 'hsr' already present! [ 2106.091378][T27910] Cannot create hsr debugfs directory [ 2106.129649][T27911] device veth2611 entered promiscuous mode [ 2106.192272][T27911] device bridge1126 entered promiscuous mode [ 2106.258097][T27593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr648: link becomes ready [ 2106.278074][T27896] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 18:38:25 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x44009}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2106.439728][T27982] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2106.586894][ T8540] usb 5-1: new high-speed USB device number 5 using dummy_hcd [ 2106.603909][T27982] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" 18:38:26 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x5}) 18:38:26 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x600, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2107.017463][T28020] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2107.102261][T27942] device veth519 entered promiscuous mode [ 2107.178894][T28020] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2107.230542][ T8540] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 2107.239784][ T8540] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2107.248151][ T8540] usb 5-1: Product: syz [ 2107.252384][ T8540] usb 5-1: Manufacturer: syz [ 2107.256990][ T8540] usb 5-1: SerialNumber: syz [ 2107.489882][T27942] device bridge256 entered promiscuous mode [ 2107.503822][ T8540] usb 5-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested 18:38:27 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x6}) [ 2107.651702][T27942] debugfs: Directory 'hsr90' with parent 'hsr' already present! [ 2107.659486][T27942] Cannot create hsr debugfs directory [ 2107.855439][T28064] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2108.011473][T28064] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2108.072891][T28038] device veth1563 entered promiscuous mode [ 2108.137046][T28038] device bridge911 entered promiscuous mode [ 2108.159677][T28038] debugfs: Directory 'hsr649' with parent 'hsr' already present! [ 2108.168616][T28038] Cannot create hsr debugfs directory [ 2108.206332][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr90: link becomes ready [ 2108.330379][T24415] usb 5-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 2108.372397][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr649: link becomes ready 18:38:28 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x7}) 18:38:28 executing program 3: perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2108.627648][T28042] device veth2615 entered promiscuous mode [ 2108.700804][T28042] device bridge1127 entered promiscuous mode [ 2108.768827][T28019] __nla_validate_parse: 9 callbacks suppressed [ 2108.768848][T28019] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2108.796157][T28041] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2108.947278][T27972] UDC core: couldn't find an available UDC or it's busy: -16 [ 2108.954821][T27972] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 2108.962903][T28039] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2108.973257][T28073] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2109.063214][T28137] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2109.151407][T27972] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "jqf£ï-ᦼmt=v­¨"u$7fsv0" [ 2109.192850][T28049] device veth99 entered promiscuous mode [ 2109.210983][T28137] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2109.454180][T28049] device bridge51 entered promiscuous mode [ 2109.526978][ T20] usb 5-1: USB disconnect, device number 5 [ 2109.613319][T28049] debugfs: Directory 'hsr39' with parent 'hsr' already present! [ 2109.621493][T28049] Cannot create hsr debugfs directory [ 2109.640004][T24415] usb 5-1: Service connection timeout for: 256 [ 2109.646230][T24415] ath9k_htc 5-1:1.0: ath9k_htc: Unable to initialize HTC services [ 2109.656075][T24415] ath9k_htc: Failed to initialize the device [ 2109.682810][ T20] usb 5-1: ath9k_htc: USB layer deinitialized [ 2109.724721][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr737: link becomes ready [ 2109.758907][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr39: link becomes ready [ 2109.774668][T28171] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2109.884400][T28172] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:38:29 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x48f7a, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:38:29 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4400a}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:29 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x8}) 18:38:29 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x700, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2110.209531][T28197] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2110.333774][T28171] device veth521 entered promiscuous mode [ 2110.350547][T30627] usb 5-1: new high-speed USB device number 6 using dummy_hcd [ 2110.373509][T28197] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2110.870839][T30627] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 2110.880702][T30627] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2110.888945][T30627] usb 5-1: Product: syz [ 2110.893308][T30627] usb 5-1: Manufacturer: syz [ 2110.898081][T30627] usb 5-1: SerialNumber: syz 18:38:30 executing program 4: ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000000)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000040)=0xe8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00042704000000dbdf250200000014000900fe88000000000000000000000000000106000a004e2000000d00040001000000ed5c43462faba6c0ddce171d4c12f20315b7252f2f0dd958f092cf11f40c922688690177577c6395769df0a8ce4605071d7b2f1380f631c0ef3a27f2f2bd6e659c0675c84d69299c9926e747f069d0242ab3dbca6bdfb5a3e89bb5ae60d90c39d9baf8111034aad728219e944e4659bfaf0b68013c109a3f671c21dd04ead407246821a65b62a5369b14d9ae2ea14a82de9b9a052818cd92044547c691c100bf81d808c18f8a34c61f79cdba09254734b6"], 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)={[{@jqfmt_vfsv0}], [{@hash}, {@euid_eq={'euid', 0x3d, r0}}, {@fsname={'fsname', 0x3d, 'jqfmt=vfsv0'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@fowner_lt={'fowner<', r3}}]}) [ 2111.143456][T30627] usb 5-1: can't set config #1, error -71 [ 2111.153646][T30627] usb 5-1: USB disconnect, device number 6 [ 2111.198818][T28171] device bridge257 entered promiscuous mode 18:38:30 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x9}) [ 2111.433585][T28171] debugfs: Directory 'hsr91' with parent 'hsr' already present! [ 2111.442645][T28171] Cannot create hsr debugfs directory [ 2111.483093][T28196] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2111.513307][T28195] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:38:31 executing program 4: r0 = syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)=ANY=[@ANYBLOB='jq&mtvfsv0,\x00']) r1 = getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000480)=0xe8) r5 = getgid() r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r7, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r9, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000004c0)={{}, {0x1, 0x2}, [{0x2, 0x1, r3}, {0x2, 0x4, r4}], {0x4, 0x3}, [{0x8, 0x4, r1}, {0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x4, r1}, {0x8, 0x0, r1}, {0x8, 0x7, r5}, {0x8, 0x3, r1}, {0x8, 0x0, r1}, {0x8, 0x7, r7}, {0x8, 0x2, r9}], {0x10, 0x7}}, 0x7c, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}}}, &(0x7f0000000200)=0xe8) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x10000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@default_permissions}, {@default_permissions}], [{@smackfsroot}, {@permit_directio}, {@uid_eq={'uid', 0x3d, r10}}]}}) [ 2111.592671][T28203] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2111.783954][T28244] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option " " [ 2111.867139][T28261] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "jq&mtvfsv0" [ 2112.047397][T28204] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2112.153609][T28244] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option " " 18:38:31 executing program 4: syz_genetlink_get_family_id$nbd(&(0x7f0000000140), 0xffffffffffffffff) syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) syz_mount_image$ubifs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100, 0x7, &(0x7f0000000600)=[{&(0x7f0000000200)="f2348a8fb612cb26cc84d3072bbbc17720b843fe27531c135f7fad032aca10e04140a672cadacc5cc496b1c86d47bb77f88372c8b917346214e7863321a2ef8c126f4a84839f1bb1f43625311e6d9ca9387e4ebb6c4fd5e445eb53a9982e76636a6b4744d5a4cb347afc975b33597726bd7fe6d0b256f18dd25917e03865e454da9403782fb62c103f745a361f961672541e5fae83d63badcda9e894f6aa46b61f6dba5e83a5d7c5757a3a6b016aaa6cda868e96ccda4ee2323e26a7c103818d60efa9a9bd2c7659fcae00b4aef3a38532abd311f2934ce99394da97cdb8d21b2c7f4a93f37084f80d", 0xe9, 0x6}, {&(0x7f0000000300)="0e004c239f0ecfc47a5ecca5b5d46c1e1b7fd144dc8d7226be8440faca061c9af88fe7dcfd3e100b00025b757346d6", 0x2f, 0x5}, {&(0x7f0000000340)="e40bb3ad7f611686f200c581b3f7c4ae3915aa8286018ebbec70a13e798de7d959fbd7d4999ca5b8cb55c124c96184b0306cb112cf7d07e64c42fcd9fef72be9d6fcf0132e01099095965ba6f620175638ca9422c1f1ea1afc049a4b7a3ad7e591d0d2ebe3c4cb58c8bb3122fbe0d63634dbd5abaa1dd998882f475b81e15ad0f802a97bed3d14cb7bd45e24", 0x8c, 0xa867}, {&(0x7f0000000400)="b4fad41419acb6fca4d8d08b22863b586366b3f936f580f841e977752bd79f9e544c7b810bf79d80", 0x28, 0x5}, {&(0x7f0000000440)="3ca281ba3aa9884c980de92ddbf5393fae6b4289f4c47a6db7869607199fea478a37fab4e2bb30c95481872ce2ff2bbdc86c3ed32e0b0181b5e4", 0x3a, 0x2}, {&(0x7f0000000480)="76f07feb7e4a5b2011ab28e4d45419380d11d292f6ad64946b7a8f8155106d62a25bd754f06627216bbfc7a1ce9b10a1be894bb37f734fd6fcf08519fa38c85e6dfa3fd7254b47fd367c9d1659cc1971d7d70119c0fbe4b2fd6145eb2f39a592f5870d1334510b47a5b8591e0466bae5db2a7ca77e7ff2e72912fbddc98a7642c1ad9616ed3030b43eedfd25866c8b2fe63fa669177b02dc7064e0a1a304a0dbb854fae95f0dee32ab2aa302bea13cb84147fcaf2537255129ecd061f736b4c7a09ae0b97b73bcfed8744ff03ee48358a128f4070c", 0xd5, 0x8}, {&(0x7f0000000580)="3baa59d71d0f835b46470568c8453f47ac4b0cc45aa48b65eef6cadb84dae2b3d9b16cf2707f021df31501ce11003dd98ecb5ae202f63a13dfefce532e435b6e192aed48460e5ef531057c290fca4635372a7d8b7d222c1b317ed94ddfefffc2", 0x60, 0x8}], 0x20, &(0x7f00000006c0)={[{@no_bulk_read}, {@chk_data_crc}, {@norm_unmount}], [{@smackfsdef={'smackfsdef', 0x3d, '\xdd-@'}}]}) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000100), 0x2, 0x2) [ 2112.454698][T28207] device veth1565 entered promiscuous mode 18:38:32 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0xa}) [ 2112.506073][T28207] device bridge912 entered promiscuous mode [ 2112.588306][T28207] debugfs: Directory 'hsr650' with parent 'hsr' already present! [ 2112.608380][T28207] Cannot create hsr debugfs directory [ 2112.636232][T28298] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2112.666013][T28210] device veth2617 entered promiscuous mode [ 2112.866010][T28210] device bridge1128 entered promiscuous mode [ 2112.879849][T28309] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option " [ 2112.879849][T28309] " [ 2112.932879][T28307] loop4: detected capacity change from 0 to 168 [ 2113.003764][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr91: link becomes ready [ 2113.109046][T24025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr650: link becomes ready 18:38:32 executing program 4: r0 = getuid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000100)={[{@data_writeback}], [{@subj_type}, {@dont_measure}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@subj_user={'subj_user', 0x3d, '\xa6'}}, {@fowner_lt={'fowner<', r0}}, {@euid_gt={'euid>', r2}}, {@audit}]}) 18:38:32 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0xb}) [ 2113.508949][T28224] device veth2619 entered promiscuous mode [ 2113.630755][T28345] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option " " [ 2113.688486][T28224] device veth2619 left promiscuous mode [ 2114.095280][T28225] __nla_validate_parse: 3 callbacks suppressed [ 2114.095301][T28225] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 18:38:33 executing program 3: perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2114.730916][T28368] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2115.026604][T28373] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2115.129236][T28372] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2115.366728][T28382] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 18:38:36 executing program 1: setpriority(0x2, 0x0, 0xfffffffffffffffd) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000100)={{0x3, r2, 0xee00, 0xffffffffffffffff, 0x0, 0x63, 0x8}, 0x5888b6d5, 0x81, 0x7, 0x6, 0xffffffffffffffff, 0xffffffffffffffff, 0x37}) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x1, 0x8, 0x7, 0x3, 0x0, 0x800, 0x4007, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x1, 0x7}, 0x824, 0x3, 0x79, 0x4, 0xffffffffffff0000, 0x7f, 0x401, 0x0, 0x7, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xa) 18:38:36 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x2af1069, &(0x7f0000000040)={[{@jdev={'jdev', 0x3d, './file1'}}]}) 18:38:36 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x10}) 18:38:36 executing program 3: perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:36 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4400b}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:36 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x900, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2116.707523][T28416] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2116.769348][T28419] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "" [ 2116.786419][T28428] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:38:36 executing program 4: r0 = creat(&(0x7f00000011c0)='./file0\x00', 0x105) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001200)={&(0x7f0000000000)="1ea8637185753191c817fbb066b66f41e746fd4b32aca75e2e45496336c6865b70346e94f00cd30d98dad422c2cd073b660c82496e2b1406905c1051150c2b461525e628eab8763547492ca439b7a3bbeb95b99379a01b85c9fecb0447b1d3e4d00f0bbcc7aba2acca0e2755e1cac94a810b24300488", &(0x7f0000000100)=""/4096, &(0x7f0000001100)="eecd8fc3bec98d65f49e2bb2560d27098555558099086032288496614ed716f1db8fb232da5ed9fa19fde26c83a3739f8f69e7595de5193cf493336f91a8267e0cdfb0ad6dea7521ae8708b2d7517cf9bbdcc34593fa0d07fece5a5358eb46d673e37caa72b3d180752ba44b4c45c30e03dc1459ba6d3099378a430e0dd05ba765c7c72aa2978a33ab5191e46d140fbfed29efe8056ac33c588c459f4d5d40a3", &(0x7f0000001500)="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", 0x19, r0, 0x4}, 0x38) syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001340)={r0, &(0x7f0000001240)="4b74db0e905c18ea995bb4425f088d4a4fd80774537ceac2ab6bfa72d6e3ad3c188500fa1e5cca8b7ecbe8f6d36f01382ee6447e62e1523cadee", &(0x7f0000001280)=""/159}, 0x20) [ 2117.240911][T28420] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2117.292945][T28448] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2117.293303][T28429] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2117.401903][T28419] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue [ 2117.480102][T28440] device veth2621 entered promiscuous mode [ 2117.509951][T28452] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2117.650367][T28440] device bridge1129 entered promiscuous mode 18:38:37 executing program 4: sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x68, 0x0, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@ETHTOOL_A_PAUSE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PAUSE_TX={0x5}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0x4}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_TX={0x5}, @ETHTOOL_A_PAUSE_AUTONEG={0x5, 0x2, 0x1}]}, 0x68}, 0x1, 0x0, 0x0, 0x1005}, 0x0) syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) 18:38:37 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x44}) [ 2117.807544][T28443] device veth1567 entered promiscuous mode [ 2117.893174][T28443] device bridge913 entered promiscuous mode [ 2117.995063][T28443] debugfs: Directory 'hsr651' with parent 'hsr' already present! [ 2118.003013][T28443] Cannot create hsr debugfs directory [ 2118.068530][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr739: link becomes ready [ 2118.082396][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr651: link becomes ready [ 2118.094929][T28429] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 18:38:37 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4400c}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 2118.302106][T28496] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2118.335289][T28503] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "D" 18:38:38 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xa00, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) [ 2118.525134][T28503] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "D" 18:38:38 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000040), 0x18420, &(0x7f0000000000)={[], [{@uid_lt={'uid<', 0xee01}}]}) setresgid(0xee01, 0xee01, 0xee00) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r2, 0x8907, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r3, 0x8907, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r4, 0x8907, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) lseek(r1, 0x0, 0x2) write$P9_RREADDIR(r0, &(0x7f0000000100)={0x128, 0x29, 0x1, {0xda45, [{{0x10, 0x3, 0x7a8}, 0x3, 0x1, 0xd, './file1/file0'}, {{0x1, 0x1, 0x5}, 0x1, 0xff, 0x7, './file1'}, {{0x40}, 0x2, 0x1f, 0x7, './file1'}, {{0x40, 0x1, 0x8}, 0x0, 0x1, 0x7, './file1'}, {{0x2, 0x1, 0x1}, 0x2, 0x4, 0x7, './file1'}, {{0x40, 0x4, 0x7}, 0x2ae6, 0x1f, 0x7, './file1'}, {{0x20, 0x2, 0x5}, 0x8000, 0x6, 0x7, './file1'}, {{0x10, 0x4, 0x1}, 0x9, 0xff, 0x7, './file1'}, {{0x80, 0x2, 0x7}, 0x7fffffff, 0x1, 0x7, './file1'}]}}, 0x128) [ 2119.126908][T28525] device veth2623 entered promiscuous mode [ 2119.268992][T28525] device bridge1130 entered promiscuous mode [ 2119.318246][T28530] __nla_validate_parse: 3 callbacks suppressed [ 2119.318335][T28530] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2119.379178][T28547] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2119.507079][T28556] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2119.824505][T28564] device veth1569 entered promiscuous mode [ 2119.895267][T28564] device bridge915 entered promiscuous mode [ 2119.912151][T28564] debugfs: Directory 'hsr652' with parent 'hsr' already present! [ 2119.921752][T28564] Cannot create hsr debugfs directory [ 2119.968636][ T8330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr652: link becomes ready [ 2120.001200][T28541] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 18:38:39 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x44}) 18:38:39 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x48}) 18:38:39 executing program 4: r0 = syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000500)={{0x1, 0x1, 0x18, r0, {0x2ca}}, './file0\x00'}) syz_genetlink_get_family_id$team(&(0x7f00000004c0), r2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r3, 0x0) connect$unix(r2, &(0x7f00000005c0)=@file={0x0, './file0\x00'}, 0x6e) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000100), 0x6e, &(0x7f0000000380)=[{&(0x7f0000000180)=""/125, 0x7d}, {&(0x7f0000000200)=""/167, 0xa7}, {&(0x7f00000002c0)=""/92, 0x5c}, {&(0x7f0000000340)=""/11, 0xb}], 0x4, &(0x7f00000003c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb0}, 0x2) r5 = syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="66643de38ee5bd0cb211e5245c887354ad7de06ec0102fb38f2c2650a61bf78dd08798811c74b16650ca522a52e34173a3a59988119681715f7f9bbc6eb3d3c44750ee6740b0c77bcf155e835e549241af669be8890e4bac37399fa30f9ea030c25944dd19ebed42d75e4c13b254912a7d0443076f8492031ff3df621d2cb4cb98fb66cb94d4b0f8b973a5d0e1baf0074e73c802e2733584c31705933eb3774688ecff3a834a5031263cda826f1cdbcc12f59af4fe1f91296291e14b79eea5d2fa5fbd9491526cbabe83ab", @ANYBLOB="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", @ANYBLOB="2c726f6f746d6f64653f303030343020303030303030303030309830303130303030302c7537abc6d0708634c3a1fae7d0e4f87365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',blksize=0x0000000000000800,blksize=0x0000000000000800,blksize=0x0000000000000800,default_permissions,appraise_type=imasig,fowner>', @ANYRESDEC=r4, @ANYBLOB=',subj_type=jqfmt=vfsv0,fscontext=unconfined_u,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c00a5a93c867bd22040bd34ece851205b3980ddc56598366cb97062f8f0052efdc2f5833511a0ae79557e9a6b2d03bdae4a1f2847ede8d41db8b7eea8452848f2d6bf14b0"]) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r1, 0x8008f513, &(0x7f0000000540)) faccessat(r5, &(0x7f0000000580)='./file0\x00', 0x40) [ 2120.290197][T28604] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2120.309852][T28566] device veth525 entered promiscuous mode [ 2120.366991][T28618] fuse: Bad value for 'fd' [ 2120.441315][T28619] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "H" [ 2121.002336][T28566] device bridge259 entered promiscuous mode [ 2121.015656][T28566] debugfs: Directory 'hsr92' with parent 'hsr' already present! [ 2121.023549][T28566] Cannot create hsr debugfs directory [ 2121.041469][T28525] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2121.138981][T28619] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "H" [ 2121.171889][T28636] fuse: Bad value for 'fd' [ 2121.193982][T28618] REISERFS warning (device loop4): reiserfs_fill_super: Cannot allocate commit workqueue [ 2121.354959][T28542] device veth2625 entered promiscuous mode 18:38:41 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x4c}) [ 2121.515549][T28542] device veth2625 left promiscuous mode [ 2121.609171][T28529] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2121.638674][T28594] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2121.743161][T28661] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "L" 18:38:41 executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x9e830400, {0x0, 0x0, 0x0, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:41 executing program 4: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x5, 0xe3fd, 0x9], 0x3, 0x1f1324d1d9ce5b24, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r0, 0xc1004110, &(0x7f0000000100)={0x100, [0x2, 0x9, 0x7], [{0xfffffffa, 0x3, 0x1}, {0x3, 0x1, 0x0, 0x1, 0x1, 0x1}, {0x200, 0x4, 0x1, 0x0, 0x1, 0x1}, {0x582210bb, 0xffffffff, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x6, 0x0, 0x1, 0x0, 0x1}, {0xa5, 0x7f, 0x1}, {0x800, 0x5}, {0x3, 0x6c, 0x0, 0x0, 0x1}, {0x1, 0x34, 0x1, 0x1}, {0x1, 0x0, 0x1}, {0x7fffffff, 0x7, 0x0, 0x0, 0x1, 0x1}, {0xffffffff, 0x4, 0x1}], 0x3}) syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}]}) [ 2121.892987][T28661] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "L" [ 2121.963151][ T136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr92: link becomes ready [ 2122.107931][T28691] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 18:38:41 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4400d}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:41 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0xc00, 0x0, 0x44011}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) 18:38:41 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x60}) [ 2122.310721][T28687] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 2122.525401][T28706] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2122.581100][T28707] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2122.912850][T28714] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 18:38:42 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x9, 0x0, &(0x7f0000002540), 0xc0829, &(0x7f0000000040)) [ 2123.018798][T28708] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "`" 18:38:42 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x8, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x2) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0xb) r2 = gettid() tkill(r2, 0xb) r3 = gettid() ptrace$setregs(0xf, r3, 0xffffffff, &(0x7f0000000140)="282e0795d53a14f8fed5d3eb0b2f4457aefc2a60602d5e300411b6466018ede07e348e0dfe94a5f2f02d9b328283a1f36f5d61603c46aa07afd285262a6a7bafc1e7dddb80a5786bbc731c3401971358ac0e3f836595d503ee18d5e2624d95989f0e0767cfd0192aca0e88fc6ce09e9680a3bc46a1a597741a933cd834b46655334fae6c4418dd756bcf61fbf9ac29c14184d39d0beb8217fb976bdc14f87a8ab6c418da0743dc566c4582db8b1a4b0637e0880935b2cd8075cc7b1f0d756bab2ab5c4790a496bcd10") r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r4, 0x8907, 0x0) ftruncate(r4, 0x92) tkill(r3, 0xb) getpgrp(r3) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0xb) [ 2123.192100][T28716] device veth2627 entered promiscuous mode [ 2123.199574][T28708] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "`" [ 2123.244395][T28716] device bridge1131 entered promiscuous mode 18:38:43 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x68}) [ 2123.821415][T28707] device veth1571 entered promiscuous mode 18:38:43 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x108) r0 = getuid() setresuid(0xee01, r0, 0xee00) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000015f5b9d55602eb236fff7000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_TP_METER_CANCEL(r6, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0700000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x432f0300, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4400f}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r8, 0x10e, 0x2, &(0x7f0000000300)=0x15, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 18:38:43 executing program 4: r0 = syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6a71666db6e9e4f721595fa000fb219190"]) r1 = openat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x4000, 0x0, 0xb}, 0x18) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x96001, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@version_u}, {@aname={'aname', 0x3d, '{::'}}, {@access_any}, {@aname={'aname', 0x3d, 'reiserfs\x00'}}, {@access_any}, {@debug}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '{\xda*='}}, {@obj_role={'obj_role', 0x3d, ')%'}}, {@obj_role={'obj_role', 0x3d, '\xa7{-^@\''}}, {@hash}]}}) [ 2123.990371][T28707] device bridge916 entered promiscuous mode [ 2124.049439][T28776] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "h" [ 2124.089473][T28707] debugfs: Directory 'hsr653' with parent 'hsr' already present! [ 2124.097355][T28707] Cannot create hsr debugfs directory [ 2124.138273][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr741: link becomes ready [ 2124.244194][T28776] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "h" [ 2124.266123][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr653: link becomes ready [ 2124.273498][T28788] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "jqfm¶éä÷!Y_ " [ 2124.443952][T28788] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "jqfm¶éä÷!Y_ " [ 2124.496677][T28781] __nla_validate_parse: 3 callbacks suppressed [ 2124.496749][T28781] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:38:44 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000014c0)={[{@jqfmt_vfsv0}], [], 0x6c}) [ 2124.648857][T28784] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2124.826554][T28801] device veth2629 entered promiscuous mode 18:38:44 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="6a4811acf726ba71666d743d76667376302c007ccd9e66c7eaa76c334e7c2ebf55fb5d944e0773e4f5a80aae1454b0e4fc2114af8125c98b6bd8c0a7bb01f5257b11ee8f3b531ad43768df708f79d7e88e2f4f56484ca4d0d21c38e61b2f6fac53383f296e35a760aba0d39a41a68fb0b831556a65544149e1b36758477fb1b2a67445a15ea9f19b4029a84d350d67323e078ac4450989ec4e2f5aa99903c0d1e2d6e9633d"]) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r0, 0xffffffffffff6a2d, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0x59ca, 0x4) ioctl$SIOCGSTAMPNS(r3, 0x8907, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000140)=0xc) setreuid(0x0, r4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@private, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r7) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x881, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@default_permissions}, {@blksize}], [{@fsmagic={'fsmagic', 0x3d, 0x2}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@obj_role={'obj_role', 0x3d, '[!(@-\xb1'}}, {@fowner_lt={'fowner<', r5}}, {@subj_role={'subj_role', 0x3d, 'X{,'}}, {@fowner_gt={'fowner>', r7}}, {@audit}, {@subj_type={'subj_type', 0x3d, ']%:*'}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}}) [ 2124.958758][T28801] device bridge1132 entered promiscuous mode [ 2125.047050][T28843] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "l" [ 2125.057511][T28801] hsr742: Slave A (veth2629) is not up; please bring it up to get a fully working HSR network [ 2125.067999][T24415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr742: link becomes ready [ 2125.088683][T28784] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2125.098774][T28807] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2125.216452][T28843] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "l" [ 2125.265762][T28866] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "jH¬÷&ºqfmt=vfsv0" [ 2125.302829][T28813] device veth2631 entered promiscuous mode [ 2125.379811][T28874] fuse: Bad value for 'user_id' [ 2125.385924][T28813] device veth2631 left promiscuous mode [ 2125.480653][T28866] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "jH¬÷&ºqfmt=vfsv0" [ 2125.556039][T28881] fuse: Bad value for 'user_id' [ 2125.597955][T28833] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2125.814760][T28848] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2126.616459][T28869] device veth527 entered promiscuous mode [ 2159.884145][ T1229] ieee802154 phy0 wpan0: encryption failed: -22 [ 2159.890598][ T1229] ieee802154 phy1 wpan1: encryption failed: -22 [ 2166.284930][T28869] device bridge260 entered promiscuous mode [ 2221.297628][ T1229] ieee802154 phy0 wpan0: encryption failed: -22 [ 2221.304031][ T1229] ieee802154 phy1 wpan1: encryption failed: -22 [ 2259.861812][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 2259.868486][ C1] rcu: 1-....: (1 GPs behind) idle=c59/1/0x4000000000000000 softirq=164405/164406 fqs=3368 [ 2259.879833][ C1] (t=10502 jiffies g=325101 q=10930) [ 2259.885233][ C1] NMI backtrace for cpu 1 [ 2259.889569][ C1] CPU: 1 PID: 28900 Comm: syz-executor.1 Not tainted 5.15.0-syzkaller #0 [ 2259.898001][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2259.908070][ C1] Call Trace: [ 2259.911376][ C1] [ 2259.914212][ C1] dump_stack_lvl+0xcd/0x134 [ 2259.918792][ C1] nmi_cpu_backtrace.cold+0x47/0x144 [ 2259.924082][ C1] ? lapic_can_unplug_cpu+0x80/0x80 [ 2259.929324][ C1] nmi_trigger_cpumask_backtrace+0x1ae/0x220 [ 2259.935295][ C1] rcu_dump_cpu_stacks+0x25e/0x3f0 [ 2259.940412][ C1] rcu_sched_clock_irq.cold+0x9d/0x746 [ 2259.945902][ C1] ? find_held_lock+0x2d/0x110 [ 2259.950673][ C1] ? rcutree_dead_cpu+0x30/0x30 [ 2259.955509][ C1] ? tick_sched_timer+0x2b/0x2d0 [ 2259.960499][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 2259.965340][ C1] update_process_times+0x16d/0x200 [ 2259.970536][ C1] tick_sched_handle+0x9b/0x180 [ 2259.975375][ C1] tick_sched_timer+0x1b0/0x2d0 [ 2259.980213][ C1] ? get_cpu_iowait_time_us+0x3f0/0x3f0 [ 2259.986034][ C1] __hrtimer_run_queues+0x1c0/0xe50 [ 2259.991216][ C1] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 2259.997180][ C1] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 2260.003249][ C1] hrtimer_interrupt+0x31c/0x790 [ 2260.008182][ C1] __sysvec_apic_timer_interrupt+0x146/0x530 [ 2260.014169][ C1] sysvec_apic_timer_interrupt+0x40/0xc0 [ 2260.019805][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2260.025774][ C1] RIP: 0010:kfree_skbmem+0xf0/0x1b0 [ 2260.031011][ C1] Code: d6 aa 5b fa 85 db 0f 84 a4 00 00 00 5b 5d 41 5c e9 a5 a8 5b fa e8 a0 a8 5b fa 48 8b 3d 69 4c 1a 04 48 89 ee e8 41 9b a1 fa 5b <5d> 41 5c e9 88 a8 5b fa e8 83 a8 5b fa 4c 8d a5 d0 01 00 00 be 04 [ 2260.050606][ C1] RSP: 0018:ffffc90000fd8b08 EFLAGS: 00000206 [ 2260.056671][ C1] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000000001 [ 2260.064626][ C1] RDX: 0000000000000000 RSI: 0000000000000101 RDI: 0000000000000000 [ 2260.072605][ C1] RBP: ffff888090232980 R08: 0000000000000001 R09: ffffffff8fd60aef [ 2260.080563][ C1] R10: 0000000000000001 R11: 000000000008608a R12: 0000000000000001 [ 2260.088524][ C1] R13: ffff888076291f00 R14: 0000000000004e2c R15: ffff888090232980 [ 2260.096490][ C1] kfree_skb+0x140/0x3f0 [ 2260.100816][ C1] hsr_forward_skb+0xb7d/0x1bf0 [ 2260.105983][ C1] ? prp_drop_frame+0x150/0x150 [ 2260.110837][ C1] ? prp_fill_frame_info+0x6b0/0x6b0 [ 2260.116134][ C1] ? memset+0x20/0x40 [ 2260.120123][ C1] ? __skb_pad+0x247/0x5f0 [ 2260.124537][ C1] send_hsr_supervision_frame+0x60b/0x8d0 [ 2260.130274][ C1] ? send_hsr_supervision_frame+0x8d0/0x8d0 [ 2260.136158][ C1] hsr_announce+0x109/0x330 [ 2260.140664][ C1] ? send_hsr_supervision_frame+0x8d0/0x8d0 [ 2260.146546][ C1] call_timer_fn+0x1a5/0x6b0 [ 2260.151122][ C1] ? add_timer_on+0x4a0/0x4a0 [ 2260.155782][ C1] ? send_hsr_supervision_frame+0x8d0/0x8d0 [ 2260.161663][ C1] __run_timers.part.0+0x675/0xa20 [ 2260.166847][ C1] ? call_timer_fn+0x6b0/0x6b0 [ 2260.171597][ C1] ? kvm_sched_clock_read+0x14/0x40 [ 2260.176799][ C1] ? sched_clock_cpu+0x15/0x1f0 [ 2260.181697][ C1] run_timer_softirq+0xb3/0x1d0 [ 2260.186534][ C1] __do_softirq+0x29b/0x9c2 [ 2260.191026][ C1] __irq_exit_rcu+0x123/0x180 [ 2260.195704][ C1] irq_exit_rcu+0x5/0x20 [ 2260.199934][ C1] sysvec_apic_timer_interrupt+0x93/0xc0 [ 2260.205553][ C1] [ 2260.208470][ C1] [ 2260.211386][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2260.217353][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x4c/0x60 [ 2260.223496][ C1] Code: 0e 85 c9 74 35 8b 82 a4 15 00 00 85 c0 74 2b 8b 82 80 15 00 00 83 f8 02 75 20 48 8b 8a 88 15 00 00 8b 92 84 15 00 00 48 8b 01 <48> 83 c0 01 48 39 c2 76 07 48 89 34 c1 48 89 01 c3 0f 1f 00 41 55 [ 2260.243087][ C1] RSP: 0018:ffffc90018d8fa38 EFLAGS: 00000246 [ 2260.249136][ C1] RAX: 00000000000052f5 RBX: 000000000000000f RCX: ffffc9000b67c000 [ 2260.257093][ C1] RDX: 0000000000040000 RSI: ffffffff83aa315a RDI: 0000000000000003 [ 2260.265053][ C1] RBP: ffff88801a7a6a80 R08: 0000000000000000 R09: 000000000000000f [ 2260.273010][ C1] R10: ffffffff83aa3147 R11: 0000000000000010 R12: 00000000000000a0 [ 2260.280981][ C1] R13: 000000000000012b R14: dffffc0000000000 R15: 0000000000000000 [ 2260.288941][ C1] ? tomoyo_domain_quota_is_ok+0x307/0x550 [ 2260.294812][ C1] ? tomoyo_domain_quota_is_ok+0x31a/0x550 [ 2260.300608][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2260.306851][ C1] tomoyo_domain_quota_is_ok+0x31a/0x550 [ 2260.312478][ C1] tomoyo_supervisor+0x2f2/0xf00 [ 2260.317400][ C1] ? tomoyo_profile+0x50/0x50 [ 2260.322074][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2260.328213][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 2260.333418][ C1] ? vsnprintf+0x2ce/0x14f0 [ 2260.337905][ C1] ? snprintf+0xe0/0xf0 [ 2260.342129][ C1] tomoyo_path_number_perm+0x419/0x590 [ 2260.347573][ C1] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2260.353366][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 2260.358549][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 2260.363388][ C1] ? __fget_files+0x5d/0x3e0 [ 2260.367977][ C1] ? __fget_files+0x23d/0x3e0 [ 2260.372658][ C1] security_file_ioctl+0x50/0xb0 [ 2260.377766][ C1] __x64_sys_ioctl+0xb3/0x200 [ 2260.382450][ C1] do_syscall_64+0x35/0xb0 [ 2260.386865][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2260.392766][ C1] RIP: 0033:0x7fca19532ae9 [ 2260.397328][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2260.417489][ C1] RSP: 002b:00007fca16a87188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2260.425905][ C1] RAX: ffffffffffffffda RBX: 00007fca19646020 RCX: 00007fca19532ae9 [ 2260.434226][ C1] RDX: 000000000000000b RSI: 0000000000004c80 RDI: 0000000000000004 [ 2260.442296][ C1] RBP: 00007fca1958cf6d R08: 0000000000000000 R09: 0000000000000000 [ 2260.450270][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2260.458244][ C1] R13: 00007ffd7daa52df R14: 00007fca16a87300 R15: 0000000000022000 [ 2260.466246][ C1] [ 2260.842784][T28869] debugfs: Directory 'hsr93' with parent 'hsr' already present! [ 2260.851488][T28869] Cannot create hsr debugfs directory [ 2261.698233][ T6887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr93: link becomes ready